From cd0a617020cd6bfdd42b6712bf2d58fad4c4ac60 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 21 May 2023 09:37:03 +0900 Subject: [PATCH] Auto Update 2023/05/21 00:37:03 --- 2014/CVE-2014-0160.json | 8 ++++---- 2017/CVE-2017-0144.json | 8 ++++---- 2017/CVE-2017-5638.json | 4 ++-- 2018/CVE-2018-10933.json | 4 ++-- 2018/CVE-2018-4407.json | 4 ++-- 2018/CVE-2018-7600.json | 8 ++++---- 2020/CVE-2020-13935.json | 4 ++-- 2020/CVE-2020-1472.json | 8 ++++---- 2021/CVE-2021-26084.json | 4 ++-- 2021/CVE-2021-3493.json | 29 +++++++++++++++++++++++++++++ 2021/CVE-2021-42278.json | 16 ++++++++-------- 2021/CVE-2021-42287.json | 4 ++-- 2022/CVE-2022-1388.json | 8 ++++---- 2022/CVE-2022-20421.json | 12 ++++++------ 2022/CVE-2022-24716.json | 29 +++++++++++++++++++++++++++++ 2022/CVE-2022-39952.json | 4 ++-- 2023/CVE-2023-0297.json | 8 ++++---- 2023/CVE-2023-23397.json | 8 ++++---- 2023/CVE-2023-23752.json | 8 ++++---- 2023/CVE-2023-27524.json | 8 ++++---- 2023/CVE-2023-32233.json | 8 ++++---- 2023/CVE-2023-32784.json | 32 ++++++++++++++++++++++++++++++++ README.md | 3 +++ 23 files changed, 161 insertions(+), 68 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 753718d92f..ecaed35a5e 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -18,13 +18,13 @@ "stargazers_count": 2291, "watchers_count": 2291, "has_discussions": false, - "forks_count": 490, + "forks_count": 489, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 490, + "forks": 489, "watchers": 2291, "score": 0 }, @@ -163,13 +163,13 @@ "stargazers_count": 572, "watchers_count": 572, "has_discussions": false, - "forks_count": 228, + "forks_count": 229, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 228, + "forks": 229, "watchers": 572, "score": 0 }, diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json index a0ffa92367..bd0f8140ab 100644 --- a/2017/CVE-2017-0144.json +++ b/2017/CVE-2017-0144.json @@ -13,10 +13,10 @@ "description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)", "fork": false, "created_at": "2017-07-16T19:44:04Z", - "updated_at": "2023-03-31T09:19:41Z", + "updated_at": "2023-05-20T22:25:20Z", "pushed_at": "2023-04-12T08:01:15Z", - "stargazers_count": 301, - "watchers_count": 301, + "stargazers_count": 302, + "watchers_count": 302, "has_discussions": false, "forks_count": 114, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 114, - "watchers": 301, + "watchers": 302, "score": 0 }, { diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index e8b517dd54..254b04413a 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -407,7 +407,7 @@ "stargazers_count": 413, "watchers_count": 413, "has_discussions": false, - "forks_count": 149, + "forks_count": 150, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -419,7 +419,7 @@ "struts-pwn" ], "visibility": "public", - "forks": 149, + "forks": 150, "watchers": 413, "score": 0 }, diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 5a734f45c5..eed452c802 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -47,13 +47,13 @@ "stargazers_count": 488, "watchers_count": 488, "has_discussions": false, - "forks_count": 121, + "forks_count": 122, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 121, + "forks": 122, "watchers": 488, "score": 0 }, diff --git a/2018/CVE-2018-4407.json b/2018/CVE-2018-4407.json index d5b40d3dee..d4ec1612e4 100644 --- a/2018/CVE-2018-4407.json +++ b/2018/CVE-2018-4407.json @@ -47,13 +47,13 @@ "stargazers_count": 48, "watchers_count": 48, "has_discussions": false, - "forks_count": 19, + "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 19, + "forks": 20, "watchers": 48, "score": 0 }, diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 3271059ffd..9c66343dfb 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -42,10 +42,10 @@ "description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002", "fork": false, "created_at": "2018-03-30T14:23:18Z", - "updated_at": "2023-04-19T19:40:19Z", + "updated_at": "2023-05-20T18:47:33Z", "pushed_at": "2019-03-29T11:25:57Z", - "stargazers_count": 343, - "watchers_count": 343, + "stargazers_count": 344, + "watchers_count": 344, "has_discussions": false, "forks_count": 115, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 115, - "watchers": 343, + "watchers": 344, "score": 0 }, { diff --git a/2020/CVE-2020-13935.json b/2020/CVE-2020-13935.json index cb1c78406e..95eee910ce 100644 --- a/2020/CVE-2020-13935.json +++ b/2020/CVE-2020-13935.json @@ -18,13 +18,13 @@ "stargazers_count": 157, "watchers_count": 157, "has_discussions": false, - "forks_count": 42, + "forks_count": 43, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 42, + "forks": 43, "watchers": 157, "score": 0 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 7e8770d6af..4da1e86db0 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -134,7 +134,7 @@ "stargazers_count": 348, "watchers_count": 348, "has_discussions": false, - "forks_count": 65, + "forks_count": 66, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -147,7 +147,7 @@ "zerologon" ], "visibility": "public", - "forks": 65, + "forks": 66, "watchers": 348, "score": 0 }, @@ -1367,13 +1367,13 @@ "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 14, "score": 0 }, diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 386ebbf035..7b82d77d91 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -134,13 +134,13 @@ "stargazers_count": 297, "watchers_count": 297, "has_discussions": false, - "forks_count": 84, + "forks_count": 85, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 84, + "forks": 85, "watchers": 297, "score": 0 }, diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index b5237f8fd6..b555756dc6 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -259,5 +259,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 643372099, + "name": "CVE-2021-3493", + "full_name": "smallkill\/CVE-2021-3493", + "owner": { + "login": "smallkill", + "id": 19218766, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19218766?v=4", + "html_url": "https:\/\/github.com\/smallkill" + }, + "html_url": "https:\/\/github.com\/smallkill\/CVE-2021-3493", + "description": null, + "fork": false, + "created_at": "2023-05-21T00:14:40Z", + "updated_at": "2023-05-21T00:15:16Z", + "pushed_at": "2023-05-21T00:15:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 682f2021f7..621502c694 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2023-05-15T20:29:48Z", + "updated_at": "2023-05-20T20:37:31Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 897, - "watchers_count": 897, + "stargazers_count": 898, + "watchers_count": 898, "has_discussions": false, "forks_count": 186, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 186, - "watchers": 897, + "watchers": 898, "score": 0 }, { @@ -47,10 +47,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2023-05-20T12:15:52Z", + "updated_at": "2023-05-20T20:36:29Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 572, - "watchers_count": 572, + "stargazers_count": 573, + "watchers_count": 573, "has_discussions": false, "forks_count": 105, "allow_forking": true, @@ -59,7 +59,7 @@ "topics": [], "visibility": "public", "forks": 105, - "watchers": 572, + "watchers": 573, "score": 0 }, { diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index e29208049a..375f4a7fb9 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -18,13 +18,13 @@ "stargazers_count": 1212, "watchers_count": 1212, "has_discussions": false, - "forks_count": 309, + "forks_count": 310, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 309, + "forks": 310, "watchers": 1212, "score": 0 }, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 8324c37bef..135eb82aa1 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -1552,10 +1552,10 @@ "description": "cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCE", "fork": false, "created_at": "2022-10-25T12:29:54Z", - "updated_at": "2022-10-26T01:23:44Z", + "updated_at": "2023-05-21T00:26:55Z", "pushed_at": "2023-05-19T05:55:52Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1564,7 +1564,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json index 13f04b51f3..4a5ed06c63 100644 --- a/2022/CVE-2022-20421.json +++ b/2022/CVE-2022-20421.json @@ -13,19 +13,19 @@ "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)", "fork": false, "created_at": "2023-03-23T10:25:59Z", - "updated_at": "2023-05-20T17:44:05Z", + "updated_at": "2023-05-20T23:57:14Z", "pushed_at": "2023-03-23T10:26:41Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 55, + "forks": 6, + "watchers": 58, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-24716.json b/2022/CVE-2022-24716.json index 8137be1896..792ef7a4fa 100644 --- a/2022/CVE-2022-24716.json +++ b/2022/CVE-2022-24716.json @@ -114,5 +114,34 @@ "forks": 0, "watchers": 3, "score": 0 + }, + { + "id": 643308038, + "name": "CVE-2022-24716", + "full_name": "antisecc\/CVE-2022-24716", + "owner": { + "login": "antisecc", + "id": 92209707, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92209707?v=4", + "html_url": "https:\/\/github.com\/antisecc" + }, + "html_url": "https:\/\/github.com\/antisecc\/CVE-2022-24716", + "description": null, + "fork": false, + "created_at": "2023-05-20T18:43:46Z", + "updated_at": "2023-05-20T18:50:20Z", + "pushed_at": "2023-05-20T18:50:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json index f36f22d226..b28f2bb1d3 100644 --- a/2022/CVE-2022-39952.json +++ b/2022/CVE-2022-39952.json @@ -18,13 +18,13 @@ "stargazers_count": 259, "watchers_count": 259, "has_discussions": false, - "forks_count": 52, + "forks_count": 53, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 52, + "forks": 53, "watchers": 259, "score": 0 }, diff --git a/2023/CVE-2023-0297.json b/2023/CVE-2023-0297.json index f7a2a584e1..e77ab9673d 100644 --- a/2023/CVE-2023-0297.json +++ b/2023/CVE-2023-0297.json @@ -13,10 +13,10 @@ "description": "CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad", "fork": false, "created_at": "2023-01-09T11:44:09Z", - "updated_at": "2023-04-17T18:57:50Z", + "updated_at": "2023-05-20T19:56:08Z", "pushed_at": "2023-01-14T04:40:47Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0 }, { diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index 6f013e4754..0bfe9ad9c7 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -400,10 +400,10 @@ "description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.", "fork": false, "created_at": "2023-03-20T16:31:54Z", - "updated_at": "2023-05-20T12:49:30Z", + "updated_at": "2023-05-20T23:05:23Z", "pushed_at": "2023-03-24T10:46:38Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -414,7 +414,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 80, + "watchers": 81, "score": 0 }, { diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index e9fee5bef6..a5ae01deab 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -615,10 +615,10 @@ "description": "Perform With Mass Exploiter In Joomla 4.2.8.", "fork": false, "created_at": "2023-04-09T13:20:48Z", - "updated_at": "2023-05-09T14:57:43Z", + "updated_at": "2023-05-20T22:09:01Z", "pushed_at": "2023-05-05T04:46:53Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -631,7 +631,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 6, + "watchers": 7, "score": 0 }, { diff --git a/2023/CVE-2023-27524.json b/2023/CVE-2023-27524.json index 6dacd3c89d..c57d765a88 100644 --- a/2023/CVE-2023-27524.json +++ b/2023/CVE-2023-27524.json @@ -129,10 +129,10 @@ "description": "Perform With Apache-SuperSet Leaked Token [CSRF]", "fork": false, "created_at": "2023-05-04T21:43:48Z", - "updated_at": "2023-05-04T23:59:24Z", + "updated_at": "2023-05-20T22:09:46Z", "pushed_at": "2023-05-05T06:56:08Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -145,7 +145,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2023/CVE-2023-32233.json b/2023/CVE-2023-32233.json index 788b23446f..6f97d19267 100644 --- a/2023/CVE-2023-32233.json +++ b/2023/CVE-2023-32233.json @@ -42,10 +42,10 @@ "description": "CVE-2023-32233: Linux内核中的安全漏洞", "fork": false, "created_at": "2023-05-16T03:06:40Z", - "updated_at": "2023-05-20T07:55:34Z", + "updated_at": "2023-05-21T00:20:40Z", "pushed_at": "2023-05-16T04:34:16Z", - "stargazers_count": 187, - "watchers_count": 187, + "stargazers_count": 188, + "watchers_count": 188, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 187, + "watchers": 188, "score": 0 }, { diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json index 8204d91bde..8c39d9dc8f 100644 --- a/2023/CVE-2023-32784.json +++ b/2023/CVE-2023-32784.json @@ -1,4 +1,36 @@ [ + { + "id": 634970492, + "name": "keepass-password-dumper", + "full_name": "vdohney\/keepass-password-dumper", + "owner": { + "login": "vdohney", + "id": 131018578, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131018578?v=4", + "html_url": "https:\/\/github.com\/vdohney" + }, + "html_url": "https:\/\/github.com\/vdohney\/keepass-password-dumper", + "description": "Original PoC for CVE-2023-32784", + "fork": false, + "created_at": "2023-05-01T17:08:55Z", + "updated_at": "2023-05-20T23:47:49Z", + "pushed_at": "2023-05-20T23:24:32Z", + "stargazers_count": 284, + "watchers_count": 284, + "has_discussions": false, + "forks_count": 28, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2023-32784", + "keepass" + ], + "visibility": "public", + "forks": 28, + "watchers": 284, + "score": 0 + }, { "id": 642096503, "name": "CVE-2023-32784-keepass-linux", diff --git a/README.md b/README.md index 2000258df1..5e66bf3699 100644 --- a/README.md +++ b/README.md @@ -1273,6 +1273,7 @@ Improper Authentication vulnerability in WPDeveloper Essential Addons for Elemen In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation. +- [vdohney/keepass-password-dumper](https://github.com/vdohney/keepass-password-dumper) - [CTM1/CVE-2023-32784-keepass-linux](https://github.com/CTM1/CVE-2023-32784-keepass-linux) @@ -3633,6 +3634,7 @@ Icinga Web 2 is an open source monitoring web interface, framework and command-l - [joaoviictorti/CVE-2022-24716](https://github.com/joaoviictorti/CVE-2022-24716) - [pumpkinpiteam/CVE-2022-24716](https://github.com/pumpkinpiteam/CVE-2022-24716) - [doosec101/CVE-2022-24716](https://github.com/doosec101/CVE-2022-24716) +- [antisecc/CVE-2022-24716](https://github.com/antisecc/CVE-2022-24716) ### CVE-2022-24734 (2022-03-09) @@ -8795,6 +8797,7 @@ The overlayfs implementation in the linux kernel did not properly validate with - [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493) - [fei9747/CVE-2021-3493](https://github.com/fei9747/CVE-2021-3493) - [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493) +- [smallkill/CVE-2021-3493](https://github.com/smallkill/CVE-2021-3493) ### CVE-2021-3560 (2022-02-16)