diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index 7c98b5d136..3655a6b627 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -108,13 +108,13 @@ "stargazers_count": 79, "watchers_count": 79, "has_discussions": false, - "forks_count": 24, + "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 24, + "forks": 25, "watchers": 79, "score": 0, "subscribers_count": 2 diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json index 800565b152..1e53e90691 100644 --- a/2018/CVE-2018-6242.json +++ b/2018/CVE-2018-6242.json @@ -13,10 +13,10 @@ "description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)", "fork": false, "created_at": "2018-04-28T11:50:00Z", - "updated_at": "2023-11-18T04:36:26Z", + "updated_at": "2023-11-25T11:37:51Z", "pushed_at": "2022-12-11T10:44:39Z", - "stargazers_count": 500, - "watchers_count": 500, + "stargazers_count": 501, + "watchers_count": 501, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 61, - "watchers": 500, + "watchers": 501, "score": 0, "subscribers_count": 57 }, diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json index e18a4dee82..bcae799d11 100644 --- a/2019/CVE-2019-15126.json +++ b/2019/CVE-2019-15126.json @@ -48,13 +48,13 @@ "stargazers_count": 211, "watchers_count": 211, "has_discussions": false, - "forks_count": 64, + "forks_count": 65, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 64, + "forks": 65, "watchers": 211, "score": 0, "subscribers_count": 16 @@ -73,10 +73,10 @@ "description": "An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)", "fork": false, "created_at": "2020-03-18T16:25:28Z", - "updated_at": "2023-11-06T15:42:21Z", + "updated_at": "2023-11-25T09:17:34Z", "pushed_at": "2022-01-19T20:41:35Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 62, + "watchers": 61, "score": 0, "subscribers_count": 8 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index a459235933..7e28913637 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-11-24T20:00:51Z", + "updated_at": "2023-11-25T07:37:25Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3929, - "watchers_count": 3929, + "stargazers_count": 3930, + "watchers_count": 3930, "has_discussions": false, "forks_count": 1095, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1095, - "watchers": 3929, + "watchers": 3930, "score": 0, "subscribers_count": 155 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index b9f4987bd3..a6b87a8a2b 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-11-24T20:00:51Z", + "updated_at": "2023-11-25T07:37:25Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3929, - "watchers_count": 3929, + "stargazers_count": 3930, + "watchers_count": 3930, "has_discussions": false, "forks_count": 1095, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1095, - "watchers": 3929, + "watchers": 3930, "score": 0, "subscribers_count": 155 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 426e8c1da8..43b8a08821 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -347,10 +347,10 @@ "description": "Laravel RCE (CVE-2021-3129)", "fork": false, "created_at": "2022-04-16T17:22:55Z", - "updated_at": "2023-11-22T09:18:56Z", + "updated_at": "2023-11-25T10:01:47Z", "pushed_at": "2023-11-22T09:28:49Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -368,7 +368,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 48, + "watchers": 49, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-39172.json b/2021/CVE-2021-39172.json index 7a2739faed..09760a39df 100644 --- a/2021/CVE-2021-39172.json +++ b/2021/CVE-2021-39172.json @@ -13,10 +13,10 @@ "description": "Cachet 2.4 Code Execution via Laravel Configuration Injection CVE-2021-39172", "fork": false, "created_at": "2022-09-17T07:58:33Z", - "updated_at": "2023-01-27T16:44:17Z", + "updated_at": "2023-11-25T10:04:49Z", "pushed_at": "2023-03-27T00:37:51Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 24e6977bcf..e98fd5cb22 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -359,42 +359,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 476384052, - "name": "CVE-2022-22965", - "full_name": "GuayoyoCyber\/CVE-2022-22965", - "owner": { - "login": "GuayoyoCyber", - "id": 17362318, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17362318?v=4", - "html_url": "https:\/\/github.com\/GuayoyoCyber" - }, - "html_url": "https:\/\/github.com\/GuayoyoCyber\/CVE-2022-22965", - "description": "Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka \"Spring4Shell\")", - "fork": false, - "created_at": "2022-03-31T16:14:36Z", - "updated_at": "2022-04-24T08:10:05Z", - "pushed_at": "2022-04-19T15:05:47Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2022-22965", - "spring-framework", - "spring4shell", - "vulnerability", - "wazuh" - ], - "visibility": "public", - "forks": 3, - "watchers": 6, - "score": 0, - "subscribers_count": 2 - }, { "id": 476399976, "name": "Safer_PoC_CVE-2022-22965", diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index fa1143578b..23db8da665 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -29,38 +29,6 @@ "score": 0, "subscribers_count": 30 }, - { - "id": 481521334, - "name": "CVE-2022-26809", - "full_name": "websecnl\/CVE-2022-26809", - "owner": { - "login": "websecnl", - "id": 20278695, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4", - "html_url": "https:\/\/github.com\/websecnl" - }, - "html_url": "https:\/\/github.com\/websecnl\/CVE-2022-26809", - "description": "Remote Code Execution Exploit in the RPC Library", - "fork": false, - "created_at": "2022-04-14T08:12:24Z", - "updated_at": "2023-11-18T04:17:37Z", - "pushed_at": "2022-04-19T17:04:04Z", - "stargazers_count": 30, - "watchers_count": 30, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2022-26809" - ], - "visibility": "public", - "forks": 6, - "watchers": 30, - "score": 0, - "subscribers_count": 19 - }, { "id": 481523929, "name": "CVE-2022-26809", diff --git a/2023/CVE-2023-36884.json b/2023/CVE-2023-36884.json index 8916305707..af2085f5df 100644 --- a/2023/CVE-2023-36884.json +++ b/2023/CVE-2023-36884.json @@ -261,10 +261,10 @@ "description": "MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit", "fork": false, "created_at": "2023-09-28T11:53:44Z", - "updated_at": "2023-11-24T09:13:56Z", + "updated_at": "2023-11-25T11:52:24Z", "pushed_at": "2023-11-02T09:08:31Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -273,7 +273,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index df942c6380..c4ef3301d9 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -349,10 +349,10 @@ "description": "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).", "fork": false, "created_at": "2023-11-24T18:26:36Z", - "updated_at": "2023-11-25T05:14:57Z", + "updated_at": "2023-11-25T08:49:51Z", "pushed_at": "2023-11-24T20:19:44Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -361,7 +361,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 20, + "watchers": 23, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index f00be9582e..151d5673f3 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -43,10 +43,10 @@ "description": "PoC for CVE-2023-4911", "fork": false, "created_at": "2023-10-04T14:12:16Z", - "updated_at": "2023-11-24T20:38:22Z", + "updated_at": "2023-11-25T07:18:56Z", "pushed_at": "2023-10-04T14:16:36Z", - "stargazers_count": 352, - "watchers_count": 352, + "stargazers_count": 353, + "watchers_count": 353, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 55, - "watchers": 352, + "watchers": 353, "score": 0, "subscribers_count": 5 }, @@ -73,10 +73,10 @@ "description": "CVE-2023-4911 proof of concept", "fork": false, "created_at": "2023-10-04T14:32:49Z", - "updated_at": "2023-11-24T08:45:46Z", + "updated_at": "2023-11-25T10:35:24Z", "pushed_at": "2023-10-08T23:24:24Z", - "stargazers_count": 156, - "watchers_count": 156, + "stargazers_count": 157, + "watchers_count": 157, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 156, + "watchers": 157, "score": 0, "subscribers_count": 3 }, diff --git a/README.md b/README.md index 125b33a930..f2bce3167a 100644 --- a/README.md +++ b/README.md @@ -7197,7 +7197,6 @@ - [Kirill89/CVE-2022-22965-PoC](https://github.com/Kirill89/CVE-2022-22965-PoC) - [FourCoreLabs/spring4shell-exploit-poc](https://github.com/FourCoreLabs/spring4shell-exploit-poc) - [alt3kx/CVE-2022-22965_PoC](https://github.com/alt3kx/CVE-2022-22965_PoC) -- [GuayoyoCyber/CVE-2022-22965](https://github.com/GuayoyoCyber/CVE-2022-22965) - [colincowie/Safer_PoC_CVE-2022-22965](https://github.com/colincowie/Safer_PoC_CVE-2022-22965) - [rwincey/spring4shell-CVE-2022-22965](https://github.com/rwincey/spring4shell-CVE-2022-22965) - [viniciuspereiras/CVE-2022-22965-poc](https://github.com/viniciuspereiras/CVE-2022-22965-poc) @@ -8294,7 +8293,6 @@ - [sherlocksecurity/Microsoft-CVE-2022-26809-The-Little-Boy](https://github.com/sherlocksecurity/Microsoft-CVE-2022-26809-The-Little-Boy) -- [websecnl/CVE-2022-26809](https://github.com/websecnl/CVE-2022-26809) - [auduongxuan/CVE-2022-26809](https://github.com/auduongxuan/CVE-2022-26809) - [corelight/cve-2022-26809](https://github.com/corelight/cve-2022-26809) - [UNDESC0N0CID0/CVE-2022-26809-RCE](https://github.com/UNDESC0N0CID0/CVE-2022-26809-RCE)