From fb682453424c185e199e8bd44b3d4e480c8524b1 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 28 Jun 2023 15:29:09 +0900 Subject: [PATCH] Auto Update 2023/06/28 06:29:09 --- 2000/CVE-2000-0649.json | 30 +++++ 2009/CVE-2009-0824.json | 12 +- 2009/CVE-2009-4049.json | 10 +- 2010/CVE-2010-4502.json | 8 +- 2015/CVE-2015-0235.json | 150 +++++++++++++++++++++ 2015/CVE-2015-2291.json | 16 +-- 2016/CVE-2016-0638.json | 8 +- 2016/CVE-2016-3088.json | 8 +- 2016/CVE-2016-5195.json | 8 +- 2017/CVE-2017-3248.json | 8 +- 2017/CVE-2017-8759.json | 8 +- 2018/CVE-2018-10933.json | 279 +++++++++++++++++++++++++++++++++++++++ 2018/CVE-2018-11235.json | 30 +++++ 2018/CVE-2018-14847.json | 30 +++++ 2018/CVE-2018-2628.json | 8 +- 2018/CVE-2018-2893.json | 30 +++++ 2018/CVE-2018-3990.json | 12 +- 2019/CVE-2019-15107.json | 8 +- 2019/CVE-2019-18845.json | 8 +- 2019/CVE-2019-18935.json | 8 +- 2019/CVE-2019-19781.json | 8 +- 2019/CVE-2019-2618.json | 8 +- 2020/CVE-2020-0041.json | 8 +- 2020/CVE-2020-17382.json | 8 +- 2020/CVE-2020-2551.json | 8 +- 2021/CVE-2021-21551.json | 8 +- 2021/CVE-2021-21972.json | 8 +- 2021/CVE-2021-27965.json | 8 +- 2021/CVE-2021-3438.json | 8 +- 2021/CVE-2021-4034.json | 4 +- 2021/CVE-2021-42278.json | 8 +- 2021/CVE-2021-42287.json | 8 +- 2021/CVE-2021-44228.json | 18 +-- 2021/CVE-2021-44852.json | 8 +- 2022/CVE-2022-0847.json | 8 +- 2022/CVE-2022-1096.json | 2 +- 2022/CVE-2022-1292.json | 2 +- 2022/CVE-2022-20421.json | 8 +- 2022/CVE-2022-20452.json | 4 +- 2022/CVE-2022-21894.json | 4 +- 2022/CVE-2022-21907.json | 4 +- 2022/CVE-2022-22954.json | 10 +- 2022/CVE-2022-22965.json | 2 +- 2022/CVE-2022-26134.json | 8 +- 2022/CVE-2022-26717.json | 2 +- 2022/CVE-2022-28346.json | 2 +- 2022/CVE-2022-29072.json | 2 +- 2022/CVE-2022-32250.json | 2 +- 2022/CVE-2022-37708.json | 2 +- 2022/CVE-2022-38694.json | 2 +- 2022/CVE-2022-39841.json | 2 +- 2022/CVE-2022-40684.json | 2 +- 2022/CVE-2022-40687.json | 2 +- 2022/CVE-2022-41218.json | 8 +- 2022/CVE-2022-42889.json | 2 +- 2022/CVE-2022-44268.json | 2 +- 2022/CVE-2022-4510.json | 10 +- 2022/CVE-2022-46718.json | 2 +- 2023/CVE-2023-2002.json | 8 +- 2023/CVE-2023-20178.json | 8 +- 2023/CVE-2023-20887.json | 8 +- 2023/CVE-2023-21839.json | 12 +- 2023/CVE-2023-25690.json | 8 +- 2023/CVE-2023-27997.json | 8 +- 2023/CVE-2023-29336.json | 4 +- 2023/CVE-2023-32233.json | 8 +- 2023/CVE-2023-32784.json | 2 +- 2023/CVE-2023-33243.json | 2 +- 2023/CVE-2023-34362.json | 4 +- README.md | 45 +++++-- 70 files changed, 791 insertions(+), 217 deletions(-) diff --git a/2000/CVE-2000-0649.json b/2000/CVE-2000-0649.json index 68a30ef30f..fa8890a923 100644 --- a/2000/CVE-2000-0649.json +++ b/2000/CVE-2000-0649.json @@ -33,5 +33,35 @@ "watchers": 4, "score": 0, "subscribers_count": 2 + }, + { + "id": 421212210, + "name": "cve-2000-0649", + "full_name": "stevenvegar\/cve-2000-0649", + "owner": { + "login": "stevenvegar", + "id": 70730301, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4", + "html_url": "https:\/\/github.com\/stevenvegar" + }, + "html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649", + "description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers", + "fork": false, + "created_at": "2021-10-25T23:14:04Z", + "updated_at": "2021-12-17T07:02:21Z", + "pushed_at": "2021-10-25T23:32:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2009/CVE-2009-0824.json b/2009/CVE-2009-0824.json index 1039117fc4..13dd7fe6e2 100644 --- a/2009/CVE-2009-0824.json +++ b/2009/CVE-2009-0824.json @@ -2,18 +2,18 @@ { "id": 621193423, "name": "CVE-2009-0824", - "full_name": "Exploitables\/CVE-2009-0824", + "full_name": "expFlash\/CVE-2009-0824", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2009-0824", - "description": "Just another write NULL exploit", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2009-0824", + "description": null, "fork": false, "created_at": "2023-03-30T07:11:50Z", - "updated_at": "2023-06-09T08:32:17Z", + "updated_at": "2023-06-28T03:36:36Z", "pushed_at": "2023-04-16T03:51:45Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2009/CVE-2009-4049.json b/2009/CVE-2009-4049.json index 1e44adb156..42915f0bab 100644 --- a/2009/CVE-2009-4049.json +++ b/2009/CVE-2009-4049.json @@ -2,18 +2,18 @@ { "id": 512342338, "name": "CVE-2009-4049", - "full_name": "Exploitables\/CVE-2009-4049", + "full_name": "expFlash\/CVE-2009-4049", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2009-4049", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2009-4049", "description": "Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024.", "fork": false, "created_at": "2022-07-10T04:16:16Z", - "updated_at": "2022-07-10T12:44:21Z", + "updated_at": "2023-06-28T03:45:28Z", "pushed_at": "2022-07-10T04:18:22Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2010/CVE-2010-4502.json b/2010/CVE-2010-4502.json index 5eaefac5de..97f3cd78b7 100644 --- a/2010/CVE-2010-4502.json +++ b/2010/CVE-2010-4502.json @@ -2,14 +2,14 @@ { "id": 504370912, "name": "CVE-2010-4502", - "full_name": "Exploitables\/CVE-2010-4502", + "full_name": "expFlash\/CVE-2010-4502", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2010-4502", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2010-4502", "description": "Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow.", "fork": false, "created_at": "2022-06-17T02:39:13Z", diff --git a/2015/CVE-2015-0235.json b/2015/CVE-2015-0235.json index 3dda9ebcc1..05ef4c996e 100644 --- a/2015/CVE-2015-0235.json +++ b/2015/CVE-2015-0235.json @@ -29,6 +29,66 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 29933656, + "name": "CVE-2015-0235-cookbook", + "full_name": "mikesplain\/CVE-2015-0235-cookbook", + "owner": { + "login": "mikesplain", + "id": 881965, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/881965?v=4", + "html_url": "https:\/\/github.com\/mikesplain" + }, + "html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook", + "description": "A chef cookbook to test the GHOST vulnerability", + "fork": false, + "created_at": "2015-01-27T20:34:42Z", + "updated_at": "2017-09-29T11:32:54Z", + "pushed_at": "2015-01-27T21:41:24Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 29941036, + "name": "CVE-2015-0235-test", + "full_name": "aaronfay\/CVE-2015-0235-test", + "owner": { + "login": "aaronfay", + "id": 1033941, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1033941?v=4", + "html_url": "https:\/\/github.com\/aaronfay" + }, + "html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test", + "description": "Ansible playbook to check vulnerability for CVE-2015-0235", + "fork": false, + "created_at": "2015-01-27T23:45:22Z", + "updated_at": "2023-03-07T20:55:14Z", + "pushed_at": "2015-01-29T03:33:29Z", + "stargazers_count": 15, + "watchers_count": 15, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 15, + "score": 0, + "subscribers_count": 3 + }, { "id": 29942046, "name": "ghost", @@ -149,6 +209,66 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 30004399, + "name": "cfengine-CVE_2015_0235", + "full_name": "nickanderson\/cfengine-CVE_2015_0235", + "owner": { + "login": "nickanderson", + "id": 202896, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4", + "html_url": "https:\/\/github.com\/nickanderson" + }, + "html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235", + "description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability", + "fork": false, + "created_at": "2015-01-29T04:58:54Z", + "updated_at": "2016-02-13T01:41:47Z", + "pushed_at": "2015-01-29T21:23:45Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 30008427, + "name": "cookbook-update-glibc", + "full_name": "koudaiii-archives\/cookbook-update-glibc", + "owner": { + "login": "koudaiii-archives", + "id": 51727289, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51727289?v=4", + "html_url": "https:\/\/github.com\/koudaiii-archives" + }, + "html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc", + "description": "cookbook for update glibc. CVE-2015-0235(GHOST)", + "fork": false, + "created_at": "2015-01-29T07:14:17Z", + "updated_at": "2023-01-28T20:14:16Z", + "pushed_at": "2015-01-29T07:38:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 30019912, "name": "ghostbusters15", @@ -179,6 +299,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 30066365, + "name": "CVE-2015-0235", + "full_name": "tobyzxj\/CVE-2015-0235", + "owner": { + "login": "tobyzxj", + "id": 4661855, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4661855?v=4", + "html_url": "https:\/\/github.com\/tobyzxj" + }, + "html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235", + "description": "glibc gethostbyname bug", + "fork": false, + "created_at": "2015-01-30T09:58:09Z", + "updated_at": "2020-10-17T20:24:46Z", + "pushed_at": "2015-01-30T10:02:28Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 2 + }, { "id": 30183649, "name": "CVE-2015-0235-workaround", diff --git a/2015/CVE-2015-2291.json b/2015/CVE-2015-2291.json index b21ca59a76..3e6f9a017c 100644 --- a/2015/CVE-2015-2291.json +++ b/2015/CVE-2015-2291.json @@ -32,21 +32,21 @@ { "id": 506108089, "name": "CVE-2015-2291", - "full_name": "Exploitables\/CVE-2015-2291", + "full_name": "expFlash\/CVE-2015-2291", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2015-2291", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2015-2291", "description": "(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.", "fork": false, "created_at": "2022-06-22T05:22:57Z", - "updated_at": "2023-06-09T08:38:21Z", + "updated_at": "2023-06-28T03:35:53Z", "pushed_at": "2023-06-22T19:13:55Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 13, + "watchers": 12, "score": 0, "subscribers_count": 3 } diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index bb32db4148..c3dcc1afdf 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-06-27T07:54:12Z", + "updated_at": "2023-06-28T06:04:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1714, - "watchers_count": 1714, + "stargazers_count": 1715, + "watchers_count": 1715, "has_discussions": false, "forks_count": 327, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 327, - "watchers": 1714, + "watchers": 1715, "score": 0, "subscribers_count": 34 }, diff --git a/2016/CVE-2016-3088.json b/2016/CVE-2016-3088.json index e5cb1b3666..317935818e 100644 --- a/2016/CVE-2016-3088.json +++ b/2016/CVE-2016-3088.json @@ -167,10 +167,10 @@ "description": "ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。", "fork": false, "created_at": "2022-04-02T08:40:10Z", - "updated_at": "2023-06-27T07:07:11Z", + "updated_at": "2023-06-28T01:05:47Z", "pushed_at": "2022-04-02T08:55:07Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -179,7 +179,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index da516dbe99..b5a4fd6f47 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -452,7 +452,7 @@ "stargazers_count": 748, "watchers_count": 748, "has_discussions": false, - "forks_count": 439, + "forks_count": 438, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -462,7 +462,7 @@ "exploit" ], "visibility": "public", - "forks": 439, + "forks": 438, "watchers": 748, "score": 0, "subscribers_count": 11 @@ -1150,13 +1150,13 @@ "stargazers_count": 247, "watchers_count": 247, "has_discussions": false, - "forks_count": 75, + "forks_count": 74, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 75, + "forks": 74, "watchers": 247, "score": 0, "subscribers_count": 4 diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 05120832a4..9a82b0c293 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-06-27T07:54:12Z", + "updated_at": "2023-06-28T06:04:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1714, - "watchers_count": 1714, + "stargazers_count": 1715, + "watchers_count": 1715, "has_discussions": false, "forks_count": 327, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 327, - "watchers": 1714, + "watchers": 1715, "score": 0, "subscribers_count": 34 }, diff --git a/2017/CVE-2017-8759.json b/2017/CVE-2017-8759.json index 505611b9e6..b899248c38 100644 --- a/2017/CVE-2017-8759.json +++ b/2017/CVE-2017-8759.json @@ -258,10 +258,10 @@ "description": "Simple C# implementation of CVE-2017-8759", "fork": false, "created_at": "2017-09-17T22:05:56Z", - "updated_at": "2022-10-15T14:05:47Z", + "updated_at": "2023-06-28T00:40:31Z", "pushed_at": "2017-09-17T22:20:36Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -274,7 +274,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 7873f0b575..c6c8695265 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -59,6 +59,66 @@ "score": 0, "subscribers_count": 22 }, + { + "id": 153477523, + "name": "CVE-2018-10933", + "full_name": "hook-s3c\/CVE-2018-10933", + "owner": { + "login": "hook-s3c", + "id": 31825993, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4", + "html_url": "https:\/\/github.com\/hook-s3c" + }, + "html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933", + "description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit", + "fork": false, + "created_at": "2018-10-17T15:09:41Z", + "updated_at": "2021-12-05T20:25:44Z", + "pushed_at": "2018-10-17T15:09:42Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 153506738, + "name": "CVE-2018-10933", + "full_name": "kn6869610\/CVE-2018-10933", + "owner": { + "login": "kn6869610", + "id": 6917744, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4", + "html_url": "https:\/\/github.com\/kn6869610" + }, + "html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933", + "description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.", + "fork": false, + "created_at": "2018-10-17T18:44:05Z", + "updated_at": "2021-12-05T20:25:52Z", + "pushed_at": "2018-10-17T18:45:30Z", + "stargazers_count": 14, + "watchers_count": 14, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 14, + "score": 0, + "subscribers_count": 2 + }, { "id": 153534574, "name": "libssh-scanner", @@ -89,6 +149,101 @@ "score": 0, "subscribers_count": 18 }, + { + "id": 153562229, + "name": "CVE-2018-10933_ssh", + "full_name": "likescam\/CVE-2018-10933_ssh", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh", + "description": null, + "fork": false, + "created_at": "2018-10-18T04:10:25Z", + "updated_at": "2021-12-05T20:26:01Z", + "pushed_at": "2018-10-18T04:10:38Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 153598283, + "name": "CVE-2018-10933-libSSH-Authentication-Bypass", + "full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass", + "description": null, + "fork": false, + "created_at": "2018-10-18T09:27:08Z", + "updated_at": "2021-12-05T20:26:14Z", + "pushed_at": "2018-10-18T09:27:22Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0, + "subscribers_count": 1 + }, + { + "id": 153643745, + "name": "hunt-for-cve-2018-10933", + "full_name": "marco-lancini\/hunt-for-cve-2018-10933", + "owner": { + "login": "marco-lancini", + "id": 1472968, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4", + "html_url": "https:\/\/github.com\/marco-lancini" + }, + "html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933", + "description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)", + "fork": false, + "created_at": "2018-10-18T15:08:25Z", + "updated_at": "2023-06-20T11:06:21Z", + "pushed_at": "2018-10-18T15:11:35Z", + "stargazers_count": 13, + "watchers_count": 13, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "elasticsearch", + "exploit", + "nmap", + "pentesting" + ], + "visibility": "public", + "forks": 4, + "watchers": 13, + "score": 0, + "subscribers_count": 2 + }, { "id": 153675108, "name": "cve-2018-10933", @@ -149,6 +304,100 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 153855090, + "name": "CVE-2018-10933", + "full_name": "jas502n\/CVE-2018-10933", + "owner": { + "login": "jas502n", + "id": 16593068, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", + "html_url": "https:\/\/github.com\/jas502n" + }, + "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933", + "description": "libssh CVE-2018-10933", + "fork": false, + "created_at": "2018-10-20T00:24:04Z", + "updated_at": "2023-05-23T04:45:13Z", + "pushed_at": "2018-10-20T00:29:04Z", + "stargazers_count": 20, + "watchers_count": 20, + "has_discussions": false, + "forks_count": 6, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 6, + "watchers": 20, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 153856713, + "name": "cve-2018-10933_poc", + "full_name": "ninp0\/cve-2018-10933_poc", + "owner": { + "login": "ninp0", + "id": 1008583, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4", + "html_url": "https:\/\/github.com\/ninp0" + }, + "html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc", + "description": "Variant of hackerhouse-opensource\/cve-2018-10933", + "fork": false, + "created_at": "2018-10-20T00:53:24Z", + "updated_at": "2018-10-22T15:05:53Z", + "pushed_at": "2018-10-20T01:53:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2018-10933", + "exploit", + "poc" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 2 + }, + { + "id": 153878160, + "name": "CVE-2018-10933_Scanner", + "full_name": "pghook\/CVE-2018-10933_Scanner", + "owner": { + "login": "pghook", + "id": 14160529, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4", + "html_url": "https:\/\/github.com\/pghook" + }, + "html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner", + "description": null, + "fork": false, + "created_at": "2018-10-20T06:53:59Z", + "updated_at": "2020-05-15T17:20:56Z", + "pushed_at": "2018-10-20T04:54:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + }, { "id": 153920395, "name": "POC-CVE-2018-10933", @@ -179,6 +428,36 @@ "score": 0, "subscribers_count": 3 }, + { + "id": 153975086, + "name": "pythonprojects-CVE-2018-10933", + "full_name": "shifa123\/pythonprojects-CVE-2018-10933", + "owner": { + "login": "shifa123", + "id": 18241082, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4", + "html_url": "https:\/\/github.com\/shifa123" + }, + "html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933", + "description": "CVE-2018-10933", + "fork": false, + "created_at": "2018-10-21T05:01:12Z", + "updated_at": "2022-01-03T19:20:42Z", + "pushed_at": "2018-10-21T05:13:13Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 3, + "score": 0, + "subscribers_count": 2 + }, { "id": 154050332, "name": "CVE-2018-10933", diff --git a/2018/CVE-2018-11235.json b/2018/CVE-2018-11235.json index fb24e50e53..7991b59ed2 100644 --- a/2018/CVE-2018-11235.json +++ b/2018/CVE-2018-11235.json @@ -664,5 +664,35 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 659564459, + "name": "lab", + "full_name": "theerachaich\/lab", + "owner": { + "login": "theerachaich", + "id": 72238539, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72238539?v=4", + "html_url": "https:\/\/github.com\/theerachaich" + }, + "html_url": "https:\/\/github.com\/theerachaich\/lab", + "description": "pentesterlab_CVE-2018-11235: Git Submodule RCE", + "fork": false, + "created_at": "2023-06-28T05:31:08Z", + "updated_at": "2023-06-28T05:31:09Z", + "pushed_at": "2023-06-28T05:31:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 63daa9f337..4ff3a9ad59 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -59,6 +59,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 152906288, + "name": "MikroRoot", + "full_name": "syrex1013\/MikroRoot", + "owner": { + "login": "syrex1013", + "id": 31669127, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4", + "html_url": "https:\/\/github.com\/syrex1013" + }, + "html_url": "https:\/\/github.com\/syrex1013\/MikroRoot", + "description": "Automated version of CVE-2018-14847 (MikroTik Exploit)", + "fork": false, + "created_at": "2018-10-13T19:17:42Z", + "updated_at": "2021-12-06T20:08:10Z", + "pushed_at": "2018-10-14T08:39:24Z", + "stargazers_count": 15, + "watchers_count": 15, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 15, + "score": 0, + "subscribers_count": 3 + }, { "id": 161894724, "name": "CVE-2018-14847", diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 659988a894..20b68c5722 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -587,10 +587,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-06-27T07:54:12Z", + "updated_at": "2023-06-28T06:04:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1714, - "watchers_count": 1714, + "stargazers_count": 1715, + "watchers_count": 1715, "has_discussions": false, "forks_count": 327, "allow_forking": true, @@ -620,7 +620,7 @@ ], "visibility": "public", "forks": 327, - "watchers": 1714, + "watchers": 1715, "score": 0, "subscribers_count": 34 }, diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json index f7e9b903bd..23f63e22fa 100644 --- a/2018/CVE-2018-2893.json +++ b/2018/CVE-2018-2893.json @@ -149,6 +149,36 @@ "score": 0, "subscribers_count": 0 }, + { + "id": 151921677, + "name": "CVE-2018-2893", + "full_name": "jas502n\/CVE-2018-2893", + "owner": { + "login": "jas502n", + "id": 16593068, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", + "html_url": "https:\/\/github.com\/jas502n" + }, + "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-2893", + "description": "CVE-2018-2893", + "fork": false, + "created_at": "2018-10-07T08:41:14Z", + "updated_at": "2023-06-02T07:03:04Z", + "pushed_at": "2018-10-07T09:53:54Z", + "stargazers_count": 11, + "watchers_count": 11, + "has_discussions": false, + "forks_count": 9, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 9, + "watchers": 11, + "score": 0, + "subscribers_count": 1 + }, { "id": 219763712, "name": "CVE-2018-2893", diff --git a/2018/CVE-2018-3990.json b/2018/CVE-2018-3990.json index e3cca06b06..f5a6c55acf 100644 --- a/2018/CVE-2018-3990.json +++ b/2018/CVE-2018-3990.json @@ -1,19 +1,19 @@ [ { "id": 508145181, - "name": "CVE-2018-3990-TALOS-2018-0658", - "full_name": "Exploitables\/CVE-2018-3990-TALOS-2018-0658", + "name": "CVE-2018-3990", + "full_name": "expFlash\/CVE-2018-3990", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2018-3990-TALOS-2018-0658", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2018-3990", "description": "An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.", "fork": false, "created_at": "2022-06-28T03:48:09Z", - "updated_at": "2023-06-09T08:38:28Z", + "updated_at": "2023-06-28T03:51:30Z", "pushed_at": "2022-06-29T10:53:31Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index ecaac7a1df..04c87e90c9 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -13,10 +13,10 @@ "description": "CVE-2019-15107 Webmin RCE (unauthorized)", "fork": false, "created_at": "2019-08-19T07:43:16Z", - "updated_at": "2023-04-23T20:17:49Z", + "updated_at": "2023-06-28T02:05:55Z", "pushed_at": "2019-09-02T16:06:19Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 57, + "watchers": 58, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-18845.json b/2019/CVE-2019-18845.json index cc2ecae0f9..52e1f54cb7 100644 --- a/2019/CVE-2019-18845.json +++ b/2019/CVE-2019-18845.json @@ -2,14 +2,14 @@ { "id": 512342756, "name": "CVE-2019-18845", - "full_name": "Exploitables\/CVE-2019-18845", + "full_name": "expFlash\/CVE-2019-18845", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2019-18845", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2019-18845", "description": "The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\\SYSTEM privileges, by mapping \\Device\\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.", "fork": false, "created_at": "2022-07-10T04:19:35Z", diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 83d28a53e8..3f3313d2ad 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -43,10 +43,10 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2023-06-27T21:29:33Z", + "updated_at": "2023-06-28T01:51:03Z", "pushed_at": "2022-04-14T18:23:38Z", - "stargazers_count": 301, - "watchers_count": 301, + "stargazers_count": 302, + "watchers_count": 302, "has_discussions": false, "forks_count": 84, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 84, - "watchers": 301, + "watchers": 302, "score": 0, "subscribers_count": 12 }, diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index ef6af55faa..bd9ad55688 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -908,10 +908,10 @@ "description": "Indicator of Compromise Scanner for CVE-2019-19781", "fork": false, "created_at": "2020-01-21T23:13:00Z", - "updated_at": "2023-02-10T10:18:43Z", + "updated_at": "2023-06-28T02:47:15Z", "pushed_at": "2020-03-25T16:48:30Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -920,7 +920,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 58, + "watchers": 57, "score": 0, "subscribers_count": 13 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 44975fbfcd..f44a256fcc 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-06-27T07:54:12Z", + "updated_at": "2023-06-28T06:04:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1714, - "watchers_count": 1714, + "stargazers_count": 1715, + "watchers_count": 1715, "has_discussions": false, "forks_count": 327, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 327, - "watchers": 1714, + "watchers": 1715, "score": 0, "subscribers_count": 34 } diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json index bed4084b0b..f3ee312a6d 100644 --- a/2020/CVE-2020-0041.json +++ b/2020/CVE-2020-0041.json @@ -13,10 +13,10 @@ "description": "Exploits for Android Binder bug CVE-2020-0041", "fork": false, "created_at": "2020-03-31T17:53:57Z", - "updated_at": "2023-06-18T18:04:24Z", + "updated_at": "2023-06-28T00:44:32Z", "pushed_at": "2020-04-08T08:55:30Z", - "stargazers_count": 205, - "watchers_count": 205, + "stargazers_count": 206, + "watchers_count": 206, "has_discussions": false, "forks_count": 68, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 68, - "watchers": 205, + "watchers": 206, "score": 0, "subscribers_count": 10 }, diff --git a/2020/CVE-2020-17382.json b/2020/CVE-2020-17382.json index ba938cc079..eeded807d8 100644 --- a/2020/CVE-2020-17382.json +++ b/2020/CVE-2020-17382.json @@ -32,14 +32,14 @@ { "id": 579880808, "name": "CVE-2020-17382", - "full_name": "Exploitables\/CVE-2020-17382", + "full_name": "expFlash\/CVE-2020-17382", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2020-17382", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2020-17382", "description": "The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).", "fork": false, "created_at": "2022-12-19T07:02:18Z", diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 86316bd01a..d5cf0d54fc 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-06-27T07:54:12Z", + "updated_at": "2023-06-28T06:04:55Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1714, - "watchers_count": 1714, + "stargazers_count": 1715, + "watchers_count": 1715, "has_discussions": false, "forks_count": 327, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 327, - "watchers": 1714, + "watchers": 1715, "score": 0, "subscribers_count": 34 }, diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index 876296839b..837d7f5fdc 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -13,10 +13,10 @@ "description": "Exploit to SYSTEM for CVE-2021-21551", "fork": false, "created_at": "2021-05-13T13:23:38Z", - "updated_at": "2023-06-13T00:56:20Z", + "updated_at": "2023-06-28T05:04:47Z", "pushed_at": "2021-05-20T20:33:09Z", - "stargazers_count": 236, - "watchers_count": 236, + "stargazers_count": 237, + "watchers_count": 237, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 236, + "watchers": 237, "score": 0, "subscribers_count": 10 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index ed2fca5c7e..c5669bef77 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-06-27T03:19:31Z", + "updated_at": "2023-06-28T06:06:01Z", "pushed_at": "2023-05-14T12:08:39Z", - "stargazers_count": 949, - "watchers_count": 949, + "stargazers_count": 950, + "watchers_count": 950, "has_discussions": false, "forks_count": 121, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 121, - "watchers": 949, + "watchers": 950, "score": 0, "subscribers_count": 9 } diff --git a/2021/CVE-2021-27965.json b/2021/CVE-2021-27965.json index 247dbcb6df..3b6e2cdf77 100644 --- a/2021/CVE-2021-27965.json +++ b/2021/CVE-2021-27965.json @@ -77,14 +77,14 @@ { "id": 512343252, "name": "CVE-2021-27965", - "full_name": "Exploitables\/CVE-2021-27965", + "full_name": "expFlash\/CVE-2021-27965", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-27965", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2021-27965", "description": "The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.", "fork": false, "created_at": "2022-07-10T04:22:55Z", diff --git a/2021/CVE-2021-3438.json b/2021/CVE-2021-3438.json index 243bc1f103..54d46887e8 100644 --- a/2021/CVE-2021-3438.json +++ b/2021/CVE-2021-3438.json @@ -32,14 +32,14 @@ { "id": 643396878, "name": "CVE-2021-3438", - "full_name": "Exploitables\/CVE-2021-3438", + "full_name": "expFlash\/CVE-2021-3438", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-3438", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2021-3438", "description": "A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.", "fork": false, "created_at": "2023-05-21T02:58:10Z", diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index e0b60c2da5..303f57e922 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -174,7 +174,7 @@ "stargazers_count": 972, "watchers_count": 972, "has_discussions": false, - "forks_count": 316, + "forks_count": 315, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -184,7 +184,7 @@ "poc" ], "visibility": "public", - "forks": 316, + "forks": 315, "watchers": 972, "score": 0, "subscribers_count": 15 diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 8894ffda3a..b0ac5ca43e 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -48,10 +48,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2023-06-23T12:16:59Z", + "updated_at": "2023-06-28T01:37:46Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 601, - "watchers_count": 601, + "stargazers_count": 602, + "watchers_count": 602, "has_discussions": false, "forks_count": 107, "allow_forking": true, @@ -60,7 +60,7 @@ "topics": [], "visibility": "public", "forks": 107, - "watchers": 601, + "watchers": 602, "score": 0, "subscribers_count": 11 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 888d87d43f..f298367bca 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,10 +13,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2023-06-27T03:27:20Z", + "updated_at": "2023-06-28T01:36:41Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1223, - "watchers_count": 1223, + "stargazers_count": 1224, + "watchers_count": 1224, "has_discussions": false, "forks_count": 314, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 314, - "watchers": 1223, + "watchers": 1224, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 4b54f7eba3..9f48a3844b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2023-06-27T08:55:55Z", + "updated_at": "2023-06-28T06:05:50Z", "pushed_at": "2023-02-08T23:41:04Z", - "stargazers_count": 1605, - "watchers_count": 1605, + "stargazers_count": 1606, + "watchers_count": 1606, "has_discussions": false, "forks_count": 471, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 471, - "watchers": 1605, + "watchers": 1606, "score": 0, "subscribers_count": 25 }, @@ -1268,10 +1268,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2023-06-27T21:26:15Z", + "updated_at": "2023-06-28T04:32:22Z", "pushed_at": "2023-06-13T09:17:54Z", - "stargazers_count": 692, - "watchers_count": 692, + "stargazers_count": 694, + "watchers_count": 694, "has_discussions": false, "forks_count": 114, "allow_forking": true, @@ -1285,7 +1285,7 @@ ], "visibility": "public", "forks": 114, - "watchers": 692, + "watchers": 694, "score": 0, "subscribers_count": 10 }, @@ -3703,7 +3703,7 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2023-06-27T08:56:06Z", + "updated_at": "2023-06-28T04:35:55Z", "pushed_at": "2022-11-23T18:23:24Z", "stargazers_count": 3260, "watchers_count": 3260, diff --git a/2021/CVE-2021-44852.json b/2021/CVE-2021-44852.json index 98625217e4..c712e6386c 100644 --- a/2021/CVE-2021-44852.json +++ b/2021/CVE-2021-44852.json @@ -2,14 +2,14 @@ { "id": 617286129, "name": "CVE-2021-44852", - "full_name": "Exploitables\/CVE-2021-44852", + "full_name": "expFlash\/CVE-2021-44852", "owner": { - "login": "Exploitables", + "login": "expFlash", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", - "html_url": "https:\/\/github.com\/Exploitables" + "html_url": "https:\/\/github.com\/expFlash" }, - "html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-44852", + "html_url": "https:\/\/github.com\/expFlash\/CVE-2021-44852", "description": "An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.", "fork": false, "created_at": "2023-03-22T04:11:03Z", diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 659b5a62d1..7ca175a741 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -108,13 +108,13 @@ "stargazers_count": 247, "watchers_count": 247, "has_discussions": false, - "forks_count": 75, + "forks_count": 74, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 75, + "forks": 74, "watchers": 247, "score": 0, "subscribers_count": 4 @@ -138,13 +138,13 @@ "stargazers_count": 1046, "watchers_count": 1046, "has_discussions": false, - "forks_count": 221, + "forks_count": 220, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 221, + "forks": 220, "watchers": 1046, "score": 0, "subscribers_count": 17 diff --git a/2022/CVE-2022-1096.json b/2022/CVE-2022-1096.json index ea0cd264a7..11ec7a7564 100644 --- a/2022/CVE-2022-1096.json +++ b/2022/CVE-2022-1096.json @@ -27,6 +27,6 @@ "forks": 3, "watchers": 4, "score": 0, - "subscribers_count": 2 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1292.json b/2022/CVE-2022-1292.json index b6400a6138..40a5a56531 100644 --- a/2022/CVE-2022-1292.json +++ b/2022/CVE-2022-1292.json @@ -183,6 +183,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json index 0b4a434798..0697596e4c 100644 --- a/2022/CVE-2022-20421.json +++ b/2022/CVE-2022-20421.json @@ -13,10 +13,10 @@ "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)", "fork": false, "created_at": "2023-03-23T10:25:59Z", - "updated_at": "2023-06-27T21:58:35Z", + "updated_at": "2023-06-28T00:39:15Z", "pushed_at": "2023-05-27T15:39:41Z", - "stargazers_count": 153, - "watchers_count": 153, + "stargazers_count": 154, + "watchers_count": 154, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 153, + "watchers": 154, "score": 0, "subscribers_count": 4 } diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index 64b8ed0c17..9decc28524 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -18,13 +18,13 @@ "stargazers_count": 221, "watchers_count": 221, "has_discussions": false, - "forks_count": 40, + "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 40, + "forks": 41, "watchers": 221, "score": 0, "subscribers_count": 8 diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index b75ec8b6fc..d50eda6967 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -18,7 +18,7 @@ "stargazers_count": 224, "watchers_count": 224, "has_discussions": false, - "forks_count": 45, + "forks_count": 44, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -32,7 +32,7 @@ "windows-boot" ], "visibility": "public", - "forks": 45, + "forks": 44, "watchers": 224, "score": 0, "subscribers_count": 9 diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index c95bbda6be..a73499a790 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -98,13 +98,13 @@ "stargazers_count": 367, "watchers_count": 367, "has_discussions": false, - "forks_count": 99, + "forks_count": 98, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 99, + "forks": 98, "watchers": 367, "score": 0, "subscribers_count": 10 diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 2c891e905a..2eeab47b46 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -766,10 +766,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2023-06-27T03:19:31Z", + "updated_at": "2023-06-28T06:06:01Z", "pushed_at": "2023-05-14T12:08:39Z", - "stargazers_count": 949, - "watchers_count": 949, + "stargazers_count": 950, + "watchers_count": 950, "has_discussions": false, "forks_count": 121, "allow_forking": true, @@ -785,9 +785,9 @@ ], "visibility": "public", "forks": 121, - "watchers": 949, + "watchers": 950, "score": 0, - "subscribers_count": 9 + "subscribers_count": 10 }, { "id": 554685669, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index d90c399cb7..efc1775606 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -207,7 +207,7 @@ "forks": 11, "watchers": 21, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 476300392, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 529313d616..38565510fd 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -765,10 +765,10 @@ "description": null, "fork": false, "created_at": "2022-06-07T09:19:02Z", - "updated_at": "2023-06-11T16:49:19Z", + "updated_at": "2023-06-28T06:05:56Z", "pushed_at": "2022-06-07T10:35:18Z", - "stargazers_count": 284, - "watchers_count": 284, + "stargazers_count": 285, + "watchers_count": 285, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -777,7 +777,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 284, + "watchers": 285, "score": 0, "subscribers_count": 7 }, diff --git a/2022/CVE-2022-26717.json b/2022/CVE-2022-26717.json index 13f7745910..07e59d9cdb 100644 --- a/2022/CVE-2022-26717.json +++ b/2022/CVE-2022-26717.json @@ -27,6 +27,6 @@ "forks": 15, "watchers": 55, "score": 0, - "subscribers_count": 7 + "subscribers_count": 8 } ] \ No newline at end of file diff --git a/2022/CVE-2022-28346.json b/2022/CVE-2022-28346.json index a8c919a5fa..5f90de826d 100644 --- a/2022/CVE-2022-28346.json +++ b/2022/CVE-2022-28346.json @@ -117,6 +117,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29072.json b/2022/CVE-2022-29072.json index bbac0c9167..efe85c572e 100644 --- a/2022/CVE-2022-29072.json +++ b/2022/CVE-2022-29072.json @@ -27,7 +27,7 @@ "forks": 109, "watchers": 689, "score": 0, - "subscribers_count": 25 + "subscribers_count": 26 }, { "id": 482929231, diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json index 3f57aa962e..11bdfbbd3f 100644 --- a/2022/CVE-2022-32250.json +++ b/2022/CVE-2022-32250.json @@ -27,7 +27,7 @@ "forks": 39, "watchers": 136, "score": 0, - "subscribers_count": 6 + "subscribers_count": 7 }, { "id": 594075430, diff --git a/2022/CVE-2022-37708.json b/2022/CVE-2022-37708.json index 08d8922b35..ba90f2f98c 100644 --- a/2022/CVE-2022-37708.json +++ b/2022/CVE-2022-37708.json @@ -13,7 +13,7 @@ "description": "Docker CVE-2022-37708", "fork": false, "created_at": "2022-09-22T23:06:08Z", - "updated_at": "2023-06-26T15:02:13Z", + "updated_at": "2023-06-28T03:22:48Z", "pushed_at": "2022-09-23T00:07:17Z", "stargazers_count": 3, "watchers_count": 3, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 3fe798f7c3..21b915d312 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -30,6 +30,6 @@ "forks": 6, "watchers": 18, "score": 0, - "subscribers_count": 2 + "subscribers_count": 4 } ] \ No newline at end of file diff --git a/2022/CVE-2022-39841.json b/2022/CVE-2022-39841.json index 342023a35f..1f854a2e96 100644 --- a/2022/CVE-2022-39841.json +++ b/2022/CVE-2022-39841.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index d8820f8118..f1025e9619 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -463,7 +463,7 @@ "forks": 0, "watchers": 4, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 557616560, diff --git a/2022/CVE-2022-40687.json b/2022/CVE-2022-40687.json index 6cc664e71b..146027a8a5 100644 --- a/2022/CVE-2022-40687.json +++ b/2022/CVE-2022-40687.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 } ] \ No newline at end of file diff --git a/2022/CVE-2022-41218.json b/2022/CVE-2022-41218.json index 841a23e8b0..d61db9021c 100644 --- a/2022/CVE-2022-41218.json +++ b/2022/CVE-2022-41218.json @@ -13,10 +13,10 @@ "description": "Vulnerability Details for CVE-2022-41218", "fork": false, "created_at": "2022-09-30T07:12:23Z", - "updated_at": "2023-06-05T08:44:12Z", + "updated_at": "2023-06-28T04:03:32Z", "pushed_at": "2022-10-09T05:26:03Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 2 } diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index c8312fe1dd..09ef595837 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -1347,6 +1347,6 @@ "forks": 1, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index f4cd344ce8..55b6508f72 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -27,7 +27,7 @@ "forks": 39, "watchers": 248, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 596917149, diff --git a/2022/CVE-2022-4510.json b/2022/CVE-2022-4510.json index 8f3bc06323..324fd4cd7f 100644 --- a/2022/CVE-2022-4510.json +++ b/2022/CVE-2022-4510.json @@ -13,10 +13,10 @@ "description": "Binwalk Remote Command Execution", "fork": false, "created_at": "2023-02-06T20:53:49Z", - "updated_at": "2023-06-27T14:15:24Z", + "updated_at": "2023-06-28T04:23:19Z", "pushed_at": "2023-02-06T20:54:33Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -57,6 +57,6 @@ "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-46718.json b/2022/CVE-2022-46718.json index 80bff87ca0..fe60f7154b 100644 --- a/2022/CVE-2022-46718.json +++ b/2022/CVE-2022-46718.json @@ -27,6 +27,6 @@ "forks": 2, "watchers": 10, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2023/CVE-2023-2002.json b/2023/CVE-2023-2002.json index d6b437e649..f5b7c463ec 100644 --- a/2023/CVE-2023-2002.json +++ b/2023/CVE-2023-2002.json @@ -13,10 +13,10 @@ "description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user", "fork": false, "created_at": "2023-04-16T10:05:13Z", - "updated_at": "2023-06-27T07:01:23Z", + "updated_at": "2023-06-28T02:54:34Z", "pushed_at": "2023-05-31T16:06:34Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 71, + "watchers": 72, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-20178.json b/2023/CVE-2023-20178.json index 14a0c26320..6d4d3b9ffb 100644 --- a/2023/CVE-2023-20178.json +++ b/2023/CVE-2023-20178.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-18T12:22:57Z", - "updated_at": "2023-06-27T11:20:51Z", + "updated_at": "2023-06-28T01:40:14Z", "pushed_at": "2023-06-18T12:41:52Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 72, + "watchers": 73, "score": 0, "subscribers_count": 6 } diff --git a/2023/CVE-2023-20887.json b/2023/CVE-2023-20887.json index 754af3578c..4e2c992337 100644 --- a/2023/CVE-2023-20887.json +++ b/2023/CVE-2023-20887.json @@ -13,10 +13,10 @@ "description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)", "fork": false, "created_at": "2023-06-13T13:17:23Z", - "updated_at": "2023-06-27T14:36:07Z", + "updated_at": "2023-06-28T02:49:07Z", "pushed_at": "2023-06-13T14:39:17Z", - "stargazers_count": 193, - "watchers_count": 193, + "stargazers_count": 194, + "watchers_count": 194, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 37, - "watchers": 193, + "watchers": 194, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 8209e992c1..724afcd0c0 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -13,12 +13,12 @@ "description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测", "fork": false, "created_at": "2023-02-13T03:42:27Z", - "updated_at": "2023-06-27T09:16:29Z", + "updated_at": "2023-06-28T04:10:25Z", "pushed_at": "2023-04-23T17:54:49Z", - "stargazers_count": 585, - "watchers_count": 585, + "stargazers_count": 586, + "watchers_count": 586, "has_discussions": false, - "forks_count": 94, + "forks_count": 95, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,8 +29,8 @@ "weblogic" ], "visibility": "public", - "forks": 94, - "watchers": 585, + "forks": 95, + "watchers": 586, "score": 0, "subscribers_count": 6 }, diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 8bb6452958..1651ff00a1 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -47,10 +47,10 @@ "description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.", "fork": false, "created_at": "2023-05-22T03:06:31Z", - "updated_at": "2023-06-27T18:00:44Z", + "updated_at": "2023-06-28T06:21:51Z", "pushed_at": "2023-06-03T19:35:51Z", - "stargazers_count": 133, - "watchers_count": 133, + "stargazers_count": 134, + "watchers_count": 134, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -67,7 +67,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 133, + "watchers": 134, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json index 16e88c3782..5eaafc2e29 100644 --- a/2023/CVE-2023-27997.json +++ b/2023/CVE-2023-27997.json @@ -103,10 +103,10 @@ "description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing", "fork": false, "created_at": "2023-06-16T20:15:36Z", - "updated_at": "2023-06-27T20:00:59Z", + "updated_at": "2023-06-28T05:43:21Z", "pushed_at": "2023-06-20T21:32:56Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 34, + "watchers": 36, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-29336.json b/2023/CVE-2023-29336.json index 0505028a72..05c36fb648 100644 --- a/2023/CVE-2023-29336.json +++ b/2023/CVE-2023-29336.json @@ -18,13 +18,13 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 4, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-32233.json b/2023/CVE-2023-32233.json index 2d3cad2d56..98e788cd0f 100644 --- a/2023/CVE-2023-32233.json +++ b/2023/CVE-2023-32233.json @@ -73,10 +73,10 @@ "description": "Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233", "fork": false, "created_at": "2023-05-16T05:58:03Z", - "updated_at": "2023-06-27T15:05:28Z", + "updated_at": "2023-06-28T04:46:40Z", "pushed_at": "2023-06-20T06:58:04Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 23, + "watchers": 26, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json index e8fb191c7e..f78c7057f8 100644 --- a/2023/CVE-2023-32784.json +++ b/2023/CVE-2023-32784.json @@ -90,7 +90,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 643690357, diff --git a/2023/CVE-2023-33243.json b/2023/CVE-2023-33243.json index bfe345f87f..85a2f960fd 100644 --- a/2023/CVE-2023-33243.json +++ b/2023/CVE-2023-33243.json @@ -27,6 +27,6 @@ "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json index 79f10a9b93..44844f91ed 100644 --- a/2023/CVE-2023-34362.json +++ b/2023/CVE-2023-34362.json @@ -108,13 +108,13 @@ "stargazers_count": 55, "watchers_count": 55, "has_discussions": false, - "forks_count": 20, + "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 20, + "forks": 21, "watchers": 55, "score": 0, "subscribers_count": 3 diff --git a/README.md b/README.md index f70ed1d03f..2861a8e3f7 100644 --- a/README.md +++ b/README.md @@ -8813,7 +8813,7 @@ - [TobiasS1402/CVE-2021-3438](https://github.com/TobiasS1402/CVE-2021-3438) -- [Exploitables/CVE-2021-3438](https://github.com/Exploitables/CVE-2021-3438) +- [expFlash/CVE-2021-3438](https://github.com/expFlash/CVE-2021-3438) ### CVE-2021-3441 (2021-10-29) @@ -10521,7 +10521,7 @@ - [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965) - [Jeromeyoung/CVE-2021-27965](https://github.com/Jeromeyoung/CVE-2021-27965) -- [Exploitables/CVE-2021-27965](https://github.com/Exploitables/CVE-2021-27965) +- [expFlash/CVE-2021-27965](https://github.com/expFlash/CVE-2021-27965) ### CVE-2021-28079 (2021-04-26) @@ -13834,7 +13834,7 @@ An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000. -- [Exploitables/CVE-2021-44852](https://github.com/Exploitables/CVE-2021-44852) +- [expFlash/CVE-2021-44852](https://github.com/expFlash/CVE-2021-44852) ### CVE-2021-45007 (2022-02-20) @@ -17852,7 +17852,7 @@ - [uf0o/CVE-2020-17382](https://github.com/uf0o/CVE-2020-17382) -- [Exploitables/CVE-2020-17382](https://github.com/Exploitables/CVE-2020-17382) +- [expFlash/CVE-2020-17382](https://github.com/expFlash/CVE-2020-17382) - [houseofxyz/CVE-2020-17382](https://github.com/houseofxyz/CVE-2020-17382) ### CVE-2020-17453 (2021-04-05) @@ -22545,7 +22545,7 @@ The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection. -- [Exploitables/CVE-2019-18845](https://github.com/Exploitables/CVE-2019-18845) +- [expFlash/CVE-2019-18845](https://github.com/expFlash/CVE-2019-18845) ### CVE-2019-18873 (2019-11-11) @@ -23345,6 +23345,7 @@ - [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893) - [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893) - [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893) +- [jas502n/CVE-2018-2893](https://github.com/jas502n/CVE-2018-2893) - [ianxtianxt/CVE-2018-2893](https://github.com/ianxtianxt/CVE-2018-2893) ### CVE-2018-2894 (2018-07-18) @@ -23457,7 +23458,7 @@ An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability. -- [Exploitables/CVE-2018-3990-TALOS-2018-0658](https://github.com/Exploitables/CVE-2018-3990-TALOS-2018-0658) +- [expFlash/CVE-2018-3990](https://github.com/expFlash/CVE-2018-3990) ### CVE-2018-4013 (2018-10-19) @@ -24706,10 +24707,19 @@ - [SoledaD208/CVE-2018-10933](https://github.com/SoledaD208/CVE-2018-10933) - [blacknbunny/CVE-2018-10933](https://github.com/blacknbunny/CVE-2018-10933) +- [hook-s3c/CVE-2018-10933](https://github.com/hook-s3c/CVE-2018-10933) +- [kn6869610/CVE-2018-10933](https://github.com/kn6869610/CVE-2018-10933) - [leapsecurity/libssh-scanner](https://github.com/leapsecurity/libssh-scanner) +- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh) +- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass) +- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933) - [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933) - [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933) +- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933) +- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc) +- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner) - [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933) +- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933) - [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933) - [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933) - [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933) @@ -24771,6 +24781,7 @@ - [twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration](https://github.com/twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration) - [SenSecurity/exploit](https://github.com/SenSecurity/exploit) - [EmaVirgRep/CVE-2018-11235](https://github.com/EmaVirgRep/CVE-2018-11235) +- [theerachaich/lab](https://github.com/theerachaich/lab) ### CVE-2018-11311 (2018-05-20) @@ -24887,6 +24898,13 @@ - [anmuxi-bai/CVE-2018-11790](https://github.com/anmuxi-bai/CVE-2018-11790) +### CVE-2018-12018 (2018-07-04) + +The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue. + + +- [k3v142/CVE-2018-12018](https://github.com/k3v142/CVE-2018-12018) + ### CVE-2018-12031 (2018-06-07) Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action. @@ -25198,6 +25216,7 @@ - [BasuCert/WinboxPoC](https://github.com/BasuCert/WinboxPoC) - [msterusky/WinboxExploit](https://github.com/msterusky/WinboxExploit) +- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot) - [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847) - [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast) - [Tr33-He11/winboxPOC](https://github.com/Tr33-He11/winboxPOC) @@ -29656,11 +29675,16 @@ - [fser/ghost-checker](https://github.com/fser/ghost-checker) +- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook) +- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test) - [piyokango/ghost](https://github.com/piyokango/ghost) - [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST) - [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST) - [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6) +- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235) +- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc) - [F88/ghostbusters15](https://github.com/F88/ghostbusters15) +- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235) - [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround) - [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit) - [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc) @@ -29890,7 +29914,7 @@ - [Tare05/Intel-CVE-2015-2291](https://github.com/Tare05/Intel-CVE-2015-2291) -- [Exploitables/CVE-2015-2291](https://github.com/Exploitables/CVE-2015-2291) +- [expFlash/CVE-2015-2291](https://github.com/expFlash/CVE-2015-2291) ### CVE-2015-2315 (2015-03-17) @@ -32248,7 +32272,7 @@ Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow. -- [Exploitables/CVE-2010-4502](https://github.com/Exploitables/CVE-2010-4502) +- [expFlash/CVE-2010-4502](https://github.com/expFlash/CVE-2010-4502) ### CVE-2010-4804 (2011-06-09) @@ -32306,7 +32330,7 @@ Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier, as distributed in SlySoft AnyDVD before 6.5.2.6, Virtual CloneDrive 5.4.2.3 and earlier, CloneDVD 2.9.2.0 and earlier, and CloneCD 5.3.1.3 and earlier, uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to cause a denial of service (system crash) via a crafted IOCTL call. -- [Exploitables/CVE-2009-0824](https://github.com/Exploitables/CVE-2009-0824) +- [expFlash/CVE-2009-0824](https://github.com/expFlash/CVE-2009-0824) ### CVE-2009-1151 (2009-03-26) @@ -32395,7 +32419,7 @@ Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024. -- [Exploitables/CVE-2009-4049](https://github.com/Exploitables/CVE-2009-4049) +- [expFlash/CVE-2009-4049](https://github.com/expFlash/CVE-2009-4049) ### CVE-2009-4092 (2009-11-27) @@ -33096,6 +33120,7 @@ - [rafaelh/CVE-2000-0649](https://github.com/rafaelh/CVE-2000-0649) +- [stevenvegar/cve-2000-0649](https://github.com/stevenvegar/cve-2000-0649) ### CVE-2000-0979 (2001-01-22)