diff --git a/2000/CVE-2000-0114.json b/2000/CVE-2000-0114.json new file mode 100644 index 0000000000..5f01d9a439 --- /dev/null +++ b/2000/CVE-2000-0114.json @@ -0,0 +1,43 @@ +[ + { + "id": 808060718, + "name": "CVE-2000-0114", + "full_name": "Cappricio-Securities\/CVE-2000-0114", + "owner": { + "login": "Cappricio-Securities", + "id": 102907425, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", + "html_url": "https:\/\/github.com\/Cappricio-Securities" + }, + "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2000-0114", + "description": "Microsoft FrontPage Extensions Check (shtml.dll)", + "fork": false, + "created_at": "2024-05-30T09:55:41Z", + "updated_at": "2024-05-30T10:01:41Z", + "pushed_at": "2024-05-30T09:56:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "bugbounty", + "bugbounty-tool", + "bugbounty-tools", + "cve-2000-0114", + "cve-2000-0114-exploit", + "cve-2000-0114-poc", + "cve-2000-0114-scanner", + "cve-2000-0114-tool", + "microsoft-frontpage-extensions-check", + "shtml-dll" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2008/CVE-2008-7220.json b/2008/CVE-2008-7220.json index 32c84adbd9..8a059376a0 100644 --- a/2008/CVE-2008-7220.json +++ b/2008/CVE-2008-7220.json @@ -18,13 +18,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index e6d0f560eb..d4d0db28b9 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -112,7 +112,7 @@ "stargazers_count": 243, "watchers_count": 243, "has_discussions": false, - "forks_count": 73, + "forks_count": 74, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -126,7 +126,7 @@ "sslv3" ], "visibility": "public", - "forks": 73, + "forks": 74, "watchers": 243, "score": 0, "subscribers_count": 17 diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json index fd1ac92350..c8854cdd8e 100644 --- a/2019/CVE-2019-15126.json +++ b/2019/CVE-2019-15126.json @@ -43,10 +43,10 @@ "description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability", "fork": false, "created_at": "2020-03-13T14:53:54Z", - "updated_at": "2024-04-16T23:32:20Z", + "updated_at": "2024-05-30T06:49:43Z", "pushed_at": "2020-03-22T19:46:04Z", - "stargazers_count": 213, - "watchers_count": 213, + "stargazers_count": 214, + "watchers_count": 214, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 62, - "watchers": 213, + "watchers": 214, "score": 0, "subscribers_count": 16 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index f309eb4970..fe36d637f3 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -1856,14 +1856,14 @@ { "id": 678208074, "name": "ZeroLogon-to-Shell", - "full_name": "botfather0x0\/ZeroLogon-to-Shell", + "full_name": "c3rrberu5\/ZeroLogon-to-Shell", "owner": { - "login": "botfather0x0", + "login": "c3rrberu5", "id": 109983457, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4", - "html_url": "https:\/\/github.com\/botfather0x0" + "html_url": "https:\/\/github.com\/c3rrberu5" }, - "html_url": "https:\/\/github.com\/botfather0x0\/ZeroLogon-to-Shell", + "html_url": "https:\/\/github.com\/c3rrberu5\/ZeroLogon-to-Shell", "description": "This is a combination of the zerologon_tester.py code (https:\/\/raw.githubusercontent.com\/SecuraBV\/CVE-2020-1472\/master\/zerologon_tester.py) and the tool evil-winrm to get a shell.", "fork": false, "created_at": "2023-08-14T02:40:18Z", diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index 4da8168ea3..90bacf6c5a 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -668,8 +668,8 @@ "description": "Cisco Adaptive Security Appliance (ASA)\/Firepower Threat Defense (FTD) - Local File Inclusion", "fork": false, "created_at": "2024-05-25T08:11:31Z", - "updated_at": "2024-05-29T06:26:43Z", - "pushed_at": "2024-05-29T06:26:40Z", + "updated_at": "2024-05-30T10:07:40Z", + "pushed_at": "2024-05-30T10:07:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -677,7 +677,19 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "bugbounty", + "bugbounty-tool", + "bugbounty-tools", + "cisco", + "cisco-adaptive", + "cve", + "cve-2020-3452", + "cve-2020-3452-exploit", + "cve-2020-3452-poc", + "cve-2020-3452-scanner", + "lfi" + ], "visibility": "public", "forks": 0, "watchers": 0, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 8632da9acf..8604a1048a 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-05-30T05:33:40Z", + "updated_at": "2024-05-30T08:52:19Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1261, - "watchers_count": 1261, + "stargazers_count": 1263, + "watchers_count": 1263, "has_discussions": false, "forks_count": 160, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 160, - "watchers": 1261, + "watchers": 1263, "score": 0, "subscribers_count": 14 } diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 83e05bb22f..ae1cd280be 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -169,10 +169,10 @@ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)", "fork": false, "created_at": "2022-01-26T00:56:36Z", - "updated_at": "2024-05-28T05:51:55Z", + "updated_at": "2024-05-30T06:46:09Z", "pushed_at": "2023-05-04T19:24:39Z", - "stargazers_count": 1024, - "watchers_count": 1024, + "stargazers_count": 1025, + "watchers_count": 1025, "has_discussions": false, "forks_count": 308, "allow_forking": true, @@ -185,7 +185,7 @@ ], "visibility": "public", "forks": 308, - "watchers": 1024, + "watchers": 1025, "score": 0, "subscribers_count": 16 }, @@ -2042,10 +2042,10 @@ "description": "Pre-compiled builds for CVE-2021-4034", "fork": false, "created_at": "2022-01-27T17:43:24Z", - "updated_at": "2023-09-28T11:35:25Z", + "updated_at": "2024-05-30T10:52:20Z", "pushed_at": "2022-03-30T15:38:20Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -2054,7 +2054,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 02a34f8648..a206ab7f05 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -73,10 +73,10 @@ "description": "NoPacScan is a CVE-2021-42287\/CVE-2021-42278 Scanner,it scan for more domain controllers than other script", "fork": false, "created_at": "2022-01-07T11:59:55Z", - "updated_at": "2024-03-29T05:10:45Z", + "updated_at": "2024-05-30T07:05:22Z", "pushed_at": "2022-02-17T04:12:08Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 84, + "watchers_count": 84, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 83, + "watchers": 84, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-43893.json b/2021/CVE-2021-43893.json index af5a5c8a63..dea89914df 100644 --- a/2021/CVE-2021-43893.json +++ b/2021/CVE-2021-43893.json @@ -13,10 +13,10 @@ "description": "Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)", "fork": false, "created_at": "2022-02-04T17:11:00Z", - "updated_at": "2024-03-28T15:50:42Z", + "updated_at": "2024-05-30T08:10:14Z", "pushed_at": "2022-02-14T14:26:26Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 61, + "watchers": 62, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b7e8352303..322520cd3f 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -374,7 +374,7 @@ "stargazers_count": 1095, "watchers_count": 1095, "has_discussions": false, - "forks_count": 527, + "forks_count": 528, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -382,7 +382,7 @@ "log4shell" ], "visibility": "public", - "forks": 527, + "forks": 528, "watchers": 1095, "score": 0, "subscribers_count": 22 @@ -735,13 +735,13 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 5, "score": 0, "subscribers_count": 1 diff --git a/2022/CVE-2022-0995.json b/2022/CVE-2022-0995.json index 273b4491b0..af14c5b7b4 100644 --- a/2022/CVE-2022-0995.json +++ b/2022/CVE-2022-0995.json @@ -88,35 +88,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 807439673, - "name": "CVE-2022-0995", - "full_name": "rootkalilocalhost\/CVE-2022-0995", - "owner": { - "login": "rootkalilocalhost", - "id": 140280170, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140280170?v=4", - "html_url": "https:\/\/github.com\/rootkalilocalhost" - }, - "html_url": "https:\/\/github.com\/rootkalilocalhost\/CVE-2022-0995", - "description": null, - "fork": false, - "created_at": "2024-05-29T05:36:11Z", - "updated_at": "2024-05-29T05:40:24Z", - "pushed_at": "2024-05-29T05:40:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 2f031a321f..449f006d41 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1284,10 +1284,10 @@ "description": "CVE-2022-22947 注入Godzilla内存马", "fork": false, "created_at": "2022-04-26T05:48:27Z", - "updated_at": "2024-05-06T15:25:09Z", + "updated_at": "2024-05-30T09:18:14Z", "pushed_at": "2022-04-26T05:55:58Z", - "stargazers_count": 199, - "watchers_count": 199, + "stargazers_count": 200, + "watchers_count": 200, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -1296,7 +1296,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 199, + "watchers": 200, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 3071e1963a..3bc3f83948 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -766,10 +766,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-05-30T05:33:40Z", + "updated_at": "2024-05-30T08:52:19Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1261, - "watchers_count": 1261, + "stargazers_count": 1263, + "watchers_count": 1263, "has_discussions": false, "forks_count": 160, "allow_forking": true, @@ -785,7 +785,7 @@ ], "visibility": "public", "forks": 160, - "watchers": 1261, + "watchers": 1263, "score": 0, "subscribers_count": 14 }, diff --git a/2022/CVE-2022-37706.json b/2022/CVE-2022-37706.json index 1acddd6ac2..a061085420 100644 --- a/2022/CVE-2022-37706.json +++ b/2022/CVE-2022-37706.json @@ -13,10 +13,10 @@ "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "fork": false, "created_at": "2022-09-12T19:22:44Z", - "updated_at": "2024-05-30T04:23:27Z", + "updated_at": "2024-05-30T10:36:53Z", "pushed_at": "2022-09-19T19:41:34Z", - "stargazers_count": 251, - "watchers_count": 251, + "stargazers_count": 252, + "watchers_count": 252, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 251, + "watchers": 252, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index 1ca8136dd4..4bcd86050d 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -411,10 +411,10 @@ "description": "Cobalt Strike 4.4 猪猪版 去暗桩 去流量特征 beacon仿造真实API服务 修补CVE-2022-39197补丁", "fork": false, "created_at": "2023-04-28T06:31:38Z", - "updated_at": "2024-05-22T11:29:11Z", + "updated_at": "2024-05-30T09:56:01Z", "pushed_at": "2023-04-28T07:10:00Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -423,7 +423,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 32, + "watchers": 33, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-41082.json b/2022/CVE-2022-41082.json index 51141670d6..c327e683e5 100644 --- a/2022/CVE-2022-41082.json +++ b/2022/CVE-2022-41082.json @@ -13,10 +13,10 @@ "description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability", "fork": false, "created_at": "2022-10-01T11:53:14Z", - "updated_at": "2024-01-02T10:32:08Z", + "updated_at": "2024-05-30T08:24:12Z", "pushed_at": "2023-01-03T08:37:33Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 80, + "watchers_count": 80, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 79, + "watchers": 80, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json index b74c221b6f..d07aef084e 100644 --- a/2022/CVE-2022-46169.json +++ b/2022/CVE-2022-46169.json @@ -164,14 +164,14 @@ { "id": 588437634, "name": "CVE-2022-46169", - "full_name": "botfather0x0\/CVE-2022-46169", + "full_name": "c3rrberu5\/CVE-2022-46169", "owner": { - "login": "botfather0x0", + "login": "c3rrberu5", "id": 109983457, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4", - "html_url": "https:\/\/github.com\/botfather0x0" + "html_url": "https:\/\/github.com\/c3rrberu5" }, - "html_url": "https:\/\/github.com\/botfather0x0\/CVE-2022-46169", + "html_url": "https:\/\/github.com\/c3rrberu5\/CVE-2022-46169", "description": "Exploit to CVE-2022-46169 vulnerability", "fork": false, "created_at": "2023-01-13T05:37:56Z", diff --git a/2023/CVE-2023-2024.json b/2023/CVE-2023-2024.json index f8d1944cff..d627b9b91f 100644 --- a/2023/CVE-2023-2024.json +++ b/2023/CVE-2023-2024.json @@ -13,8 +13,8 @@ "description": "For Aina", "fork": false, "created_at": "2023-12-04T15:55:22Z", - "updated_at": "2024-05-05T19:45:55Z", - "pushed_at": "2024-05-05T19:45:52Z", + "updated_at": "2024-05-30T11:28:31Z", + "pushed_at": "2024-05-30T11:28:28Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2023/CVE-2023-20963.json b/2023/CVE-2023-20963.json index e78d7ff10d..0162978e97 100644 --- a/2023/CVE-2023-20963.json +++ b/2023/CVE-2023-20963.json @@ -13,10 +13,10 @@ "description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)", "fork": false, "created_at": "2023-06-12T10:44:59Z", - "updated_at": "2024-05-15T06:21:44Z", + "updated_at": "2024-05-30T09:40:11Z", "pushed_at": "2024-04-27T20:15:24Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 36, + "watchers": 37, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index b307be086b..c367c2919a 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -43,10 +43,10 @@ "description": "cve-2023-21768", "fork": false, "created_at": "2023-03-10T03:36:52Z", - "updated_at": "2024-04-01T22:52:57Z", + "updated_at": "2024-05-30T09:49:39Z", "pushed_at": "2023-03-10T04:03:04Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index b4f62d804e..60bbedc31e 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -73,10 +73,10 @@ "description": "CVE-2023-21839工具", "fork": false, "created_at": "2023-03-11T08:26:30Z", - "updated_at": "2024-01-07T11:06:41Z", + "updated_at": "2024-05-30T11:01:54Z", "pushed_at": "2023-03-11T08:28:28Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 26, + "watchers": 25, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index 5bf1461006..af6e769c94 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -556,10 +556,10 @@ "description": "CVE-2023-22527 内存马注入工具", "fork": false, "created_at": "2024-02-11T16:46:55Z", - "updated_at": "2024-05-09T14:32:21Z", + "updated_at": "2024-05-30T07:08:33Z", "pushed_at": "2024-02-21T05:49:59Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -568,7 +568,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 61, + "watchers": 62, "score": 0, "subscribers_count": 1 }, @@ -586,10 +586,10 @@ "description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理", "fork": false, "created_at": "2024-02-26T02:34:44Z", - "updated_at": "2024-05-30T01:06:34Z", + "updated_at": "2024-05-30T08:33:14Z", "pushed_at": "2024-04-24T02:34:16Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -598,7 +598,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 26, + "watchers": 28, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-29489.json b/2023/CVE-2023-29489.json index 930049e404..68ba9c7933 100644 --- a/2023/CVE-2023-29489.json +++ b/2023/CVE-2023-29489.json @@ -253,8 +253,8 @@ "description": "CVE-2023-29489-XSS", "fork": false, "created_at": "2023-06-01T18:13:17Z", - "updated_at": "2024-05-29T20:33:19Z", - "pushed_at": "2024-05-29T20:33:16Z", + "updated_at": "2024-05-30T08:33:03Z", + "pushed_at": "2024-05-30T08:32:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -580,7 +580,7 @@ "subscribers_count": 0 }, { - "id": 807969116, + "id": 807997088, "name": "CVE-2023-29489", "full_name": "md-thalal\/CVE-2023-29489", "owner": { @@ -592,9 +592,9 @@ "html_url": "https:\/\/github.com\/md-thalal\/CVE-2023-29489", "description": null, "fork": false, - "created_at": "2024-05-30T06:07:47Z", - "updated_at": "2024-05-30T06:30:46Z", - "pushed_at": "2024-05-30T06:30:43Z", + "created_at": "2024-05-30T07:20:09Z", + "updated_at": "2024-05-30T10:04:03Z", + "pushed_at": "2024-05-30T10:03:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-30253.json b/2023/CVE-2023-30253.json index 9ee5a999e4..ecd20d61e9 100644 --- a/2023/CVE-2023-30253.json +++ b/2023/CVE-2023-30253.json @@ -73,10 +73,10 @@ "description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection", "fork": false, "created_at": "2024-05-27T15:10:12Z", - "updated_at": "2024-05-29T18:28:22Z", + "updated_at": "2024-05-30T08:58:15Z", "pushed_at": "2024-05-28T15:10:20Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-32233.json b/2023/CVE-2023-32233.json index 3030b4f5c5..3dc7a44ab8 100644 --- a/2023/CVE-2023-32233.json +++ b/2023/CVE-2023-32233.json @@ -148,35 +148,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 807442373, - "name": "CVE-2023-32233", - "full_name": "rootkalilocalhost\/CVE-2023-32233", - "owner": { - "login": "rootkalilocalhost", - "id": 140280170, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140280170?v=4", - "html_url": "https:\/\/github.com\/rootkalilocalhost" - }, - "html_url": "https:\/\/github.com\/rootkalilocalhost\/CVE-2023-32233", - "description": null, - "fork": false, - "created_at": "2024-05-29T05:44:11Z", - "updated_at": "2024-05-29T05:47:28Z", - "pushed_at": "2024-05-29T05:47:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json index 08887bc356..6416698fbd 100644 --- a/2023/CVE-2023-38408.json +++ b/2023/CVE-2023-38408.json @@ -13,10 +13,10 @@ "description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2", "fork": false, "created_at": "2023-08-09T19:56:07Z", - "updated_at": "2024-05-14T10:12:15Z", + "updated_at": "2024-05-30T11:02:37Z", "pushed_at": "2023-08-10T05:12:20Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-50386.json b/2023/CVE-2023-50386.json index ebffc6086a..af37e9b10a 100644 --- a/2023/CVE-2023-50386.json +++ b/2023/CVE-2023-50386.json @@ -13,10 +13,10 @@ "description": "Apache Solr Backup\/Restore APIs RCE Poc (CVE-2023-50386)", "fork": false, "created_at": "2024-02-29T08:57:47Z", - "updated_at": "2024-05-24T21:22:13Z", + "updated_at": "2024-05-30T08:45:36Z", "pushed_at": "2024-02-29T12:54:56Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 60, + "watchers": 61, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 4706aff548..a36dec003d 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-05-29T19:10:26Z", + "updated_at": "2024-05-30T09:20:41Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 1965, - "watchers_count": 1965, + "stargazers_count": 1966, + "watchers_count": 1966, "has_discussions": false, "forks_count": 246, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 246, - "watchers": 1965, + "watchers": 1966, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-21683.json b/2024/CVE-2024-21683.json index c4196aceb8..6fd094cc72 100644 --- a/2024/CVE-2024-21683.json +++ b/2024/CVE-2024-21683.json @@ -43,10 +43,10 @@ "description": "CVE-2024-21683 Confluence Post Auth RCE", "fork": false, "created_at": "2024-05-23T09:05:40Z", - "updated_at": "2024-05-30T03:21:43Z", + "updated_at": "2024-05-30T09:06:57Z", "pushed_at": "2024-05-27T03:47:36Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 95, + "watchers_count": 95, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 93, + "watchers": 95, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index adb2b39133..d7b0f8d200 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -73,10 +73,10 @@ "description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ", "fork": false, "created_at": "2024-03-13T09:17:28Z", - "updated_at": "2024-05-26T21:26:24Z", + "updated_at": "2024-05-30T09:02:12Z", "pushed_at": "2024-03-16T00:35:12Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 98, + "watchers": 99, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 1a467c77a7..0f24aed496 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -256,10 +256,10 @@ "description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具", "fork": false, "created_at": "2024-01-27T19:34:48Z", - "updated_at": "2024-05-30T03:45:28Z", + "updated_at": "2024-05-30T09:18:52Z", "pushed_at": "2024-03-16T07:55:41Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -272,7 +272,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 59, + "watchers": 60, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json new file mode 100644 index 0000000000..b7a1e8129a --- /dev/null +++ b/2024/CVE-2024-24919.json @@ -0,0 +1,32 @@ +[ + { + "id": 808011196, + "name": "CVE-2024-24919", + "full_name": "c3rrberu5\/CVE-2024-24919", + "owner": { + "login": "c3rrberu5", + "id": 109983457, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4", + "html_url": "https:\/\/github.com\/c3rrberu5" + }, + "html_url": "https:\/\/github.com\/c3rrberu5\/CVE-2024-24919", + "description": "Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN.", + "fork": false, + "created_at": "2024-05-30T07:55:53Z", + "updated_at": "2024-05-30T07:58:13Z", + "pushed_at": "2024-05-30T07:58:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-27804.json b/2024/CVE-2024-27804.json index 252c089e73..92454fa53b 100644 --- a/2024/CVE-2024-27804.json +++ b/2024/CVE-2024-27804.json @@ -13,10 +13,10 @@ "description": "POC for CVE-2024-27804", "fork": false, "created_at": "2024-05-14T14:17:06Z", - "updated_at": "2024-05-30T00:35:37Z", + "updated_at": "2024-05-30T09:43:36Z", "pushed_at": "2024-05-14T14:55:23Z", - "stargazers_count": 111, - "watchers_count": 111, + "stargazers_count": 112, + "watchers_count": 112, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 111, + "watchers": 112, "score": 0, "subscribers_count": 4 } diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index b002bbd1b1..e92521774e 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -73,19 +73,19 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-05-30T05:58:24Z", + "updated_at": "2024-05-30T12:21:35Z", "pushed_at": "2024-05-28T03:19:34Z", - "stargazers_count": 156, - "watchers_count": 156, + "stargazers_count": 186, + "watchers_count": 186, "has_discussions": false, - "forks_count": 18, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, - "watchers": 156, + "forks": 24, + "watchers": 186, "score": 0, "subscribers_count": 4 } diff --git a/2024/CVE-2024-30056.json b/2024/CVE-2024-30056.json index 0865579881..b0a3c58873 100644 --- a/2024/CVE-2024-30056.json +++ b/2024/CVE-2024-30056.json @@ -13,10 +13,10 @@ "description": "CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability", "fork": false, "created_at": "2024-05-27T06:37:34Z", - "updated_at": "2024-05-29T22:46:50Z", + "updated_at": "2024-05-30T08:49:48Z", "pushed_at": "2024-05-27T06:47:27Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 1618bd6293..063e38055c 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1012,7 +1012,7 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-05-29T14:58:48Z", + "updated_at": "2024-05-30T09:02:24Z", "pushed_at": "2024-04-03T04:58:50Z", "stargazers_count": 3471, "watchers_count": 3471, diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index dd0d344485..44e583a0b2 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -73,12 +73,12 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-05-30T05:41:20Z", + "updated_at": "2024-05-30T11:35:44Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 305, - "watchers_count": 305, + "stargazers_count": 316, + "watchers_count": 316, "has_discussions": false, - "forks_count": 88, + "forks_count": 93, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -89,8 +89,8 @@ "rce" ], "visibility": "public", - "forks": 88, - "watchers": 305, + "forks": 93, + "watchers": 316, "score": 0, "subscribers_count": 3 }, @@ -235,10 +235,10 @@ "description": "CVE-2024-32002 RCE PoC", "fork": false, "created_at": "2024-05-18T15:05:28Z", - "updated_at": "2024-05-29T03:29:08Z", + "updated_at": "2024-05-30T10:23:24Z", "pushed_at": "2024-05-18T15:12:59Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -251,7 +251,7 @@ ], "visibility": "public", "forks": 20, - "watchers": 80, + "watchers": 83, "score": 0, "subscribers_count": 1 }, @@ -1344,5 +1344,65 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 808085235, + "name": "CVE-2024-32002-sub", + "full_name": "TanMolk\/CVE-2024-32002-sub", + "owner": { + "login": "TanMolk", + "id": 114300129, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114300129?v=4", + "html_url": "https:\/\/github.com\/TanMolk" + }, + "html_url": "https:\/\/github.com\/TanMolk\/CVE-2024-32002-sub", + "description": null, + "fork": false, + "created_at": "2024-05-30T10:58:17Z", + "updated_at": "2024-05-30T11:07:11Z", + "pushed_at": "2024-05-30T11:07:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 808086341, + "name": "CVE-2024-32002", + "full_name": "TanMolk\/CVE-2024-32002", + "owner": { + "login": "TanMolk", + "id": 114300129, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114300129?v=4", + "html_url": "https:\/\/github.com\/TanMolk" + }, + "html_url": "https:\/\/github.com\/TanMolk\/CVE-2024-32002", + "description": null, + "fork": false, + "created_at": "2024-05-30T11:01:15Z", + "updated_at": "2024-05-30T11:01:35Z", + "pushed_at": "2024-05-30T11:01:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 2cf4496f62..788b6ca2fb 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -13,10 +13,10 @@ "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept", "fork": false, "created_at": "2024-05-20T10:02:23Z", - "updated_at": "2024-05-30T02:42:15Z", + "updated_at": "2024-05-30T07:19:49Z", "pushed_at": "2024-05-23T10:07:41Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 40, + "watchers": 41, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index a73c12bf79..11e9eeeef4 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -246,5 +246,35 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 808014744, + "name": "CVE-2024-4956-Sonatype-Nexus-Repository-Manager", + "full_name": "Praison001\/CVE-2024-4956-Sonatype-Nexus-Repository-Manager", + "owner": { + "login": "Praison001", + "id": 60835238, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4", + "html_url": "https:\/\/github.com\/Praison001" + }, + "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4956-Sonatype-Nexus-Repository-Manager", + "description": "Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS\/Pro versions up to and including 3.68.0", + "fork": false, + "created_at": "2024-05-30T08:04:27Z", + "updated_at": "2024-05-30T08:25:47Z", + "pushed_at": "2024-05-30T08:25:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index afa78b385e..5403d2c56e 100644 --- a/README.md +++ b/README.md @@ -623,6 +623,7 @@ - [eoslvs/CVE-2024-4956](https://github.com/eoslvs/CVE-2024-4956) - [GoatSecurity/CVE-2024-4956](https://github.com/GoatSecurity/CVE-2024-4956) - [TypicalModMaker/CVE-2024-4956](https://github.com/TypicalModMaker/CVE-2024-4956) +- [Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager](https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager) ### CVE-2024-5084 (2024-05-23) @@ -1392,6 +1393,13 @@ - [afine-com/CVE-2024-24816](https://github.com/afine-com/CVE-2024-24816) +### CVE-2024-24919 (2024-05-28) + +Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. + + +- [c3rrberu5/CVE-2024-24919](https://github.com/c3rrberu5/CVE-2024-24919) + ### CVE-2024-25092 - [RandomRobbieBF/CVE-2024-25092](https://github.com/RandomRobbieBF/CVE-2024-25092) @@ -2061,6 +2069,8 @@ - [JakobTheDev/cve-2024-32002-submodule-aw](https://github.com/JakobTheDev/cve-2024-32002-submodule-aw) - [JakobTheDev/cve-2024-32002-poc-aw](https://github.com/JakobTheDev/cve-2024-32002-poc-aw) - [Goplush/CVE-2024-32002-git-rce](https://github.com/Goplush/CVE-2024-32002-git-rce) +- [TanMolk/CVE-2024-32002-sub](https://github.com/TanMolk/CVE-2024-32002-sub) +- [TanMolk/CVE-2024-32002](https://github.com/TanMolk/CVE-2024-32002) ### CVE-2024-32004 (2024-05-14) @@ -6024,7 +6034,6 @@ - [oferchen/POC-CVE-2023-32233](https://github.com/oferchen/POC-CVE-2023-32233) - [RogelioPumajulca/TEST-CVE-2023-32233](https://github.com/RogelioPumajulca/TEST-CVE-2023-32233) - [void0red/CVE-2023-32233](https://github.com/void0red/CVE-2023-32233) -- [rootkalilocalhost/CVE-2023-32233](https://github.com/rootkalilocalhost/CVE-2023-32233) ### CVE-2023-32235 (2023-05-05) @@ -10454,7 +10463,6 @@ - [Bonfee/CVE-2022-0995](https://github.com/Bonfee/CVE-2022-0995) - [AndreevSemen/CVE-2022-0995](https://github.com/AndreevSemen/CVE-2022-0995) - [1nzag/CVE-2022-0995](https://github.com/1nzag/CVE-2022-0995) -- [rootkalilocalhost/CVE-2022-0995](https://github.com/rootkalilocalhost/CVE-2022-0995) ### CVE-2022-0997 (2022-05-16) @@ -16358,7 +16366,7 @@ - [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169) - [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169) - [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169) -- [botfather0x0/CVE-2022-46169](https://github.com/botfather0x0/CVE-2022-46169) +- [c3rrberu5/CVE-2022-46169](https://github.com/c3rrberu5/CVE-2022-46169) - [Habib0x0/CVE-2022-46169](https://github.com/Habib0x0/CVE-2022-46169) - [N1arut/CVE-2022-46169_POC](https://github.com/N1arut/CVE-2022-46169_POC) - [miko550/CVE-2022-46169](https://github.com/miko550/CVE-2022-46169) @@ -24242,7 +24250,7 @@ - [dr4g0n23/CVE-2020-1472](https://github.com/dr4g0n23/CVE-2020-1472) - [RicYaben/CVE-2020-1472-LAB](https://github.com/RicYaben/CVE-2020-1472-LAB) - [Akash7350/CVE-2020-1472](https://github.com/Akash7350/CVE-2020-1472) -- [botfather0x0/ZeroLogon-to-Shell](https://github.com/botfather0x0/ZeroLogon-to-Shell) +- [c3rrberu5/ZeroLogon-to-Shell](https://github.com/c3rrberu5/ZeroLogon-to-Shell) - [logg-1/0logon](https://github.com/logg-1/0logon) - [whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC](https://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC) - [JolynNgSC/Zerologon_CVE-2020-1472](https://github.com/JolynNgSC/Zerologon_CVE-2020-1472) @@ -43313,6 +43321,13 @@ ## 2000 +### CVE-2000-0114 (2000-02-08) + +Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory. + + +- [Cappricio-Securities/CVE-2000-0114](https://github.com/Cappricio-Securities/CVE-2000-0114) + ### CVE-2000-0170 (2000-04-10) Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.