diff --git a/2000/CVE-2000-0170.json b/2000/CVE-2000-0170.json deleted file mode 100644 index e776938f29..0000000000 --- a/2000/CVE-2000-0170.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 26364485, - "name": "exploit", - "full_name": "mike182\/exploit", - "owner": { - "login": "mike182", - "id": 509504, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/509504?v=4", - "html_url": "https:\/\/github.com\/mike182" - }, - "html_url": "https:\/\/github.com\/mike182\/exploit", - "description": "CVE-2000-0170", - "fork": false, - "created_at": "2014-11-08T15:21:30Z", - "updated_at": "2023-09-16T20:51:37Z", - "pushed_at": "2014-11-08T15:25:37Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 3 - } -] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 1efd212e90..daba185365 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-21T17:59:34Z", + "updated_at": "2023-09-24T17:18:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1784, - "watchers_count": 1784, + "stargazers_count": 1785, + "watchers_count": 1785, "has_discussions": false, "forks_count": 334, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 334, - "watchers": 1784, + "watchers": 1785, "score": 0, "subscribers_count": 34 }, diff --git a/2014/CVE-2014-7169.json b/2014/CVE-2014-7169.json index 8f54074938..b7911f537c 100644 --- a/2014/CVE-2014-7169.json +++ b/2014/CVE-2014-7169.json @@ -57,7 +57,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 10 + "subscribers_count": 9 }, { "id": 517399645, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index f3904deb82..edaafd4b33 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-21T17:59:34Z", + "updated_at": "2023-09-24T17:18:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1784, - "watchers_count": 1784, + "stargazers_count": 1785, + "watchers_count": 1785, "has_discussions": false, "forks_count": 334, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 334, - "watchers": 1784, + "watchers": 1785, "score": 0, "subscribers_count": 34 }, diff --git a/2017/CVE-2017-16651.json b/2017/CVE-2017-16651.json index 79cd45283f..af3146e7a6 100644 --- a/2017/CVE-2017-16651.json +++ b/2017/CVE-2017-16651.json @@ -13,10 +13,10 @@ "description": "Python implementation of Roundcube LFI (CVE-2017-16651)", "fork": false, "created_at": "2021-01-06T01:46:39Z", - "updated_at": "2022-12-18T15:55:36Z", + "updated_at": "2023-09-24T16:23:48Z", "pushed_at": "2021-01-06T01:47:39Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 2 } diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 9eba4e8a3d..9119dd3867 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-21T17:59:34Z", + "updated_at": "2023-09-24T17:18:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1784, - "watchers_count": 1784, + "stargazers_count": 1785, + "watchers_count": 1785, "has_discussions": false, "forks_count": 334, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 334, - "watchers": 1784, + "watchers": 1785, "score": 0, "subscribers_count": 34 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index d385c7747b..b5aad5b698 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -587,10 +587,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-21T17:59:34Z", + "updated_at": "2023-09-24T17:18:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1784, - "watchers_count": 1784, + "stargazers_count": 1785, + "watchers_count": 1785, "has_discussions": false, "forks_count": 334, "allow_forking": true, @@ -620,7 +620,7 @@ ], "visibility": "public", "forks": 334, - "watchers": 1784, + "watchers": 1785, "score": 0, "subscribers_count": 34 }, diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index 5e7528f379..74f514d69c 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -637,5 +637,35 @@ "watchers": 3, "score": 0, "subscribers_count": 1 + }, + { + "id": 695936317, + "name": "CVE-2018-9995", + "full_name": "Pab450\/CVE-2018-9995", + "owner": { + "login": "Pab450", + "id": 16840900, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16840900?v=4", + "html_url": "https:\/\/github.com\/Pab450" + }, + "html_url": "https:\/\/github.com\/Pab450\/CVE-2018-9995", + "description": "CVE-2018-9995 Exploit Tool for Python3", + "fork": false, + "created_at": "2023-09-24T17:00:37Z", + "updated_at": "2023-09-24T17:03:32Z", + "pushed_at": "2023-09-24T17:11:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index f3a8f18c22..364c3adc88 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -138,35 +138,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 649585140, - "name": "CVE-2019-17558", - "full_name": "narrowinxt\/CVE-2019-17558", - "owner": { - "login": "narrowinxt", - "id": 135184409, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135184409?v=4", - "html_url": "https:\/\/github.com\/narrowinxt" - }, - "html_url": "https:\/\/github.com\/narrowinxt\/CVE-2019-17558", - "description": null, - "fork": false, - "created_at": "2023-06-05T07:47:01Z", - "updated_at": "2023-06-21T06:10:17Z", - "pushed_at": "2023-06-16T09:26:56Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 73de8e4f9b..46bf953d4b 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-21T17:59:34Z", + "updated_at": "2023-09-24T17:18:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1784, - "watchers_count": 1784, + "stargazers_count": 1785, + "watchers_count": 1785, "has_discussions": false, "forks_count": 334, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 334, - "watchers": 1784, + "watchers": 1785, "score": 0, "subscribers_count": 34 } diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json index 66baff296d..71c65034bc 100644 --- a/2020/CVE-2020-0069.json +++ b/2020/CVE-2020-0069.json @@ -142,10 +142,10 @@ "description": "CVE-2020-0069", "fork": false, "created_at": "2023-09-04T17:52:04Z", - "updated_at": "2023-09-24T00:50:03Z", + "updated_at": "2023-09-24T17:58:57Z", "pushed_at": "2023-09-04T17:53:01Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -154,7 +154,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 1c80fdb510..402ec2bf4a 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -103,10 +103,10 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2023-09-21T15:27:45Z", + "updated_at": "2023-09-24T16:07:40Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 1078, - "watchers_count": 1078, + "stargazers_count": 1079, + "watchers_count": 1079, "has_discussions": false, "forks_count": 282, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 282, - "watchers": 1078, + "watchers": 1079, "score": 0, "subscribers_count": 35 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 324ec6f339..dffaae6532 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-09-21T17:59:34Z", + "updated_at": "2023-09-24T17:18:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1784, - "watchers_count": 1784, + "stargazers_count": 1785, + "watchers_count": 1785, "has_discussions": false, "forks_count": 334, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 334, - "watchers": 1784, + "watchers": 1785, "score": 0, "subscribers_count": 34 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index e876ea9ee4..3fc546614f 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -119,84 +119,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 381971547, - "name": "CVE-2021-1675-LPE-EXP", - "full_name": "evilashz\/CVE-2021-1675-LPE-EXP", - "owner": { - "login": "evilashz", - "id": 50722929, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4", - "html_url": "https:\/\/github.com\/evilashz" - }, - "html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP", - "description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527", - "fork": false, - "created_at": "2021-07-01T09:00:31Z", - "updated_at": "2023-09-16T21:45:34Z", - "pushed_at": "2021-07-02T10:47:36Z", - "stargazers_count": 55, - "watchers_count": 55, - "has_discussions": false, - "forks_count": 21, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-1675", - "cve-2021-34527", - "hacktool", - "lpe", - "printnightmare", - "redteam", - "redteam-tools", - "windows" - ], - "visibility": "public", - "forks": 21, - "watchers": 55, - "score": 0, - "subscribers_count": 3 - }, - { - "id": 381984439, - "name": "CVE-2021-1675-LPE", - "full_name": "hlldz\/CVE-2021-1675-LPE", - "owner": { - "login": "hlldz", - "id": 16455559, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4", - "html_url": "https:\/\/github.com\/hlldz" - }, - "html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE", - "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527", - "fork": false, - "created_at": "2021-07-01T09:47:13Z", - "updated_at": "2023-09-18T19:54:59Z", - "pushed_at": "2021-07-05T06:46:12Z", - "stargazers_count": 332, - "watchers_count": 332, - "has_discussions": false, - "forks_count": 80, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cobaltstrike", - "cve-2021-1675", - "cve-2021-34527", - "exploit", - "lpe", - "printnightmare", - "reflectivedll", - "windows" - ], - "visibility": "public", - "forks": 80, - "watchers": 332, - "score": 0, - "subscribers_count": 14 - }, { "id": 382024474, "name": "CVE-2021-1675", @@ -353,96 +275,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 382249207, - "name": "CVE-2021-1675", - "full_name": "thomasgeens\/CVE-2021-1675", - "owner": { - "login": "thomasgeens", - "id": 2236721, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4", - "html_url": "https:\/\/github.com\/thomasgeens" - }, - "html_url": "https:\/\/github.com\/thomasgeens\/CVE-2021-1675", - "description": null, - "fork": false, - "created_at": "2021-07-02T06:14:29Z", - "updated_at": "2023-09-16T21:45:36Z", - "pushed_at": "2021-07-02T06:14:39Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 382266932, - "name": "CVE-2021-1675_CarbonBlack_HuntingQuery", - "full_name": "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery", - "owner": { - "login": "mrezqi", - "id": 2455832, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4", - "html_url": "https:\/\/github.com\/mrezqi" - }, - "html_url": "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery", - "description": null, - "fork": false, - "created_at": "2021-07-02T07:30:24Z", - "updated_at": "2023-09-16T21:45:36Z", - "pushed_at": "2021-07-02T08:01:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 382399375, - "name": "CVE-2021-1675-PrintNightmare", - "full_name": "killtr0\/CVE-2021-1675-PrintNightmare", - "owner": { - "login": "killtr0", - "id": 22793707, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4", - "html_url": "https:\/\/github.com\/killtr0" - }, - "html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare", - "description": null, - "fork": false, - "created_at": "2021-07-02T16:12:15Z", - "updated_at": "2023-09-16T21:45:37Z", - "pushed_at": "2021-07-02T16:12:59Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, { "id": 382407157, "name": "CVE-2021-1675", @@ -473,156 +305,6 @@ "score": 0, "subscribers_count": 6 }, - { - "id": 382418030, - "name": "CVE-2021-1675", - "full_name": "kougyokugentou\/CVE-2021-1675", - "owner": { - "login": "kougyokugentou", - "id": 41278462, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4", - "html_url": "https:\/\/github.com\/kougyokugentou" - }, - "html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675", - "description": "A small powershell script to disable print spooler service using desired state configuration", - "fork": false, - "created_at": "2021-07-02T17:29:04Z", - "updated_at": "2021-12-22T20:12:23Z", - "pushed_at": "2021-07-02T17:40:09Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 382425733, - "name": "CVE-2021-1675", - "full_name": "ptter23\/CVE-2021-1675", - "owner": { - "login": "ptter23", - "id": 55167410, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4", - "html_url": "https:\/\/github.com\/ptter23" - }, - "html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675", - "description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS", - "fork": false, - "created_at": "2021-07-02T18:01:21Z", - "updated_at": "2023-09-16T21:45:37Z", - "pushed_at": "2021-07-02T18:07:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 382496518, - "name": "cve-2021-1675-printnightmare", - "full_name": "initconf\/cve-2021-1675-printnightmare", - "owner": { - "login": "initconf", - "id": 4044729, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4", - "html_url": "https:\/\/github.com\/initconf" - }, - "html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare", - "description": "to catch cve-2021-1675-printnightmare", - "fork": false, - "created_at": "2021-07-03T01:04:06Z", - "updated_at": "2023-09-16T21:45:37Z", - "pushed_at": "2021-07-03T01:08:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, - { - "id": 382609559, - "name": "PrintNightmare", - "full_name": "ozergoker\/PrintNightmare", - "owner": { - "login": "ozergoker", - "id": 86879266, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4", - "html_url": "https:\/\/github.com\/ozergoker" - }, - "html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare", - "description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)", - "fork": false, - "created_at": "2021-07-03T12:25:21Z", - "updated_at": "2023-09-16T21:45:38Z", - "pushed_at": "2021-07-03T12:43:26Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, - { - "id": 382815972, - "name": "PrintNightmare-CVE-2021-1675", - "full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675", - "owner": { - "login": "exploitblizzard", - "id": 61627070, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4", - "html_url": "https:\/\/github.com\/exploitblizzard" - }, - "html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675", - "description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ", - "fork": false, - "created_at": "2021-07-04T09:50:39Z", - "updated_at": "2023-09-16T21:45:39Z", - "pushed_at": "2021-07-04T09:57:46Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 6, - "score": 0, - "subscribers_count": 1 - }, { "id": 383128850, "name": "CVE-2021-1675", diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 8218a6e943..7b244015f1 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -90,10 +90,10 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2023-09-24T11:09:57Z", + "updated_at": "2023-09-24T13:26:21Z", "pushed_at": "2023-06-08T04:01:33Z", - "stargazers_count": 456, - "watchers_count": 456, + "stargazers_count": 455, + "watchers_count": 455, "has_discussions": false, "forks_count": 151, "allow_forking": true, @@ -104,7 +104,7 @@ ], "visibility": "public", "forks": 151, - "watchers": 456, + "watchers": 455, "score": 0, "subscribers_count": 8 }, diff --git a/2021/CVE-2021-27850.json b/2021/CVE-2021-27850.json index 257cd37e84..b3b592c4ed 100644 --- a/2021/CVE-2021-27850.json +++ b/2021/CVE-2021-27850.json @@ -59,36 +59,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 382309693, - "name": "CVE_2021_27850_POC", - "full_name": "Ovi3\/CVE_2021_27850_POC", - "owner": { - "login": "Ovi3", - "id": 29408109, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29408109?v=4", - "html_url": "https:\/\/github.com\/Ovi3" - }, - "html_url": "https:\/\/github.com\/Ovi3\/CVE_2021_27850_POC", - "description": "Apache Tapestry CVE-2021-27850 PoC", - "fork": false, - "created_at": "2021-07-02T10:21:58Z", - "updated_at": "2022-11-09T18:12:48Z", - "pushed_at": "2021-07-02T10:22:46Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, { "id": 511347007, "name": "CVE-2021-27850", diff --git a/2021/CVE-2021-30481.json b/2021/CVE-2021-30481.json index b94ec9ec3a..4a8aa15962 100644 --- a/2021/CVE-2021-30481.json +++ b/2021/CVE-2021-30481.json @@ -13,10 +13,10 @@ "description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481", "fork": false, "created_at": "2021-04-17T01:29:31Z", - "updated_at": "2023-07-02T13:15:50Z", + "updated_at": "2023-09-24T13:30:32Z", "pushed_at": "2021-04-20T16:00:46Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 55, + "watchers": 54, "score": 0, "subscribers_count": 3 } diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 2e2de2cb5c..b82b1a4988 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -218,48 +218,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 382641118, - "name": "CVE-2021-31166-Exploit", - "full_name": "y0g3sh-99\/CVE-2021-31166-Exploit", - "owner": { - "login": "y0g3sh-99", - "id": 59962466, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59962466?v=4", - "html_url": "https:\/\/github.com\/y0g3sh-99" - }, - "html_url": "https:\/\/github.com\/y0g3sh-99\/CVE-2021-31166-Exploit", - "description": "Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)", - "fork": false, - "created_at": "2021-07-03T14:54:59Z", - "updated_at": "2022-01-18T13:29:37Z", - "pushed_at": "2021-07-03T15:27:28Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "accept-encoding", - "cve-2021-31166", - "dos", - "exploit", - "http", - "kernel", - "python3", - "rce", - "request-header", - "vulnerability", - "windows" - ], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0, - "subscribers_count": 1 - }, { "id": 410758909, "name": "CVE-2021-31166", diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index b4561ba0da..51ecae4e6d 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1074,10 +1074,10 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2023-09-24T11:09:48Z", + "updated_at": "2023-09-24T15:00:15Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 665, - "watchers_count": 665, + "stargazers_count": 666, + "watchers_count": 666, "has_discussions": false, "forks_count": 165, "allow_forking": true, @@ -1086,7 +1086,7 @@ "topics": [], "visibility": "public", "forks": 165, - "watchers": 665, + "watchers": 666, "score": 0, "subscribers_count": 11 }, diff --git a/2021/CVE-2021-3281.json b/2021/CVE-2021-3281.json deleted file mode 100644 index 3dd2a38810..0000000000 --- a/2021/CVE-2021-3281.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 383067956, - "name": "CVE-2021-3281", - "full_name": "lwzSoviet\/CVE-2021-3281", - "owner": { - "login": "lwzSoviet", - "id": 30397594, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30397594?v=4", - "html_url": "https:\/\/github.com\/lwzSoviet" - }, - "html_url": "https:\/\/github.com\/lwzSoviet\/CVE-2021-3281", - "description": null, - "fork": false, - "created_at": "2021-07-05T08:25:26Z", - "updated_at": "2022-01-31T11:44:07Z", - "pushed_at": "2021-07-05T08:47:14Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-34045.json b/2021/CVE-2021-34045.json index 6ede90f920..2026bb2e2e 100644 --- a/2021/CVE-2021-34045.json +++ b/2021/CVE-2021-34045.json @@ -1,34 +1,4 @@ [ - { - "id": 381879818, - "name": "CVE-2021-34045", - "full_name": "Al1ex\/CVE-2021-34045", - "owner": { - "login": "Al1ex", - "id": 38161463, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", - "html_url": "https:\/\/github.com\/Al1ex" - }, - "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-34045", - "description": "Novel-plus-install-v3.5.3-Druid Unauthorized access", - "fork": false, - "created_at": "2021-07-01T01:52:49Z", - "updated_at": "2023-09-16T21:45:34Z", - "pushed_at": "2021-07-01T02:07:39Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0, - "subscribers_count": 1 - }, { "id": 438706438, "name": "CVE-2021-34045", diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json index 82d5397934..452a858836 100644 --- a/2021/CVE-2021-34473.json +++ b/2021/CVE-2021-34473.json @@ -103,10 +103,10 @@ "description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207", "fork": false, "created_at": "2021-09-04T15:34:03Z", - "updated_at": "2023-09-17T23:06:27Z", + "updated_at": "2023-09-24T12:44:16Z", "pushed_at": "2023-08-25T22:42:24Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 87, + "watchers": 88, "score": 0, "subscribers_count": 3 }, @@ -193,10 +193,10 @@ "description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability", "fork": false, "created_at": "2022-06-29T12:37:31Z", - "updated_at": "2023-08-02T21:24:20Z", + "updated_at": "2023-09-24T12:44:12Z", "pushed_at": "2022-06-30T08:36:58Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -205,7 +205,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index b1e2fd4073..cc45b14003 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -1,40 +1,4 @@ [ - { - "id": 382021281, - "name": "CVE-2021-34527", - "full_name": "DenizSe\/CVE-2021-34527", - "owner": { - "login": "DenizSe", - "id": 43039427, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4", - "html_url": "https:\/\/github.com\/DenizSe" - }, - "html_url": "https:\/\/github.com\/DenizSe\/CVE-2021-34527", - "description": "Small Powershell Script to detect Running Printer Spoolers on Domain Controller", - "fork": false, - "created_at": "2021-07-01T12:12:16Z", - "updated_at": "2021-07-02T07:49:06Z", - "pushed_at": "2021-07-02T07:45:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-1675", - "cve-2021-34527", - "domaincontroller", - "printnightmare", - "printspooler" - ], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 382267064, "name": "PrintNightmare", @@ -65,36 +29,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 382335385, - "name": "CVE-2021-34527", - "full_name": "JohnHammond\/CVE-2021-34527", - "owner": { - "login": "JohnHammond", - "id": 6288722, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4", - "html_url": "https:\/\/github.com\/JohnHammond" - }, - "html_url": "https:\/\/github.com\/JohnHammond\/CVE-2021-34527", - "description": null, - "fork": false, - "created_at": "2021-07-02T12:10:49Z", - "updated_at": "2023-09-16T21:45:36Z", - "pushed_at": "2021-07-02T12:17:50Z", - "stargazers_count": 212, - "watchers_count": 212, - "has_discussions": false, - "forks_count": 61, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 61, - "watchers": 212, - "score": 0, - "subscribers_count": 9 - }, { "id": 382645654, "name": "PrintNightmare-CVE-2021-34527", @@ -132,36 +66,6 @@ "score": 0, "subscribers_count": 8 }, - { - "id": 382894525, - "name": "CVE-2021-34527-1675", - "full_name": "CnOxx1\/CVE-2021-34527-1675", - "owner": { - "login": "CnOxx1", - "id": 86923954, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4", - "html_url": "https:\/\/github.com\/CnOxx1" - }, - "html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675", - "description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!", - "fork": false, - "created_at": "2021-07-04T16:09:18Z", - "updated_at": "2021-09-06T06:08:09Z", - "pushed_at": "2021-07-04T16:31:21Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": true, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 6, - "score": 0, - "subscribers_count": 2 - }, { "id": 383207766, "name": "disable-RegisterSpoolerRemoteRpcEndPoint", diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index f496800fa5..f35ab726e7 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -197,10 +197,10 @@ "description": "Using CVE-2021-40449 to manual map kernel mode driver", "fork": false, "created_at": "2022-03-04T17:55:52Z", - "updated_at": "2023-09-23T04:15:19Z", + "updated_at": "2023-09-24T13:15:03Z", "pushed_at": "2022-03-05T18:34:25Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 82, + "watchers_count": 82, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -209,7 +209,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 83, + "watchers": 82, "score": 0, "subscribers_count": 3 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 4680a44699..50b4a7762c 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -2172,10 +2172,10 @@ "description": "Apache Log4j2 CVE-2021-44228 RCE Demo with RMI and LDAP", "fork": false, "created_at": "2021-12-12T03:11:14Z", - "updated_at": "2023-09-16T21:49:38Z", + "updated_at": "2023-09-24T13:33:19Z", "pushed_at": "2021-12-12T03:22:59Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -2189,7 +2189,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 3 }, @@ -2489,10 +2489,10 @@ "description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ", "fork": false, "created_at": "2021-12-12T11:26:42Z", - "updated_at": "2023-09-08T18:29:29Z", + "updated_at": "2023-09-24T13:17:31Z", "pushed_at": "2021-12-12T17:37:11Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -2509,7 +2509,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 66, + "watchers": 65, "score": 0, "subscribers_count": 1 }, @@ -9170,10 +9170,10 @@ "description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.", "fork": false, "created_at": "2021-12-20T15:22:50Z", - "updated_at": "2023-09-18T00:13:11Z", + "updated_at": "2023-09-24T17:05:34Z", "pushed_at": "2022-12-30T12:32:05Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -9182,7 +9182,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index c09b7f1514..a71a4e649a 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -2098,13 +2098,13 @@ "stargazers_count": 79, "watchers_count": 79, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 79, "score": 0, "subscribers_count": 3 diff --git a/2022/CVE-2022-41040.json b/2022/CVE-2022-41040.json index 56a24fc049..72150d3de0 100644 --- a/2022/CVE-2022-41040.json +++ b/2022/CVE-2022-41040.json @@ -73,10 +73,10 @@ "description": "mitigation script for MS Exchange server vuln", "fork": false, "created_at": "2022-10-04T14:07:18Z", - "updated_at": "2022-10-15T13:47:00Z", + "updated_at": "2023-09-24T13:33:47Z", "pushed_at": "2022-10-04T14:08:30Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-42046.json b/2022/CVE-2022-42046.json index 60764e92fd..001e370276 100644 --- a/2022/CVE-2022-42046.json +++ b/2022/CVE-2022-42046.json @@ -13,10 +13,10 @@ "description": "CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM", "fork": false, "created_at": "2022-08-17T16:45:13Z", - "updated_at": "2023-09-12T21:36:13Z", + "updated_at": "2023-09-24T13:05:23Z", "pushed_at": "2022-12-24T10:29:08Z", - "stargazers_count": 157, - "watchers_count": 157, + "stargazers_count": 156, + "watchers_count": 156, "has_discussions": true, "forks_count": 25, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 25, - "watchers": 157, + "watchers": 156, "score": 0, "subscribers_count": 5 } diff --git a/2023/CVE-2023-21939.json b/2023/CVE-2023-21939.json index 09e1a80ee3..da1b6dd940 100644 --- a/2023/CVE-2023-21939.json +++ b/2023/CVE-2023-21939.json @@ -18,13 +18,13 @@ "stargazers_count": 91, "watchers_count": 91, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 91, "score": 0, "subscribers_count": 0 diff --git a/2023/CVE-2023-28244.json b/2023/CVE-2023-28244.json index df3b41bb6d..a5f3a15d8b 100644 --- a/2023/CVE-2023-28244.json +++ b/2023/CVE-2023-28244.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-05-31T16:43:34Z", - "updated_at": "2023-05-31T18:02:25Z", + "updated_at": "2023-09-24T13:57:04Z", "pushed_at": "2023-05-31T16:50:31Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-3079.json b/2023/CVE-2023-3079.json index b00df2144c..af61108218 100644 --- a/2023/CVE-2023-3079.json +++ b/2023/CVE-2023-3079.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-08-15T04:16:46Z", - "updated_at": "2023-09-21T20:03:19Z", + "updated_at": "2023-09-24T15:17:04Z", "pushed_at": "2023-08-17T11:43:26Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 85, + "watchers": 86, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-30845.json b/2023/CVE-2023-30845.json index 2ddf931ac0..f3092d3309 100644 --- a/2023/CVE-2023-30845.json +++ b/2023/CVE-2023-30845.json @@ -13,10 +13,10 @@ "description": "Explore CVE 2023-30845 de forma automática em vários subdomínos", "fork": false, "created_at": "2023-09-22T01:14:20Z", - "updated_at": "2023-09-22T01:27:23Z", + "updated_at": "2023-09-24T12:29:05Z", "pushed_at": "2023-09-22T01:48:19Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-35885.json b/2023/CVE-2023-35885.json index 804422e04c..2377d9b6ce 100644 --- a/2023/CVE-2023-35885.json +++ b/2023/CVE-2023-35885.json @@ -18,13 +18,13 @@ "stargazers_count": 50, "watchers_count": 50, "has_discussions": false, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, + "forks": 15, "watchers": 50, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-36844.json b/2023/CVE-2023-36844.json index 9a1d51de70..e9bacbf418 100644 --- a/2023/CVE-2023-36844.json +++ b/2023/CVE-2023-36844.json @@ -58,5 +58,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 695867852, + "name": "CVE-2023-36844_Juniper_RCE", + "full_name": "r3dcl1ff\/CVE-2023-36844_Juniper_RCE", + "owner": { + "login": "r3dcl1ff", + "id": 81900341, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81900341?v=4", + "html_url": "https:\/\/github.com\/r3dcl1ff" + }, + "html_url": "https:\/\/github.com\/r3dcl1ff\/CVE-2023-36844_Juniper_RCE", + "description": "A Proof of Concept for chaining the CVEs [CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847] to achieve Remote Code Execution (phpinfo) in Juniper JunOS within SRX and EX Series products.Modified from original exploit developed by @watchTowr .", + "fork": false, + "created_at": "2023-09-24T13:30:09Z", + "updated_at": "2023-09-24T13:33:43Z", + "pushed_at": "2023-09-24T13:36:08Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38146.json b/2023/CVE-2023-38146.json index 20999eb97c..b0af43d924 100644 --- a/2023/CVE-2023-38146.json +++ b/2023/CVE-2023-38146.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")", "fork": false, "created_at": "2023-09-13T04:00:14Z", - "updated_at": "2023-09-22T01:05:14Z", + "updated_at": "2023-09-24T15:24:52Z", "pushed_at": "2023-09-13T04:50:29Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 116, + "watchers": 117, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index eea770e49e..556a7118ec 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -43,10 +43,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2023-09-24T08:05:51Z", + "updated_at": "2023-09-24T15:23:13Z", "pushed_at": "2023-09-17T02:17:52Z", - "stargazers_count": 643, - "watchers_count": 643, + "stargazers_count": 644, + "watchers_count": 644, "has_discussions": false, "forks_count": 116, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 116, - "watchers": 643, + "watchers": 644, "score": 0, "subscribers_count": 8 }, @@ -112,13 +112,13 @@ "stargazers_count": 91, "watchers_count": 91, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 91, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index f626ded08f..f5b2ab9f5a 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -43,19 +43,19 @@ "description": null, "fork": false, "created_at": "2023-09-21T05:22:51Z", - "updated_at": "2023-09-24T12:19:28Z", + "updated_at": "2023-09-24T17:45:26Z", "pushed_at": "2023-09-22T04:31:47Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, - "watchers": 77, + "forks": 7, + "watchers": 83, "score": 0, "subscribers_count": 5 } diff --git a/README.md b/README.md index c66868588e..5123f5631b 100644 --- a/README.md +++ b/README.md @@ -2992,6 +2992,7 @@ - [watchtowrlabs/juniper-rce_cve-2023-36844](https://github.com/watchtowrlabs/juniper-rce_cve-2023-36844) - [Pari-Malam/CVE-2023-36844](https://github.com/Pari-Malam/CVE-2023-36844) +- [r3dcl1ff/CVE-2023-36844_Juniper_RCE](https://github.com/r3dcl1ff/CVE-2023-36844_Juniper_RCE) ### CVE-2023-36845 (2023-08-17) @@ -10279,22 +10280,12 @@ - [cube0x0/CVE-2021-1675](https://github.com/cube0x0/CVE-2021-1675) - [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675) - [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675) -- [evilashz/CVE-2021-1675-LPE-EXP](https://github.com/evilashz/CVE-2021-1675-LPE-EXP) -- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE) - [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675) - [cybersecurityworks553/CVE-2021-1675_PrintNightMare](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare) - [tanarchytan/CVE-2021-1675](https://github.com/tanarchytan/CVE-2021-1675) - [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675) - [Leonidus0x10/CVE-2021-1675-SCANNER](https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER) -- [thomasgeens/CVE-2021-1675](https://github.com/thomasgeens/CVE-2021-1675) -- [mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery](https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery) -- [killtr0/CVE-2021-1675-PrintNightmare](https://github.com/killtr0/CVE-2021-1675-PrintNightmare) - [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675) -- [kougyokugentou/CVE-2021-1675](https://github.com/kougyokugentou/CVE-2021-1675) -- [ptter23/CVE-2021-1675](https://github.com/ptter23/CVE-2021-1675) -- [initconf/cve-2021-1675-printnightmare](https://github.com/initconf/cve-2021-1675-printnightmare) -- [ozergoker/PrintNightmare](https://github.com/ozergoker/PrintNightmare) -- [exploitblizzard/PrintNightmare-CVE-2021-1675](https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675) - [edsonjt81/CVE-2021-1675](https://github.com/edsonjt81/CVE-2021-1675) - [sailay1996/PrintNightmare-LPE](https://github.com/sailay1996/PrintNightmare-LPE) - [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare) @@ -10667,13 +10658,6 @@ - [rafaelchriss/CVE-2021-3279](https://github.com/rafaelchriss/CVE-2021-3279) -### CVE-2021-3281 (2021-02-02) - -In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. - - -- [lwzSoviet/CVE-2021-3281](https://github.com/lwzSoviet/CVE-2021-3281) - ### CVE-2021-3291 (2021-01-26) Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command. @@ -12459,7 +12443,6 @@ - [kahla-sec/CVE-2021-27850_POC](https://github.com/kahla-sec/CVE-2021-27850_POC) - [dorkerdevil/CVE-2021-27850_POC](https://github.com/dorkerdevil/CVE-2021-27850_POC) -- [Ovi3/CVE_2021_27850_POC](https://github.com/Ovi3/CVE_2021_27850_POC) - [novysodope/CVE-2021-27850](https://github.com/novysodope/CVE-2021-27850) ### CVE-2021-27890 (2021-03-15) @@ -12862,7 +12845,6 @@ - [zecopro/CVE-2021-31166](https://github.com/zecopro/CVE-2021-31166) - [bgsilvait/WIn-CVE-2021-31166](https://github.com/bgsilvait/WIn-CVE-2021-31166) - [Udyz/CVE-2021-31166](https://github.com/Udyz/CVE-2021-31166) -- [y0g3sh-99/CVE-2021-31166-Exploit](https://github.com/y0g3sh-99/CVE-2021-31166-Exploit) - [antx-code/CVE-2021-31166](https://github.com/antx-code/CVE-2021-31166) - [imikoYa/CVE-2021-31166-exploit](https://github.com/imikoYa/CVE-2021-31166-exploit) - [mauricelambert/CVE-2021-31166](https://github.com/mauricelambert/CVE-2021-31166) @@ -13251,7 +13233,6 @@ - [lixiang957/CVE-2021-33959](https://github.com/lixiang957/CVE-2021-33959) ### CVE-2021-34045 -- [Al1ex/CVE-2021-34045](https://github.com/Al1ex/CVE-2021-34045) - [kenuosec/CVE-2021-34045](https://github.com/kenuosec/CVE-2021-34045) ### CVE-2021-34371 (2021-08-05) @@ -13324,11 +13305,8 @@ Windows Print Spooler Remote Code Execution Vulnerability -- [DenizSe/CVE-2021-34527](https://github.com/DenizSe/CVE-2021-34527) - [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare) -- [JohnHammond/CVE-2021-34527](https://github.com/JohnHammond/CVE-2021-34527) - [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527) -- [CnOxx1/CVE-2021-34527-1675](https://github.com/CnOxx1/CVE-2021-34527-1675) - [rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint](https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint) - [geekbrett/CVE-2021-34527-PrintNightmare-Workaround](https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround) - [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream) @@ -24371,7 +24349,6 @@ - [zhzyker/exphub](https://github.com/zhzyker/exphub) - [Ma1Dong/Solr_CVE-2019-17558](https://github.com/Ma1Dong/Solr_CVE-2019-17558) - [xkyrage/Exploit_CVE-2019-17558-RCE](https://github.com/xkyrage/Exploit_CVE-2019-17558-RCE) -- [narrowinxt/CVE-2019-17558](https://github.com/narrowinxt/CVE-2019-17558) ### CVE-2019-17564 (2020-04-01) @@ -26609,6 +26586,7 @@ - [hoaan1995/CVE-2018-9995](https://github.com/hoaan1995/CVE-2018-9995) - [ST0PL/DVRFaultNET](https://github.com/ST0PL/DVRFaultNET) - [K3ysTr0K3R/CVE-2018-9995-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2018-9995-EXPLOIT) +- [Pab450/CVE-2018-9995](https://github.com/Pab450/CVE-2018-9995) ### CVE-2018-10118 (2018-04-15) @@ -35193,13 +35171,6 @@ ## 2000 -### CVE-2000-0170 (2000-04-10) - -Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. - - -- [mike182/exploit](https://github.com/mike182/exploit) - ### CVE-2000-0649 (2000-08-03) IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined.