From fd1c5df7eda0d87a800e682286307c9e2b79cf08 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 17 Mar 2023 21:29:09 +0900 Subject: [PATCH] Auto Update 2023/03/17 12:29:09 --- 2015/CVE-2015-3306.json | 8 ++-- 2016/CVE-2016-0638.json | 8 ++-- 2017/CVE-2017-11317.json | 8 ++-- 2017/CVE-2017-3248.json | 8 ++-- 2018/CVE-2018-2628.json | 8 ++-- 2018/CVE-2018-6789.json | 4 +- 2019/CVE-2019-0604.json | 8 ++-- 2019/CVE-2019-1040.json | 4 +- 2019/CVE-2019-11539.json | 8 ++-- 2019/CVE-2019-2618.json | 8 ++-- 2020/CVE-2020-1350.json | 8 ++-- 2020/CVE-2020-2551.json | 8 ++-- 2021/CVE-2021-20038.json | 8 ++-- 2021/CVE-2021-29447.json | 8 ++-- 2021/CVE-2021-40444.json | 12 +++--- 2021/CVE-2021-40449.json | 4 +- 2021/CVE-2021-41773.json | 12 +++--- 2021/CVE-2021-44228.json | 2 +- 2022/CVE-2022-20452.json | 8 ++-- 2022/CVE-2022-22963.json | 4 +- 2022/CVE-2022-36162.json | 8 ++-- 2022/CVE-2022-39197.json | 8 ++-- 2022/CVE-2022-41099.json | 8 ++-- 2022/CVE-2022-44268.json | 12 +++--- 2022/CVE-2022-46689.json | 8 ++-- 2023/CVE-2023-0179.json | 8 ++-- 2023/CVE-2023-1112.json | 8 ++-- 2023/CVE-2023-21608.json | 4 +- 2023/CVE-2023-21768.json | 24 ++++++------ 2023/CVE-2023-21839.json | 8 ++-- 2023/CVE-2023-23396.json | 8 ++-- 2023/CVE-2023-23397.json | 85 +++++++++++++++++++++++++++------------- 2023/CVE-2023-25610.json | 31 --------------- README.md | 4 +- 34 files changed, 183 insertions(+), 187 deletions(-) delete mode 100644 2023/CVE-2023-25610.json diff --git a/2015/CVE-2015-3306.json b/2015/CVE-2015-3306.json index 42875d520d..cadab117c5 100644 --- a/2015/CVE-2015-3306.json +++ b/2015/CVE-2015-3306.json @@ -71,10 +71,10 @@ "description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-08T14:19:51Z", - "updated_at": "2023-03-09T20:07:54Z", + "updated_at": "2023-03-17T07:06:16Z", "pushed_at": "2018-04-07T01:10:06Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 55, - "watchers": 103, + "watchers": 104, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 37e42e3744..056a5276b4 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-16T08:00:13Z", + "updated_at": "2023-03-17T08:08:02Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1641, - "watchers_count": 1641, + "stargazers_count": 1642, + "watchers_count": 1642, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1641, + "watchers": 1642, "score": 0 }, { diff --git a/2017/CVE-2017-11317.json b/2017/CVE-2017-11317.json index d974b6701c..0389076f0d 100644 --- a/2017/CVE-2017-11317.json +++ b/2017/CVE-2017-11317.json @@ -13,10 +13,10 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2023-03-10T07:30:21Z", + "updated_at": "2023-03-17T06:12:03Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 145, + "watchers_count": 145, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 144, + "watchers": 145, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 9dd7a1b32b..263161ec7a 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-16T08:00:13Z", + "updated_at": "2023-03-17T08:08:02Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1641, - "watchers_count": 1641, + "stargazers_count": 1642, + "watchers_count": 1642, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1641, + "watchers": 1642, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ad14ae78f2..6ae31f198d 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,10 +568,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-16T08:00:13Z", + "updated_at": "2023-03-17T08:08:02Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1641, - "watchers_count": 1641, + "stargazers_count": 1642, + "watchers_count": 1642, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -601,7 +601,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1641, + "watchers": 1642, "score": 0 }, { diff --git a/2018/CVE-2018-6789.json b/2018/CVE-2018-6789.json index 108363cbc5..59637d8535 100644 --- a/2018/CVE-2018-6789.json +++ b/2018/CVE-2018-6789.json @@ -100,8 +100,8 @@ "description": "This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.", "fork": false, "created_at": "2020-03-02T16:53:02Z", - "updated_at": "2022-07-04T09:46:01Z", - "pushed_at": "2020-03-03T07:57:30Z", + "updated_at": "2023-03-17T11:13:21Z", + "pushed_at": "2023-03-17T11:15:46Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, diff --git a/2019/CVE-2019-0604.json b/2019/CVE-2019-0604.json index 36497bdb28..d6664e0e86 100644 --- a/2019/CVE-2019-0604.json +++ b/2019/CVE-2019-0604.json @@ -71,10 +71,10 @@ "description": "cve-2019-0604 SharePoint RCE exploit", "fork": false, "created_at": "2019-06-26T15:00:29Z", - "updated_at": "2023-03-02T12:29:20Z", + "updated_at": "2023-03-17T09:36:17Z", "pushed_at": "2019-10-18T14:49:10Z", - "stargazers_count": 102, - "watchers_count": 102, + "stargazers_count": 104, + "watchers_count": 104, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -91,7 +91,7 @@ ], "visibility": "public", "forks": 66, - "watchers": 102, + "watchers": 104, "score": 0 }, { diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index f667b4aa76..e83aeea287 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -163,13 +163,13 @@ "stargazers_count": 71, "watchers_count": 71, "has_discussions": false, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, + "forks": 15, "watchers": 71, "score": 0 } diff --git a/2019/CVE-2019-11539.json b/2019/CVE-2019-11539.json index 999310a12f..cac9a77e87 100644 --- a/2019/CVE-2019-11539.json +++ b/2019/CVE-2019-11539.json @@ -13,10 +13,10 @@ "description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect", "fork": false, "created_at": "2019-09-04T13:06:02Z", - "updated_at": "2023-03-15T20:16:13Z", + "updated_at": "2023-03-17T10:42:52Z", "pushed_at": "2022-02-11T00:00:44Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 127, + "watchers_count": 127, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 39, - "watchers": 126, + "watchers": 127, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 07f72c3620..4ad5dfbb07 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -187,10 +187,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-16T08:00:13Z", + "updated_at": "2023-03-17T08:08:02Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1641, - "watchers_count": 1641, + "stargazers_count": 1642, + "watchers_count": 1642, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -220,7 +220,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1641, + "watchers": 1642, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index f803816e97..04fbf43ae6 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -13,10 +13,10 @@ "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473", "fork": false, "created_at": "2020-03-11T17:51:29Z", - "updated_at": "2023-03-12T03:08:12Z", + "updated_at": "2023-03-17T08:36:43Z", "pushed_at": "2021-08-16T18:16:20Z", - "stargazers_count": 154, - "watchers_count": 154, + "stargazers_count": 155, + "watchers_count": 155, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -42,7 +42,7 @@ ], "visibility": "public", "forks": 28, - "watchers": 154, + "watchers": 155, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 199f164e76..d0786afd53 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-16T08:00:13Z", + "updated_at": "2023-03-17T08:08:02Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1641, - "watchers_count": 1641, + "stargazers_count": 1642, + "watchers_count": 1642, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1641, + "watchers": 1642, "score": 0 }, { diff --git a/2021/CVE-2021-20038.json b/2021/CVE-2021-20038.json index 2f30815042..e9fe4c3178 100644 --- a/2021/CVE-2021-20038.json +++ b/2021/CVE-2021-20038.json @@ -13,10 +13,10 @@ "description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)", "fork": false, "created_at": "2022-01-11T02:25:25Z", - "updated_at": "2023-03-17T01:37:05Z", + "updated_at": "2023-03-17T06:26:40Z", "pushed_at": "2022-01-11T11:22:06Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 85, + "watchers": 86, "score": 0 }, { diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index 5060558d33..1f889269f4 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -13,10 +13,10 @@ "description": "WordPress - Authenticated XXE (CVE-2021-29447)", "fork": false, "created_at": "2021-04-16T20:41:26Z", - "updated_at": "2023-03-02T15:42:44Z", + "updated_at": "2023-03-17T10:38:33Z", "pushed_at": "2021-10-04T01:13:54Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 31, + "watchers": 33, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 6754bf395b..f22090e3ee 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -216,19 +216,19 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2023-03-11T07:56:06Z", + "updated_at": "2023-03-17T09:39:48Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1461, - "watchers_count": 1461, + "stargazers_count": 1462, + "watchers_count": 1462, "has_discussions": false, - "forks_count": 487, + "forks_count": 486, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 487, - "watchers": 1461, + "forks": 486, + "watchers": 1462, "score": 0 }, { diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index e0d7bbcddf..ad3f6af954 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -18,7 +18,7 @@ "stargazers_count": 440, "watchers_count": 440, "has_discussions": false, - "forks_count": 94, + "forks_count": 95, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -26,7 +26,7 @@ "cve-2021-40449" ], "visibility": "public", - "forks": 94, + "forks": 95, "watchers": 440, "score": 0 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 073f44ec35..cf04f5d613 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -841,12 +841,12 @@ "description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ", "fork": false, "created_at": "2021-10-07T01:31:13Z", - "updated_at": "2023-02-24T10:01:19Z", + "updated_at": "2023-03-17T09:41:58Z", "pushed_at": "2021-10-07T08:25:26Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, - "forks_count": 16, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -858,8 +858,8 @@ "pentesting" ], "visibility": "public", - "forks": 16, - "watchers": 57, + "forks": 15, + "watchers": 58, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 84c4bb6f82..b9e0893554 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -10766,7 +10766,7 @@ "fork": false, "created_at": "2022-01-16T16:39:19Z", "updated_at": "2022-04-02T16:13:36Z", - "pushed_at": "2023-03-04T11:04:18Z", + "pushed_at": "2023-03-17T09:09:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index a36d28b5a7..6bda86baed 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2023-03-17T03:31:30Z", + "updated_at": "2023-03-17T07:07:00Z", "pushed_at": "2023-01-10T16:25:49Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 177, + "watchers_count": 177, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 176, + "watchers": 177, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22963.json b/2022/CVE-2022-22963.json index 96bb815d5f..d52743a5fd 100644 --- a/2022/CVE-2022-22963.json +++ b/2022/CVE-2022-22963.json @@ -231,13 +231,13 @@ "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 14, "score": 0 }, diff --git a/2022/CVE-2022-36162.json b/2022/CVE-2022-36162.json index 153e74c543..5cf80be090 100644 --- a/2022/CVE-2022-36162.json +++ b/2022/CVE-2022-36162.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-08-15T20:36:51Z", - "updated_at": "2022-09-17T07:00:57Z", + "updated_at": "2023-03-17T11:49:32Z", "pushed_at": "2022-08-15T20:41:41Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index f9e7081407..2e02114f29 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -220,10 +220,10 @@ "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "fork": false, "created_at": "2022-09-26T08:58:21Z", - "updated_at": "2023-03-14T03:29:03Z", + "updated_at": "2023-03-17T09:55:26Z", "pushed_at": "2022-09-26T13:20:38Z", - "stargazers_count": 228, - "watchers_count": 228, + "stargazers_count": 229, + "watchers_count": 229, "has_discussions": false, "forks_count": 41, "allow_forking": true, @@ -236,7 +236,7 @@ ], "visibility": "public", "forks": 41, - "watchers": 228, + "watchers": 229, "score": 0 }, { diff --git a/2022/CVE-2022-41099.json b/2022/CVE-2022-41099.json index 4023aed50e..284db8ad09 100644 --- a/2022/CVE-2022-41099.json +++ b/2022/CVE-2022-41099.json @@ -13,10 +13,10 @@ "description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099", "fork": false, "created_at": "2023-01-13T21:27:03Z", - "updated_at": "2023-03-09T11:59:51Z", + "updated_at": "2023-03-17T07:53:49Z", "pushed_at": "2023-01-20T10:31:58Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index 7b14428444..65d9f5c324 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -13,19 +13,19 @@ "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator", "fork": false, "created_at": "2023-02-02T15:34:28Z", - "updated_at": "2023-03-17T06:09:21Z", + "updated_at": "2023-03-17T10:58:55Z", "pushed_at": "2023-02-02T16:53:37Z", - "stargazers_count": 207, - "watchers_count": 207, + "stargazers_count": 210, + "watchers_count": 210, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, - "watchers": 207, + "forks": 30, + "watchers": 210, "score": 0 }, { diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 747b5f17b8..31df749b56 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -129,10 +129,10 @@ "description": "File Manager for CVE-2022-46689", "fork": false, "created_at": "2022-12-28T22:13:35Z", - "updated_at": "2023-03-12T01:35:30Z", + "updated_at": "2023-03-17T08:50:43Z", "pushed_at": "2023-01-02T00:36:39Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -141,7 +141,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 78, + "watchers": 79, "score": 0 }, { diff --git a/2023/CVE-2023-0179.json b/2023/CVE-2023-0179.json index 6fae84d530..b7380fac74 100644 --- a/2023/CVE-2023-0179.json +++ b/2023/CVE-2023-0179.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-01-21T01:02:01Z", - "updated_at": "2023-03-17T05:31:27Z", + "updated_at": "2023-03-17T07:03:55Z", "pushed_at": "2023-02-16T13:49:47Z", - "stargazers_count": 135, - "watchers_count": 135, + "stargazers_count": 136, + "watchers_count": 136, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 135, + "watchers": 136, "score": 0 }, { diff --git a/2023/CVE-2023-1112.json b/2023/CVE-2023-1112.json index 139b4f5dfe..1940b9ca5e 100644 --- a/2023/CVE-2023-1112.json +++ b/2023/CVE-2023-1112.json @@ -13,10 +13,10 @@ "description": "Drag and Drop Multiple File Uploader PRO - Contact Form 7 v5.0.6.1 Path Traversal (CVE-2023-1112)", "fork": false, "created_at": "2023-02-04T03:03:05Z", - "updated_at": "2023-03-15T07:33:53Z", + "updated_at": "2023-03-17T11:24:22Z", "pushed_at": "2023-03-07T01:31:57Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 20, + "watchers": 21, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21608.json b/2023/CVE-2023-21608.json index c54dc8cd3b..a836c86903 100644 --- a/2023/CVE-2023-21608.json +++ b/2023/CVE-2023-21608.json @@ -18,7 +18,7 @@ "stargazers_count": 183, "watchers_count": 183, "has_discussions": false, - "forks_count": 40, + "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -34,7 +34,7 @@ "use-after-free" ], "visibility": "public", - "forks": 40, + "forks": 41, "watchers": 183, "score": 0 }, diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 4fcf6a1cbd..0ba4e6946d 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,19 +13,19 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2023-03-16T21:21:11Z", + "updated_at": "2023-03-17T07:38:28Z", "pushed_at": "2023-03-10T08:58:44Z", - "stargazers_count": 298, - "watchers_count": 298, + "stargazers_count": 299, + "watchers_count": 299, "has_discussions": false, - "forks_count": 112, + "forks_count": 113, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 112, - "watchers": 298, + "forks": 113, + "watchers": 299, "score": 0 }, { @@ -76,7 +76,7 @@ "stargazers_count": 86, "watchers_count": 86, "has_discussions": false, - "forks_count": 24, + "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -90,7 +90,7 @@ "windows" ], "visibility": "public", - "forks": 24, + "forks": 25, "watchers": 86, "score": 0 }, @@ -108,10 +108,10 @@ "description": "Windows_AFD_LPE_CVE-2023-21768", "fork": false, "created_at": "2023-03-13T20:32:50Z", - "updated_at": "2023-03-16T14:20:21Z", + "updated_at": "2023-03-17T07:37:03Z", "pushed_at": "2023-03-13T21:16:01Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -120,7 +120,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 2b7a4ead80..885b7aba05 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -13,10 +13,10 @@ "description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)", "fork": false, "created_at": "2023-02-13T03:42:27Z", - "updated_at": "2023-03-17T04:40:50Z", + "updated_at": "2023-03-17T07:52:14Z", "pushed_at": "2023-03-03T03:30:04Z", - "stargazers_count": 464, - "watchers_count": 464, + "stargazers_count": 465, + "watchers_count": 465, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 69, - "watchers": 464, + "watchers": 465, "score": 0 }, { diff --git a/2023/CVE-2023-23396.json b/2023/CVE-2023-23396.json index d0a9b222fe..bce598aa23 100644 --- a/2023/CVE-2023-23396.json +++ b/2023/CVE-2023-23396.json @@ -13,10 +13,10 @@ "description": "Exploit and report for CVE-2023-23396.", "fork": false, "created_at": "2023-03-16T17:28:27Z", - "updated_at": "2023-03-16T18:46:51Z", + "updated_at": "2023-03-17T10:45:40Z", "pushed_at": "2023-03-16T17:38:37Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index 82fccb0b62..013d9a1df2 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -13,19 +13,19 @@ "description": "Exploit for the CVE-2023-23397", "fork": false, "created_at": "2023-03-15T17:03:38Z", - "updated_at": "2023-03-17T06:29:31Z", + "updated_at": "2023-03-17T10:25:07Z", "pushed_at": "2023-03-15T17:53:53Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 98, + "watchers_count": 98, "has_discussions": false, - "forks_count": 26, + "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 26, - "watchers": 90, + "forks": 28, + "watchers": 98, "score": 0 }, { @@ -71,10 +71,10 @@ "description": "CVE-2023-23397 - Microsoft Outlook Vulnerability", "fork": false, "created_at": "2023-03-16T14:07:15Z", - "updated_at": "2023-03-16T14:08:27Z", - "pushed_at": "2023-03-16T14:09:04Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2023-03-17T08:46:52Z", + "pushed_at": "2023-03-17T09:46:17Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -100,19 +100,19 @@ "description": "Python script to create a message with the vulenrability properties set", "fork": false, "created_at": "2023-03-16T15:00:26Z", - "updated_at": "2023-03-16T15:02:06Z", + "updated_at": "2023-03-17T08:43:11Z", "pushed_at": "2023-03-16T15:02:02Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 0, + "forks": 2, + "watchers": 1, "score": 0 }, { @@ -129,10 +129,10 @@ "description": "Simple PoC in PowerShell for CVE-2023-23397", "fork": false, "created_at": "2023-03-16T19:10:37Z", - "updated_at": "2023-03-16T20:44:47Z", + "updated_at": "2023-03-17T10:55:25Z", "pushed_at": "2023-03-16T19:29:49Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -151,7 +151,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { @@ -168,19 +168,19 @@ "description": null, "fork": false, "created_at": "2023-03-16T19:43:39Z", - "updated_at": "2023-03-17T06:10:39Z", - "pushed_at": "2023-03-17T03:57:08Z", - "stargazers_count": 67, - "watchers_count": 67, + "updated_at": "2023-03-17T12:19:38Z", + "pushed_at": "2023-03-17T07:47:40Z", + "stargazers_count": 91, + "watchers_count": 91, "has_discussions": false, - "forks_count": 14, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 67, + "forks": 17, + "watchers": 91, "score": 0 }, { @@ -211,5 +211,34 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 615197592, + "name": "CVE-2023-23397-PoC-PowerShell", + "full_name": "cleverg0d\/CVE-2023-23397-PoC-PowerShell", + "owner": { + "login": "cleverg0d", + "id": 108401157, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108401157?v=4", + "html_url": "https:\/\/github.com\/cleverg0d" + }, + "html_url": "https:\/\/github.com\/cleverg0d\/CVE-2023-23397-PoC-PowerShell", + "description": "PoC for CVE-2023-23397", + "fork": false, + "created_at": "2023-03-17T06:52:42Z", + "updated_at": "2023-03-17T06:53:57Z", + "pushed_at": "2023-03-17T07:36:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-25610.json b/2023/CVE-2023-25610.json deleted file mode 100644 index 03d3373c33..0000000000 --- a/2023/CVE-2023-25610.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 614868768, - "name": "CVE-2023-25610-mass", - "full_name": "l1ced\/CVE-2023-25610-mass", - "owner": { - "login": "l1ced", - "id": 128054186, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128054186?v=4", - "html_url": "https:\/\/github.com\/l1ced" - }, - "html_url": "https:\/\/github.com\/l1ced\/CVE-2023-25610-mass", - "description": "Mass RCE Exploiter for Fortinet(FortiOS\/Fortiproxy) CVE-2023-25610", - "fork": false, - "created_at": "2023-03-16T13:37:47Z", - "updated_at": "2023-03-16T16:11:28Z", - "pushed_at": "2023-03-16T13:38:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/README.md b/README.md index 7bfb13318e..cc2bd4dda3 100644 --- a/README.md +++ b/README.md @@ -257,6 +257,7 @@ Microsoft Outlook Elevation of Privilege Vulnerability - [ka7ana/CVE-2023-23397](https://github.com/ka7ana/CVE-2023-23397) - [api0cradle/CVE-2023-23397-POC-Powershell](https://github.com/api0cradle/CVE-2023-23397-POC-Powershell) - [im007/CVE-2023-23397](https://github.com/im007/CVE-2023-23397) +- [cleverg0d/CVE-2023-23397-PoC-PowerShell](https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShell) ### CVE-2023-23488 (2023-01-20) @@ -360,9 +361,6 @@ A possible security vulnerability has been identified in Apache Kafka Connect. T - [ohnonoyesyes/CVE-2023-25194](https://github.com/ohnonoyesyes/CVE-2023-25194) -### CVE-2023-25610 -- [l1ced/CVE-2023-25610-mass](https://github.com/l1ced/CVE-2023-25610-mass) - ### CVE-2023-26262 (2023-03-14)