diff --git a/2000/CVE-2000-0170.json b/2000/CVE-2000-0170.json
deleted file mode 100644
index e776938f29..0000000000
--- a/2000/CVE-2000-0170.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 26364485,
- "name": "exploit",
- "full_name": "mike182\/exploit",
- "owner": {
- "login": "mike182",
- "id": 509504,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/509504?v=4",
- "html_url": "https:\/\/github.com\/mike182"
- },
- "html_url": "https:\/\/github.com\/mike182\/exploit",
- "description": "CVE-2000-0170",
- "fork": false,
- "created_at": "2014-11-08T15:21:30Z",
- "updated_at": "2023-09-16T20:51:37Z",
- "pushed_at": "2014-11-08T15:25:37Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 1,
- "score": 0,
- "subscribers_count": 3
- }
-]
\ No newline at end of file
diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index 1efd212e90..daba185365 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-09-21T17:59:34Z",
+ "updated_at": "2023-09-24T17:18:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1784,
- "watchers_count": 1784,
+ "stargazers_count": 1785,
+ "watchers_count": 1785,
"has_discussions": false,
"forks_count": 334,
"allow_forking": true,
@@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 334,
- "watchers": 1784,
+ "watchers": 1785,
"score": 0,
"subscribers_count": 34
},
diff --git a/2014/CVE-2014-7169.json b/2014/CVE-2014-7169.json
index 8f54074938..b7911f537c 100644
--- a/2014/CVE-2014-7169.json
+++ b/2014/CVE-2014-7169.json
@@ -57,7 +57,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 10
+ "subscribers_count": 9
},
{
"id": 517399645,
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index f3904deb82..edaafd4b33 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-09-21T17:59:34Z",
+ "updated_at": "2023-09-24T17:18:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1784,
- "watchers_count": 1784,
+ "stargazers_count": 1785,
+ "watchers_count": 1785,
"has_discussions": false,
"forks_count": 334,
"allow_forking": true,
@@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 334,
- "watchers": 1784,
+ "watchers": 1785,
"score": 0,
"subscribers_count": 34
},
diff --git a/2017/CVE-2017-16651.json b/2017/CVE-2017-16651.json
index 79cd45283f..af3146e7a6 100644
--- a/2017/CVE-2017-16651.json
+++ b/2017/CVE-2017-16651.json
@@ -13,10 +13,10 @@
"description": "Python implementation of Roundcube LFI (CVE-2017-16651)",
"fork": false,
"created_at": "2021-01-06T01:46:39Z",
- "updated_at": "2022-12-18T15:55:36Z",
+ "updated_at": "2023-09-24T16:23:48Z",
"pushed_at": "2021-01-06T01:47:39Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 2
}
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 9eba4e8a3d..9119dd3867 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-09-21T17:59:34Z",
+ "updated_at": "2023-09-24T17:18:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1784,
- "watchers_count": 1784,
+ "stargazers_count": 1785,
+ "watchers_count": 1785,
"has_discussions": false,
"forks_count": 334,
"allow_forking": true,
@@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 334,
- "watchers": 1784,
+ "watchers": 1785,
"score": 0,
"subscribers_count": 34
},
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index d385c7747b..b5aad5b698 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-09-21T17:59:34Z",
+ "updated_at": "2023-09-24T17:18:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1784,
- "watchers_count": 1784,
+ "stargazers_count": 1785,
+ "watchers_count": 1785,
"has_discussions": false,
"forks_count": 334,
"allow_forking": true,
@@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 334,
- "watchers": 1784,
+ "watchers": 1785,
"score": 0,
"subscribers_count": 34
},
diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json
index 5e7528f379..74f514d69c 100644
--- a/2018/CVE-2018-9995.json
+++ b/2018/CVE-2018-9995.json
@@ -637,5 +637,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 695936317,
+ "name": "CVE-2018-9995",
+ "full_name": "Pab450\/CVE-2018-9995",
+ "owner": {
+ "login": "Pab450",
+ "id": 16840900,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16840900?v=4",
+ "html_url": "https:\/\/github.com\/Pab450"
+ },
+ "html_url": "https:\/\/github.com\/Pab450\/CVE-2018-9995",
+ "description": "CVE-2018-9995 Exploit Tool for Python3",
+ "fork": false,
+ "created_at": "2023-09-24T17:00:37Z",
+ "updated_at": "2023-09-24T17:03:32Z",
+ "pushed_at": "2023-09-24T17:11:46Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index f3a8f18c22..364c3adc88 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -138,35 +138,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
- },
- {
- "id": 649585140,
- "name": "CVE-2019-17558",
- "full_name": "narrowinxt\/CVE-2019-17558",
- "owner": {
- "login": "narrowinxt",
- "id": 135184409,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135184409?v=4",
- "html_url": "https:\/\/github.com\/narrowinxt"
- },
- "html_url": "https:\/\/github.com\/narrowinxt\/CVE-2019-17558",
- "description": null,
- "fork": false,
- "created_at": "2023-06-05T07:47:01Z",
- "updated_at": "2023-06-21T06:10:17Z",
- "pushed_at": "2023-06-16T09:26:56Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 1,
- "score": 0,
- "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 73de8e4f9b..46bf953d4b 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-09-21T17:59:34Z",
+ "updated_at": "2023-09-24T17:18:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1784,
- "watchers_count": 1784,
+ "stargazers_count": 1785,
+ "watchers_count": 1785,
"has_discussions": false,
"forks_count": 334,
"allow_forking": true,
@@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 334,
- "watchers": 1784,
+ "watchers": 1785,
"score": 0,
"subscribers_count": 34
}
diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json
index 66baff296d..71c65034bc 100644
--- a/2020/CVE-2020-0069.json
+++ b/2020/CVE-2020-0069.json
@@ -142,10 +142,10 @@
"description": "CVE-2020-0069",
"fork": false,
"created_at": "2023-09-04T17:52:04Z",
- "updated_at": "2023-09-24T00:50:03Z",
+ "updated_at": "2023-09-24T17:58:57Z",
"pushed_at": "2023-09-04T17:53:01Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
}
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 1c80fdb510..402ec2bf4a 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
- "updated_at": "2023-09-21T15:27:45Z",
+ "updated_at": "2023-09-24T16:07:40Z",
"pushed_at": "2020-11-03T09:45:24Z",
- "stargazers_count": 1078,
- "watchers_count": 1078,
+ "stargazers_count": 1079,
+ "watchers_count": 1079,
"has_discussions": false,
"forks_count": 282,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 282,
- "watchers": 1078,
+ "watchers": 1079,
"score": 0,
"subscribers_count": 35
},
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 324ec6f339..dffaae6532 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2023-09-21T17:59:34Z",
+ "updated_at": "2023-09-24T17:18:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1784,
- "watchers_count": 1784,
+ "stargazers_count": 1785,
+ "watchers_count": 1785,
"has_discussions": false,
"forks_count": 334,
"allow_forking": true,
@@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 334,
- "watchers": 1784,
+ "watchers": 1785,
"score": 0,
"subscribers_count": 34
},
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index e876ea9ee4..3fc546614f 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -119,84 +119,6 @@
"score": 0,
"subscribers_count": 2
},
- {
- "id": 381971547,
- "name": "CVE-2021-1675-LPE-EXP",
- "full_name": "evilashz\/CVE-2021-1675-LPE-EXP",
- "owner": {
- "login": "evilashz",
- "id": 50722929,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
- "html_url": "https:\/\/github.com\/evilashz"
- },
- "html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP",
- "description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
- "fork": false,
- "created_at": "2021-07-01T09:00:31Z",
- "updated_at": "2023-09-16T21:45:34Z",
- "pushed_at": "2021-07-02T10:47:36Z",
- "stargazers_count": 55,
- "watchers_count": 55,
- "has_discussions": false,
- "forks_count": 21,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "cve-2021-1675",
- "cve-2021-34527",
- "hacktool",
- "lpe",
- "printnightmare",
- "redteam",
- "redteam-tools",
- "windows"
- ],
- "visibility": "public",
- "forks": 21,
- "watchers": 55,
- "score": 0,
- "subscribers_count": 3
- },
- {
- "id": 381984439,
- "name": "CVE-2021-1675-LPE",
- "full_name": "hlldz\/CVE-2021-1675-LPE",
- "owner": {
- "login": "hlldz",
- "id": 16455559,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
- "html_url": "https:\/\/github.com\/hlldz"
- },
- "html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
- "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
- "fork": false,
- "created_at": "2021-07-01T09:47:13Z",
- "updated_at": "2023-09-18T19:54:59Z",
- "pushed_at": "2021-07-05T06:46:12Z",
- "stargazers_count": 332,
- "watchers_count": 332,
- "has_discussions": false,
- "forks_count": 80,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "cobaltstrike",
- "cve-2021-1675",
- "cve-2021-34527",
- "exploit",
- "lpe",
- "printnightmare",
- "reflectivedll",
- "windows"
- ],
- "visibility": "public",
- "forks": 80,
- "watchers": 332,
- "score": 0,
- "subscribers_count": 14
- },
{
"id": 382024474,
"name": "CVE-2021-1675",
@@ -353,96 +275,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 382249207,
- "name": "CVE-2021-1675",
- "full_name": "thomasgeens\/CVE-2021-1675",
- "owner": {
- "login": "thomasgeens",
- "id": 2236721,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4",
- "html_url": "https:\/\/github.com\/thomasgeens"
- },
- "html_url": "https:\/\/github.com\/thomasgeens\/CVE-2021-1675",
- "description": null,
- "fork": false,
- "created_at": "2021-07-02T06:14:29Z",
- "updated_at": "2023-09-16T21:45:36Z",
- "pushed_at": "2021-07-02T06:14:39Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 3,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 382266932,
- "name": "CVE-2021-1675_CarbonBlack_HuntingQuery",
- "full_name": "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery",
- "owner": {
- "login": "mrezqi",
- "id": 2455832,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4",
- "html_url": "https:\/\/github.com\/mrezqi"
- },
- "html_url": "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery",
- "description": null,
- "fork": false,
- "created_at": "2021-07-02T07:30:24Z",
- "updated_at": "2023-09-16T21:45:36Z",
- "pushed_at": "2021-07-02T08:01:07Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 2
- },
- {
- "id": 382399375,
- "name": "CVE-2021-1675-PrintNightmare",
- "full_name": "killtr0\/CVE-2021-1675-PrintNightmare",
- "owner": {
- "login": "killtr0",
- "id": 22793707,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4",
- "html_url": "https:\/\/github.com\/killtr0"
- },
- "html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare",
- "description": null,
- "fork": false,
- "created_at": "2021-07-02T16:12:15Z",
- "updated_at": "2023-09-16T21:45:37Z",
- "pushed_at": "2021-07-02T16:12:59Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 382407157,
"name": "CVE-2021-1675",
@@ -473,156 +305,6 @@
"score": 0,
"subscribers_count": 6
},
- {
- "id": 382418030,
- "name": "CVE-2021-1675",
- "full_name": "kougyokugentou\/CVE-2021-1675",
- "owner": {
- "login": "kougyokugentou",
- "id": 41278462,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4",
- "html_url": "https:\/\/github.com\/kougyokugentou"
- },
- "html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675",
- "description": "A small powershell script to disable print spooler service using desired state configuration",
- "fork": false,
- "created_at": "2021-07-02T17:29:04Z",
- "updated_at": "2021-12-22T20:12:23Z",
- "pushed_at": "2021-07-02T17:40:09Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 1,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 382425733,
- "name": "CVE-2021-1675",
- "full_name": "ptter23\/CVE-2021-1675",
- "owner": {
- "login": "ptter23",
- "id": 55167410,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4",
- "html_url": "https:\/\/github.com\/ptter23"
- },
- "html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675",
- "description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS",
- "fork": false,
- "created_at": "2021-07-02T18:01:21Z",
- "updated_at": "2023-09-16T21:45:37Z",
- "pushed_at": "2021-07-02T18:07:45Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 382496518,
- "name": "cve-2021-1675-printnightmare",
- "full_name": "initconf\/cve-2021-1675-printnightmare",
- "owner": {
- "login": "initconf",
- "id": 4044729,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
- "html_url": "https:\/\/github.com\/initconf"
- },
- "html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare",
- "description": "to catch cve-2021-1675-printnightmare",
- "fork": false,
- "created_at": "2021-07-03T01:04:06Z",
- "updated_at": "2023-09-16T21:45:37Z",
- "pushed_at": "2021-07-03T01:08:43Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 2
- },
- {
- "id": 382609559,
- "name": "PrintNightmare",
- "full_name": "ozergoker\/PrintNightmare",
- "owner": {
- "login": "ozergoker",
- "id": 86879266,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
- "html_url": "https:\/\/github.com\/ozergoker"
- },
- "html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare",
- "description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)",
- "fork": false,
- "created_at": "2021-07-03T12:25:21Z",
- "updated_at": "2023-09-16T21:45:38Z",
- "pushed_at": "2021-07-03T12:43:26Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 382815972,
- "name": "PrintNightmare-CVE-2021-1675",
- "full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675",
- "owner": {
- "login": "exploitblizzard",
- "id": 61627070,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
- "html_url": "https:\/\/github.com\/exploitblizzard"
- },
- "html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675",
- "description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
- "fork": false,
- "created_at": "2021-07-04T09:50:39Z",
- "updated_at": "2023-09-16T21:45:39Z",
- "pushed_at": "2021-07-04T09:57:46Z",
- "stargazers_count": 6,
- "watchers_count": 6,
- "has_discussions": false,
- "forks_count": 4,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 4,
- "watchers": 6,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 383128850,
"name": "CVE-2021-1675",
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 8218a6e943..7b244015f1 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -90,10 +90,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
- "updated_at": "2023-09-24T11:09:57Z",
+ "updated_at": "2023-09-24T13:26:21Z",
"pushed_at": "2023-06-08T04:01:33Z",
- "stargazers_count": 456,
- "watchers_count": 456,
+ "stargazers_count": 455,
+ "watchers_count": 455,
"has_discussions": false,
"forks_count": 151,
"allow_forking": true,
@@ -104,7 +104,7 @@
],
"visibility": "public",
"forks": 151,
- "watchers": 456,
+ "watchers": 455,
"score": 0,
"subscribers_count": 8
},
diff --git a/2021/CVE-2021-27850.json b/2021/CVE-2021-27850.json
index 257cd37e84..b3b592c4ed 100644
--- a/2021/CVE-2021-27850.json
+++ b/2021/CVE-2021-27850.json
@@ -59,36 +59,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 382309693,
- "name": "CVE_2021_27850_POC",
- "full_name": "Ovi3\/CVE_2021_27850_POC",
- "owner": {
- "login": "Ovi3",
- "id": 29408109,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29408109?v=4",
- "html_url": "https:\/\/github.com\/Ovi3"
- },
- "html_url": "https:\/\/github.com\/Ovi3\/CVE_2021_27850_POC",
- "description": "Apache Tapestry CVE-2021-27850 PoC",
- "fork": false,
- "created_at": "2021-07-02T10:21:58Z",
- "updated_at": "2022-11-09T18:12:48Z",
- "pushed_at": "2021-07-02T10:22:46Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "has_discussions": false,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 2,
- "watchers": 3,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 511347007,
"name": "CVE-2021-27850",
diff --git a/2021/CVE-2021-30481.json b/2021/CVE-2021-30481.json
index b94ec9ec3a..4a8aa15962 100644
--- a/2021/CVE-2021-30481.json
+++ b/2021/CVE-2021-30481.json
@@ -13,10 +13,10 @@
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481",
"fork": false,
"created_at": "2021-04-17T01:29:31Z",
- "updated_at": "2023-07-02T13:15:50Z",
+ "updated_at": "2023-09-24T13:30:32Z",
"pushed_at": "2021-04-20T16:00:46Z",
- "stargazers_count": 55,
- "watchers_count": 55,
+ "stargazers_count": 54,
+ "watchers_count": 54,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 55,
+ "watchers": 54,
"score": 0,
"subscribers_count": 3
}
diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json
index 2e2de2cb5c..b82b1a4988 100644
--- a/2021/CVE-2021-31166.json
+++ b/2021/CVE-2021-31166.json
@@ -218,48 +218,6 @@
"score": 0,
"subscribers_count": 2
},
- {
- "id": 382641118,
- "name": "CVE-2021-31166-Exploit",
- "full_name": "y0g3sh-99\/CVE-2021-31166-Exploit",
- "owner": {
- "login": "y0g3sh-99",
- "id": 59962466,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59962466?v=4",
- "html_url": "https:\/\/github.com\/y0g3sh-99"
- },
- "html_url": "https:\/\/github.com\/y0g3sh-99\/CVE-2021-31166-Exploit",
- "description": "Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)",
- "fork": false,
- "created_at": "2021-07-03T14:54:59Z",
- "updated_at": "2022-01-18T13:29:37Z",
- "pushed_at": "2021-07-03T15:27:28Z",
- "stargazers_count": 7,
- "watchers_count": 7,
- "has_discussions": false,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "accept-encoding",
- "cve-2021-31166",
- "dos",
- "exploit",
- "http",
- "kernel",
- "python3",
- "rce",
- "request-header",
- "vulnerability",
- "windows"
- ],
- "visibility": "public",
- "forks": 2,
- "watchers": 7,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 410758909,
"name": "CVE-2021-31166",
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index b4561ba0da..51ecae4e6d 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
- "updated_at": "2023-09-24T11:09:48Z",
+ "updated_at": "2023-09-24T15:00:15Z",
"pushed_at": "2022-01-13T05:48:01Z",
- "stargazers_count": 665,
- "watchers_count": 665,
+ "stargazers_count": 666,
+ "watchers_count": 666,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@@ -1086,7 +1086,7 @@
"topics": [],
"visibility": "public",
"forks": 165,
- "watchers": 665,
+ "watchers": 666,
"score": 0,
"subscribers_count": 11
},
diff --git a/2021/CVE-2021-3281.json b/2021/CVE-2021-3281.json
deleted file mode 100644
index 3dd2a38810..0000000000
--- a/2021/CVE-2021-3281.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 383067956,
- "name": "CVE-2021-3281",
- "full_name": "lwzSoviet\/CVE-2021-3281",
- "owner": {
- "login": "lwzSoviet",
- "id": 30397594,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30397594?v=4",
- "html_url": "https:\/\/github.com\/lwzSoviet"
- },
- "html_url": "https:\/\/github.com\/lwzSoviet\/CVE-2021-3281",
- "description": null,
- "fork": false,
- "created_at": "2021-07-05T08:25:26Z",
- "updated_at": "2022-01-31T11:44:07Z",
- "pushed_at": "2021-07-05T08:47:14Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 2
- }
-]
\ No newline at end of file
diff --git a/2021/CVE-2021-34045.json b/2021/CVE-2021-34045.json
index 6ede90f920..2026bb2e2e 100644
--- a/2021/CVE-2021-34045.json
+++ b/2021/CVE-2021-34045.json
@@ -1,34 +1,4 @@
[
- {
- "id": 381879818,
- "name": "CVE-2021-34045",
- "full_name": "Al1ex\/CVE-2021-34045",
- "owner": {
- "login": "Al1ex",
- "id": 38161463,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
- "html_url": "https:\/\/github.com\/Al1ex"
- },
- "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-34045",
- "description": "Novel-plus-install-v3.5.3-Druid Unauthorized access",
- "fork": false,
- "created_at": "2021-07-01T01:52:49Z",
- "updated_at": "2023-09-16T21:45:34Z",
- "pushed_at": "2021-07-01T02:07:39Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 3,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 438706438,
"name": "CVE-2021-34045",
diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json
index 82d5397934..452a858836 100644
--- a/2021/CVE-2021-34473.json
+++ b/2021/CVE-2021-34473.json
@@ -103,10 +103,10 @@
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
"fork": false,
"created_at": "2021-09-04T15:34:03Z",
- "updated_at": "2023-09-17T23:06:27Z",
+ "updated_at": "2023-09-24T12:44:16Z",
"pushed_at": "2023-08-25T22:42:24Z",
- "stargazers_count": 87,
- "watchers_count": 87,
+ "stargazers_count": 88,
+ "watchers_count": 88,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
- "watchers": 87,
+ "watchers": 88,
"score": 0,
"subscribers_count": 3
},
@@ -193,10 +193,10 @@
"description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-06-29T12:37:31Z",
- "updated_at": "2023-08-02T21:24:20Z",
+ "updated_at": "2023-09-24T12:44:12Z",
"pushed_at": "2022-06-30T08:36:58Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 13,
+ "watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 12,
+ "watchers": 13,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
index b1e2fd4073..cc45b14003 100644
--- a/2021/CVE-2021-34527.json
+++ b/2021/CVE-2021-34527.json
@@ -1,40 +1,4 @@
[
- {
- "id": 382021281,
- "name": "CVE-2021-34527",
- "full_name": "DenizSe\/CVE-2021-34527",
- "owner": {
- "login": "DenizSe",
- "id": 43039427,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4",
- "html_url": "https:\/\/github.com\/DenizSe"
- },
- "html_url": "https:\/\/github.com\/DenizSe\/CVE-2021-34527",
- "description": "Small Powershell Script to detect Running Printer Spoolers on Domain Controller",
- "fork": false,
- "created_at": "2021-07-01T12:12:16Z",
- "updated_at": "2021-07-02T07:49:06Z",
- "pushed_at": "2021-07-02T07:45:59Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "cve-2021-1675",
- "cve-2021-34527",
- "domaincontroller",
- "printnightmare",
- "printspooler"
- ],
- "visibility": "public",
- "forks": 2,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 382267064,
"name": "PrintNightmare",
@@ -65,36 +29,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 382335385,
- "name": "CVE-2021-34527",
- "full_name": "JohnHammond\/CVE-2021-34527",
- "owner": {
- "login": "JohnHammond",
- "id": 6288722,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
- "html_url": "https:\/\/github.com\/JohnHammond"
- },
- "html_url": "https:\/\/github.com\/JohnHammond\/CVE-2021-34527",
- "description": null,
- "fork": false,
- "created_at": "2021-07-02T12:10:49Z",
- "updated_at": "2023-09-16T21:45:36Z",
- "pushed_at": "2021-07-02T12:17:50Z",
- "stargazers_count": 212,
- "watchers_count": 212,
- "has_discussions": false,
- "forks_count": 61,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 61,
- "watchers": 212,
- "score": 0,
- "subscribers_count": 9
- },
{
"id": 382645654,
"name": "PrintNightmare-CVE-2021-34527",
@@ -132,36 +66,6 @@
"score": 0,
"subscribers_count": 8
},
- {
- "id": 382894525,
- "name": "CVE-2021-34527-1675",
- "full_name": "CnOxx1\/CVE-2021-34527-1675",
- "owner": {
- "login": "CnOxx1",
- "id": 86923954,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4",
- "html_url": "https:\/\/github.com\/CnOxx1"
- },
- "html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675",
- "description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!",
- "fork": false,
- "created_at": "2021-07-04T16:09:18Z",
- "updated_at": "2021-09-06T06:08:09Z",
- "pushed_at": "2021-07-04T16:31:21Z",
- "stargazers_count": 6,
- "watchers_count": 6,
- "has_discussions": true,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 6,
- "score": 0,
- "subscribers_count": 2
- },
{
"id": 383207766,
"name": "disable-RegisterSpoolerRemoteRpcEndPoint",
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
index f496800fa5..f35ab726e7 100644
--- a/2021/CVE-2021-40449.json
+++ b/2021/CVE-2021-40449.json
@@ -197,10 +197,10 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
- "updated_at": "2023-09-23T04:15:19Z",
+ "updated_at": "2023-09-24T13:15:03Z",
"pushed_at": "2022-03-05T18:34:25Z",
- "stargazers_count": 83,
- "watchers_count": 83,
+ "stargazers_count": 82,
+ "watchers_count": 82,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@@ -209,7 +209,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
- "watchers": 83,
+ "watchers": 82,
"score": 0,
"subscribers_count": 3
},
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 4680a44699..50b4a7762c 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -2172,10 +2172,10 @@
"description": "Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP",
"fork": false,
"created_at": "2021-12-12T03:11:14Z",
- "updated_at": "2023-09-16T21:49:38Z",
+ "updated_at": "2023-09-24T13:33:19Z",
"pushed_at": "2021-12-12T03:22:59Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -2189,7 +2189,7 @@
],
"visibility": "public",
"forks": 3,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 3
},
@@ -2489,10 +2489,10 @@
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
"fork": false,
"created_at": "2021-12-12T11:26:42Z",
- "updated_at": "2023-09-08T18:29:29Z",
+ "updated_at": "2023-09-24T13:17:31Z",
"pushed_at": "2021-12-12T17:37:11Z",
- "stargazers_count": 66,
- "watchers_count": 66,
+ "stargazers_count": 65,
+ "watchers_count": 65,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -2509,7 +2509,7 @@
],
"visibility": "public",
"forks": 4,
- "watchers": 66,
+ "watchers": 65,
"score": 0,
"subscribers_count": 1
},
@@ -9170,10 +9170,10 @@
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
"fork": false,
"created_at": "2021-12-20T15:22:50Z",
- "updated_at": "2023-09-18T00:13:11Z",
+ "updated_at": "2023-09-24T17:05:34Z",
"pushed_at": "2022-12-30T12:32:05Z",
- "stargazers_count": 25,
- "watchers_count": 25,
+ "stargazers_count": 26,
+ "watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -9182,7 +9182,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 25,
+ "watchers": 26,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index c09b7f1514..a71a4e649a 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -2098,13 +2098,13 @@
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
- "forks_count": 11,
+ "forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 11,
+ "forks": 12,
"watchers": 79,
"score": 0,
"subscribers_count": 3
diff --git a/2022/CVE-2022-41040.json b/2022/CVE-2022-41040.json
index 56a24fc049..72150d3de0 100644
--- a/2022/CVE-2022-41040.json
+++ b/2022/CVE-2022-41040.json
@@ -73,10 +73,10 @@
"description": "mitigation script for MS Exchange server vuln",
"fork": false,
"created_at": "2022-10-04T14:07:18Z",
- "updated_at": "2022-10-15T13:47:00Z",
+ "updated_at": "2023-09-24T13:33:47Z",
"pushed_at": "2022-10-04T14:08:30Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-42046.json b/2022/CVE-2022-42046.json
index 60764e92fd..001e370276 100644
--- a/2022/CVE-2022-42046.json
+++ b/2022/CVE-2022-42046.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM",
"fork": false,
"created_at": "2022-08-17T16:45:13Z",
- "updated_at": "2023-09-12T21:36:13Z",
+ "updated_at": "2023-09-24T13:05:23Z",
"pushed_at": "2022-12-24T10:29:08Z",
- "stargazers_count": 157,
- "watchers_count": 157,
+ "stargazers_count": 156,
+ "watchers_count": 156,
"has_discussions": true,
"forks_count": 25,
"allow_forking": true,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 25,
- "watchers": 157,
+ "watchers": 156,
"score": 0,
"subscribers_count": 5
}
diff --git a/2023/CVE-2023-21939.json b/2023/CVE-2023-21939.json
index 09e1a80ee3..da1b6dd940 100644
--- a/2023/CVE-2023-21939.json
+++ b/2023/CVE-2023-21939.json
@@ -18,13 +18,13 @@
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
- "forks_count": 11,
+ "forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 11,
+ "forks": 12,
"watchers": 91,
"score": 0,
"subscribers_count": 0
diff --git a/2023/CVE-2023-28244.json b/2023/CVE-2023-28244.json
index df3b41bb6d..a5f3a15d8b 100644
--- a/2023/CVE-2023-28244.json
+++ b/2023/CVE-2023-28244.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-05-31T16:43:34Z",
- "updated_at": "2023-05-31T18:02:25Z",
+ "updated_at": "2023-09-24T13:57:04Z",
"pushed_at": "2023-05-31T16:50:31Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-3079.json b/2023/CVE-2023-3079.json
index b00df2144c..af61108218 100644
--- a/2023/CVE-2023-3079.json
+++ b/2023/CVE-2023-3079.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-15T04:16:46Z",
- "updated_at": "2023-09-21T20:03:19Z",
+ "updated_at": "2023-09-24T15:17:04Z",
"pushed_at": "2023-08-17T11:43:26Z",
- "stargazers_count": 85,
- "watchers_count": 85,
+ "stargazers_count": 86,
+ "watchers_count": 86,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
- "watchers": 85,
+ "watchers": 86,
"score": 0,
"subscribers_count": 4
}
diff --git a/2023/CVE-2023-30845.json b/2023/CVE-2023-30845.json
index 2ddf931ac0..f3092d3309 100644
--- a/2023/CVE-2023-30845.json
+++ b/2023/CVE-2023-30845.json
@@ -13,10 +13,10 @@
"description": "Explore CVE 2023-30845 de forma automática em vários subdomínos",
"fork": false,
"created_at": "2023-09-22T01:14:20Z",
- "updated_at": "2023-09-22T01:27:23Z",
+ "updated_at": "2023-09-24T12:29:05Z",
"pushed_at": "2023-09-22T01:48:19Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-35885.json b/2023/CVE-2023-35885.json
index 804422e04c..2377d9b6ce 100644
--- a/2023/CVE-2023-35885.json
+++ b/2023/CVE-2023-35885.json
@@ -18,13 +18,13 @@
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
- "forks_count": 14,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 14,
+ "forks": 15,
"watchers": 50,
"score": 0,
"subscribers_count": 2
diff --git a/2023/CVE-2023-36844.json b/2023/CVE-2023-36844.json
index 9a1d51de70..e9bacbf418 100644
--- a/2023/CVE-2023-36844.json
+++ b/2023/CVE-2023-36844.json
@@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 695867852,
+ "name": "CVE-2023-36844_Juniper_RCE",
+ "full_name": "r3dcl1ff\/CVE-2023-36844_Juniper_RCE",
+ "owner": {
+ "login": "r3dcl1ff",
+ "id": 81900341,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81900341?v=4",
+ "html_url": "https:\/\/github.com\/r3dcl1ff"
+ },
+ "html_url": "https:\/\/github.com\/r3dcl1ff\/CVE-2023-36844_Juniper_RCE",
+ "description": "A Proof of Concept for chaining the CVEs [CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847] to achieve Remote Code Execution (phpinfo) in Juniper JunOS within SRX and EX Series products.Modified from original exploit developed by @watchTowr .",
+ "fork": false,
+ "created_at": "2023-09-24T13:30:09Z",
+ "updated_at": "2023-09-24T13:33:43Z",
+ "pushed_at": "2023-09-24T13:36:08Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-38146.json b/2023/CVE-2023-38146.json
index 20999eb97c..b0af43d924 100644
--- a/2023/CVE-2023-38146.json
+++ b/2023/CVE-2023-38146.json
@@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")",
"fork": false,
"created_at": "2023-09-13T04:00:14Z",
- "updated_at": "2023-09-22T01:05:14Z",
+ "updated_at": "2023-09-24T15:24:52Z",
"pushed_at": "2023-09-13T04:50:29Z",
- "stargazers_count": 116,
- "watchers_count": 116,
+ "stargazers_count": 117,
+ "watchers_count": 117,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 116,
+ "watchers": 117,
"score": 0,
"subscribers_count": 3
}
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index eea770e49e..556a7118ec 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
- "updated_at": "2023-09-24T08:05:51Z",
+ "updated_at": "2023-09-24T15:23:13Z",
"pushed_at": "2023-09-17T02:17:52Z",
- "stargazers_count": 643,
- "watchers_count": 643,
+ "stargazers_count": 644,
+ "watchers_count": 644,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 116,
- "watchers": 643,
+ "watchers": 644,
"score": 0,
"subscribers_count": 8
},
@@ -112,13 +112,13 @@
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
- "forks_count": 17,
+ "forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 17,
+ "forks": 18,
"watchers": 91,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json
index f626ded08f..f5b2ab9f5a 100644
--- a/2023/CVE-2023-4863.json
+++ b/2023/CVE-2023-4863.json
@@ -43,19 +43,19 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
- "updated_at": "2023-09-24T12:19:28Z",
+ "updated_at": "2023-09-24T17:45:26Z",
"pushed_at": "2023-09-22T04:31:47Z",
- "stargazers_count": 77,
- "watchers_count": 77,
+ "stargazers_count": 83,
+ "watchers_count": 83,
"has_discussions": false,
- "forks_count": 6,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 6,
- "watchers": 77,
+ "forks": 7,
+ "watchers": 83,
"score": 0,
"subscribers_count": 5
}
diff --git a/README.md b/README.md
index c66868588e..5123f5631b 100644
--- a/README.md
+++ b/README.md
@@ -2992,6 +2992,7 @@
- [watchtowrlabs/juniper-rce_cve-2023-36844](https://github.com/watchtowrlabs/juniper-rce_cve-2023-36844)
- [Pari-Malam/CVE-2023-36844](https://github.com/Pari-Malam/CVE-2023-36844)
+- [r3dcl1ff/CVE-2023-36844_Juniper_RCE](https://github.com/r3dcl1ff/CVE-2023-36844_Juniper_RCE)
### CVE-2023-36845 (2023-08-17)
@@ -10279,22 +10280,12 @@
- [cube0x0/CVE-2021-1675](https://github.com/cube0x0/CVE-2021-1675)
- [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675)
- [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675)
-- [evilashz/CVE-2021-1675-LPE-EXP](https://github.com/evilashz/CVE-2021-1675-LPE-EXP)
-- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE)
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
- [cybersecurityworks553/CVE-2021-1675_PrintNightMare](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare)
- [tanarchytan/CVE-2021-1675](https://github.com/tanarchytan/CVE-2021-1675)
- [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675)
- [Leonidus0x10/CVE-2021-1675-SCANNER](https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER)
-- [thomasgeens/CVE-2021-1675](https://github.com/thomasgeens/CVE-2021-1675)
-- [mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery](https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery)
-- [killtr0/CVE-2021-1675-PrintNightmare](https://github.com/killtr0/CVE-2021-1675-PrintNightmare)
- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
-- [kougyokugentou/CVE-2021-1675](https://github.com/kougyokugentou/CVE-2021-1675)
-- [ptter23/CVE-2021-1675](https://github.com/ptter23/CVE-2021-1675)
-- [initconf/cve-2021-1675-printnightmare](https://github.com/initconf/cve-2021-1675-printnightmare)
-- [ozergoker/PrintNightmare](https://github.com/ozergoker/PrintNightmare)
-- [exploitblizzard/PrintNightmare-CVE-2021-1675](https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675)
- [edsonjt81/CVE-2021-1675](https://github.com/edsonjt81/CVE-2021-1675)
- [sailay1996/PrintNightmare-LPE](https://github.com/sailay1996/PrintNightmare-LPE)
- [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare)
@@ -10667,13 +10658,6 @@
- [rafaelchriss/CVE-2021-3279](https://github.com/rafaelchriss/CVE-2021-3279)
-### CVE-2021-3281 (2021-02-02)
-
-In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
-
-
-- [lwzSoviet/CVE-2021-3281](https://github.com/lwzSoviet/CVE-2021-3281)
-
### CVE-2021-3291 (2021-01-26)
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
@@ -12459,7 +12443,6 @@
- [kahla-sec/CVE-2021-27850_POC](https://github.com/kahla-sec/CVE-2021-27850_POC)
- [dorkerdevil/CVE-2021-27850_POC](https://github.com/dorkerdevil/CVE-2021-27850_POC)
-- [Ovi3/CVE_2021_27850_POC](https://github.com/Ovi3/CVE_2021_27850_POC)
- [novysodope/CVE-2021-27850](https://github.com/novysodope/CVE-2021-27850)
### CVE-2021-27890 (2021-03-15)
@@ -12862,7 +12845,6 @@
- [zecopro/CVE-2021-31166](https://github.com/zecopro/CVE-2021-31166)
- [bgsilvait/WIn-CVE-2021-31166](https://github.com/bgsilvait/WIn-CVE-2021-31166)
- [Udyz/CVE-2021-31166](https://github.com/Udyz/CVE-2021-31166)
-- [y0g3sh-99/CVE-2021-31166-Exploit](https://github.com/y0g3sh-99/CVE-2021-31166-Exploit)
- [antx-code/CVE-2021-31166](https://github.com/antx-code/CVE-2021-31166)
- [imikoYa/CVE-2021-31166-exploit](https://github.com/imikoYa/CVE-2021-31166-exploit)
- [mauricelambert/CVE-2021-31166](https://github.com/mauricelambert/CVE-2021-31166)
@@ -13251,7 +13233,6 @@
- [lixiang957/CVE-2021-33959](https://github.com/lixiang957/CVE-2021-33959)
### CVE-2021-34045
-- [Al1ex/CVE-2021-34045](https://github.com/Al1ex/CVE-2021-34045)
- [kenuosec/CVE-2021-34045](https://github.com/kenuosec/CVE-2021-34045)
### CVE-2021-34371 (2021-08-05)
@@ -13324,11 +13305,8 @@
Windows Print Spooler Remote Code Execution Vulnerability
-- [DenizSe/CVE-2021-34527](https://github.com/DenizSe/CVE-2021-34527)
- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare)
-- [JohnHammond/CVE-2021-34527](https://github.com/JohnHammond/CVE-2021-34527)
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
-- [CnOxx1/CVE-2021-34527-1675](https://github.com/CnOxx1/CVE-2021-34527-1675)
- [rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint](https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint)
- [geekbrett/CVE-2021-34527-PrintNightmare-Workaround](https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround)
- [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream)
@@ -24371,7 +24349,6 @@
- [zhzyker/exphub](https://github.com/zhzyker/exphub)
- [Ma1Dong/Solr_CVE-2019-17558](https://github.com/Ma1Dong/Solr_CVE-2019-17558)
- [xkyrage/Exploit_CVE-2019-17558-RCE](https://github.com/xkyrage/Exploit_CVE-2019-17558-RCE)
-- [narrowinxt/CVE-2019-17558](https://github.com/narrowinxt/CVE-2019-17558)
### CVE-2019-17564 (2020-04-01)
@@ -26609,6 +26586,7 @@
- [hoaan1995/CVE-2018-9995](https://github.com/hoaan1995/CVE-2018-9995)
- [ST0PL/DVRFaultNET](https://github.com/ST0PL/DVRFaultNET)
- [K3ysTr0K3R/CVE-2018-9995-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2018-9995-EXPLOIT)
+- [Pab450/CVE-2018-9995](https://github.com/Pab450/CVE-2018-9995)
### CVE-2018-10118 (2018-04-15)
@@ -35193,13 +35171,6 @@
## 2000
-### CVE-2000-0170 (2000-04-10)
-
-Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
-
-
-- [mike182/exploit](https://github.com/mike182/exploit)
-
### CVE-2000-0649 (2000-08-03)
IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined.