From ff48f56792e4781e595feca37472f203110cb3f4 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Thu, 28 Mar 2024 09:26:31 +0900 Subject: [PATCH] Auto Update 2024/03/28 00:26:31 --- 2017/CVE-2017-7494.json | 16 +++++----- 2019/CVE-2019-0708.json | 8 ++--- 2019/CVE-2019-11043.json | 8 ++--- 2019/CVE-2019-6447.json | 8 ++--- 2020/CVE-2020-0601.json | 2 +- 2020/CVE-2020-11022.json | 8 ++--- 2020/CVE-2020-12695.json | 8 ++--- 2021/CVE-2021-22205.json | 24 +++++++------- 2021/CVE-2021-30573.json | 4 +-- 2021/CVE-2021-42278.json | 8 ++--- 2021/CVE-2021-43798.json | 30 +++++++++++++++++ 2021/CVE-2021-44228.json | 20 ++++++------ 2022/CVE-2022-0739.json | 4 +-- 2022/CVE-2022-1040.json | 69 +++++++++++++++++----------------------- 2022/CVE-2022-21661.json | 40 ++++++++++------------- 2022/CVE-2022-29464.json | 8 ++--- 2022/CVE-2022-32250.json | 8 ++--- 2022/CVE-2022-33891.json | 8 ++--- 2022/CVE-2022-44215.json | 8 ++--- 2023/CVE-2023-21554.json | 8 ++--- 2023/CVE-2023-25136.json | 24 +++++++------- 2023/CVE-2023-32315.json | 8 ++--- 2023/CVE-2023-3269.json | 8 ++--- 2023/CVE-2023-3338.json | 8 ++--- 2023/CVE-2023-3824.json | 30 +++++++++++++++++ 2023/CVE-2023-38408.json | 16 +++++----- 2023/CVE-2023-38831.json | 8 ++--- 2023/CVE-2023-41474.json | 8 ++--- 2023/CVE-2023-45866.json | 12 +++---- 2024/CVE-2024-1086.json | 12 +++---- 2024/CVE-2024-20767.json | 20 ++++++------ 2024/CVE-2024-20931.json | 8 ++--- 2024/CVE-2024-21762.json | 8 ++--- 2024/CVE-2024-28085.json | 11 ++++--- README.md | 6 ++-- 35 files changed, 266 insertions(+), 218 deletions(-) diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 88d8860de2..458518f447 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -73,10 +73,10 @@ "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)", "fork": false, "created_at": "2017-05-26T00:58:25Z", - "updated_at": "2024-02-07T04:27:39Z", + "updated_at": "2024-03-27T20:00:05Z", "pushed_at": "2022-12-27T20:25:09Z", - "stargazers_count": 367, - "watchers_count": 367, + "stargazers_count": 368, + "watchers_count": 368, "has_discussions": false, "forks_count": 99, "allow_forking": true, @@ -91,7 +91,7 @@ ], "visibility": "public", "forks": 99, - "watchers": 367, + "watchers": 368, "score": 0, "subscribers_count": 11 }, @@ -169,10 +169,10 @@ "description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability", "fork": false, "created_at": "2017-06-05T16:25:57Z", - "updated_at": "2024-01-04T16:14:38Z", + "updated_at": "2024-03-27T20:05:20Z", "pushed_at": "2021-03-09T09:12:55Z", - "stargazers_count": 258, - "watchers_count": 258, + "stargazers_count": 259, + "watchers_count": 259, "has_discussions": false, "forks_count": 80, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 80, - "watchers": 258, + "watchers": 259, "score": 0, "subscribers_count": 14 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 82eb55887a..883ee8fd35 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1841,10 +1841,10 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2024-03-21T15:50:09Z", + "updated_at": "2024-03-27T20:01:48Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1160, - "watchers_count": 1160, + "stargazers_count": 1161, + "watchers_count": 1161, "has_discussions": false, "forks_count": 346, "allow_forking": true, @@ -1853,7 +1853,7 @@ "topics": [], "visibility": "public", "forks": 346, - "watchers": 1160, + "watchers": 1161, "score": 0, "subscribers_count": 68 }, diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index b26deccad7..04c0b149a8 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2024-03-26T22:13:16Z", + "updated_at": "2024-03-27T21:04:19Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1782, - "watchers_count": 1782, + "stargazers_count": 1783, + "watchers_count": 1783, "has_discussions": false, "forks_count": 259, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 259, - "watchers": 1782, + "watchers": 1783, "score": 0, "subscribers_count": 37 }, diff --git a/2019/CVE-2019-6447.json b/2019/CVE-2019-6447.json index 7fba350c8d..4f051d8192 100644 --- a/2019/CVE-2019-6447.json +++ b/2019/CVE-2019-6447.json @@ -13,10 +13,10 @@ "description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447", "fork": false, "created_at": "2019-01-09T22:30:42Z", - "updated_at": "2024-03-05T19:31:51Z", + "updated_at": "2024-03-27T22:26:45Z", "pushed_at": "2023-09-28T18:58:28Z", - "stargazers_count": 672, - "watchers_count": 672, + "stargazers_count": 671, + "watchers_count": 671, "has_discussions": false, "forks_count": 137, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 137, - "watchers": 672, + "watchers": 671, "score": 0, "subscribers_count": 44 }, diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index edea3ca329..742d7ae55c 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -313,7 +313,7 @@ "forks": 13, "watchers": 65, "score": 0, - "subscribers_count": 6 + "subscribers_count": 5 }, { "id": 234442281, diff --git a/2020/CVE-2020-11022.json b/2020/CVE-2020-11022.json index ba231fbc05..fded957503 100644 --- a/2020/CVE-2020-11022.json +++ b/2020/CVE-2020-11022.json @@ -13,10 +13,10 @@ "description": "Little thing put together quickly to demonstrate this CVE ", "fork": false, "created_at": "2021-10-16T01:10:33Z", - "updated_at": "2024-03-22T11:34:05Z", + "updated_at": "2024-03-27T19:28:31Z", "pushed_at": "2022-09-11T22:06:40Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index 5d848feb29..e91fe8c79d 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,10 +13,10 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2024-03-23T18:19:54Z", + "updated_at": "2024-03-27T18:33:50Z", "pushed_at": "2021-08-07T16:48:55Z", - "stargazers_count": 398, - "watchers_count": 398, + "stargazers_count": 399, + "watchers_count": 399, "has_discussions": false, "forks_count": 70, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 70, - "watchers": 398, + "watchers": 399, "score": 0, "subscribers_count": 11 }, diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index d075c03251..4f966935e6 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -18,13 +18,13 @@ "stargazers_count": 184, "watchers_count": 184, "has_discussions": false, - "forks_count": 43, + "forks_count": 44, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 43, + "forks": 44, "watchers": 184, "score": 0, "subscribers_count": 3 @@ -138,7 +138,7 @@ "stargazers_count": 253, "watchers_count": 253, "has_discussions": false, - "forks_count": 99, + "forks_count": 100, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -146,7 +146,7 @@ "cve-2021-22205" ], "visibility": "public", - "forks": 99, + "forks": 100, "watchers": 253, "score": 0, "subscribers_count": 3 @@ -225,10 +225,10 @@ "description": "CVE-2021-22205未授权漏洞批量检测与利用工具", "fork": false, "created_at": "2021-10-31T04:15:30Z", - "updated_at": "2023-09-12T11:13:45Z", + "updated_at": "2024-03-27T18:37:33Z", "pushed_at": "2021-11-04T12:49:58Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -239,7 +239,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 31, + "watchers": 32, "score": 0, "subscribers_count": 1 }, @@ -412,13 +412,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 3, "score": 0, "subscribers_count": 1 @@ -478,7 +478,7 @@ "stargazers_count": 205, "watchers_count": 205, "has_discussions": false, - "forks_count": 38, + "forks_count": 39, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -491,7 +491,7 @@ "security" ], "visibility": "public", - "forks": 38, + "forks": 39, "watchers": 205, "score": 0, "subscribers_count": 2 diff --git a/2021/CVE-2021-30573.json b/2021/CVE-2021-30573.json index 2a2039ac31..3b26795656 100644 --- a/2021/CVE-2021-30573.json +++ b/2021/CVE-2021-30573.json @@ -18,13 +18,13 @@ "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 15, "score": 0, "subscribers_count": 1 diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 1a1b9ef1b8..27e460c997 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -48,10 +48,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-03-21T15:24:28Z", + "updated_at": "2024-03-27T20:42:58Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 704, - "watchers_count": 704, + "stargazers_count": 705, + "watchers_count": 705, "has_discussions": false, "forks_count": 115, "allow_forking": true, @@ -60,7 +60,7 @@ "topics": [], "visibility": "public", "forks": 115, - "watchers": 704, + "watchers": 705, "score": 0, "subscribers_count": 12 }, diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 576fac5d56..5f2c71b2c1 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -1239,5 +1239,35 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 778520336, + "name": "CVE-2021-43798", + "full_name": "ticofookfook\/CVE-2021-43798", + "owner": { + "login": "ticofookfook", + "id": 99700348, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99700348?v=4", + "html_url": "https:\/\/github.com\/ticofookfook" + }, + "html_url": "https:\/\/github.com\/ticofookfook\/CVE-2021-43798", + "description": null, + "fork": false, + "created_at": "2024-03-27T21:47:06Z", + "updated_at": "2024-03-27T21:57:13Z", + "pushed_at": "2024-03-27T22:02:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index be9dfd9034..13efb29207 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-03-26T22:37:44Z", + "updated_at": "2024-03-27T21:06:51Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1734, - "watchers_count": 1734, + "stargazers_count": 1735, + "watchers_count": 1735, "has_discussions": false, "forks_count": 514, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 514, - "watchers": 1734, + "watchers": 1735, "score": 0, "subscribers_count": 28 }, @@ -1428,7 +1428,7 @@ "stargazers_count": 854, "watchers_count": 854, "has_discussions": false, - "forks_count": 173, + "forks_count": 174, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1447,7 +1447,7 @@ "scanner" ], "visibility": "public", - "forks": 173, + "forks": 174, "watchers": 854, "score": 0, "subscribers_count": 33 @@ -12005,10 +12005,10 @@ "description": "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.", "fork": false, "created_at": "2023-01-31T20:29:26Z", - "updated_at": "2023-09-28T11:44:58Z", + "updated_at": "2024-03-27T19:53:25Z", "pushed_at": "2023-01-31T20:35:59Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -12031,7 +12031,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-0739.json b/2022/CVE-2022-0739.json index a0e7809559..6c8cb400c4 100644 --- a/2022/CVE-2022-0739.json +++ b/2022/CVE-2022-0739.json @@ -18,13 +18,13 @@ "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, - "forks_count": 5, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 4, "watchers": 11, "score": 0, "subscribers_count": 1 diff --git a/2022/CVE-2022-1040.json b/2022/CVE-2022-1040.json index eb28747763..28761b6f97 100644 --- a/2022/CVE-2022-1040.json +++ b/2022/CVE-2022-1040.json @@ -29,45 +29,6 @@ "score": 0, "subscribers_count": 3 }, - { - "id": 523301905, - "name": "CVE-2022-1040", - "full_name": "APTIRAN\/CVE-2022-1040", - "owner": { - "login": "APTIRAN", - "id": 80196564, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4", - "html_url": "https:\/\/github.com\/APTIRAN" - }, - "html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-1040", - "description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication", - "fork": false, - "created_at": "2022-08-10T10:38:59Z", - "updated_at": "2024-01-24T06:11:09Z", - "pushed_at": "2022-10-21T07:55:22Z", - "stargazers_count": 29, - "watchers_count": 29, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2022-1040", - "cve-2022-1040-poc", - "exploit", - "firewall", - "poc", - "sophos", - "sophos-xg", - "xg115w" - ], - "visibility": "public", - "forks": 4, - "watchers": 29, - "score": 0, - "subscribers_count": 2 - }, { "id": 541212587, "name": "Sophos-Vulnerability", @@ -128,6 +89,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 559654558, + "name": "CVE-2022-1040", + "full_name": "jackson5sec\/CVE-2022-1040", + "owner": { + "login": "jackson5sec", + "id": 17192323, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17192323?v=4", + "html_url": "https:\/\/github.com\/jackson5sec" + }, + "html_url": "https:\/\/github.com\/jackson5sec\/CVE-2022-1040", + "description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication", + "fork": false, + "created_at": "2022-10-30T19:20:57Z", + "updated_at": "2022-10-24T03:11:53Z", + "pushed_at": "2022-10-21T07:55:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 586568152, "name": "CVE-2022-1040", diff --git a/2022/CVE-2022-21661.json b/2022/CVE-2022-21661.json index 3ba61feaf1..f9174a4be2 100644 --- a/2022/CVE-2022-21661.json +++ b/2022/CVE-2022-21661.json @@ -150,40 +150,34 @@ "subscribers_count": 1 }, { - "id": 562600305, + "id": 563211004, "name": "CVE-2022-21661", - "full_name": "APTIRAN\/CVE-2022-21661", + "full_name": "safe3s\/CVE-2022-21661", "owner": { - "login": "APTIRAN", - "id": 80196564, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4", - "html_url": "https:\/\/github.com\/APTIRAN" + "login": "safe3s", + "id": 108328094, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108328094?v=4", + "html_url": "https:\/\/github.com\/safe3s" }, - "html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-21661", + "html_url": "https:\/\/github.com\/safe3s\/CVE-2022-21661", "description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ", "fork": false, - "created_at": "2022-11-06T20:44:10Z", - "updated_at": "2024-01-24T11:21:41Z", - "pushed_at": "2022-11-23T21:09:11Z", - "stargazers_count": 100, - "watchers_count": 100, + "created_at": "2022-11-08T06:10:49Z", + "updated_at": "2022-11-07T04:28:00Z", + "pushed_at": "2022-11-06T21:43:48Z", + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, - "forks_count": 24, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2022-21661", - "exploit", - "poc", - "wordpress" - ], + "topics": [], "visibility": "public", - "forks": 24, - "watchers": 100, + "forks": 22, + "watchers": 0, "score": 0, - "subscribers_count": 2 + "subscribers_count": 0 }, { "id": 588582544, diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index b6e7b8719c..a6dd112b03 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2024-03-13T00:05:04Z", + "updated_at": "2024-03-27T21:52:11Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 359, - "watchers_count": 359, + "stargazers_count": 360, + "watchers_count": 360, "has_discussions": false, "forks_count": 92, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 92, - "watchers": 359, + "watchers": 360, "score": 0, "subscribers_count": 8 }, diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json index 93f145e596..cbfbcb99a0 100644 --- a/2022/CVE-2022-32250.json +++ b/2022/CVE-2022-32250.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-08-24T06:00:47Z", - "updated_at": "2024-02-22T09:54:50Z", + "updated_at": "2024-03-27T20:50:58Z", "pushed_at": "2023-06-18T14:43:52Z", - "stargazers_count": 159, - "watchers_count": 159, + "stargazers_count": 160, + "watchers_count": 160, "has_discussions": false, "forks_count": 44, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 159, + "watchers": 160, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-33891.json b/2022/CVE-2022-33891.json index 63fc5af36b..5e9603fed0 100644 --- a/2022/CVE-2022-33891.json +++ b/2022/CVE-2022-33891.json @@ -45,10 +45,10 @@ "description": "Apache Spark Shell Command Injection Vulnerability", "fork": false, "created_at": "2022-07-19T18:52:12Z", - "updated_at": "2024-01-04T17:10:29Z", + "updated_at": "2024-03-27T19:32:37Z", "pushed_at": "2022-09-07T18:12:27Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 87, + "watchers": 88, "score": 0, "subscribers_count": 4 }, diff --git a/2022/CVE-2022-44215.json b/2022/CVE-2022-44215.json index bfa089a50f..fb33796355 100644 --- a/2022/CVE-2022-44215.json +++ b/2022/CVE-2022-44215.json @@ -13,10 +13,10 @@ "description": "Public disclosure of TitanFTP 19.X Open Redirection vulnerability", "fork": false, "created_at": "2022-12-19T09:34:49Z", - "updated_at": "2022-12-19T09:34:49Z", + "updated_at": "2024-03-27T20:36:30Z", "pushed_at": "2022-12-19T11:53:34Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json index f1a44fbae0..a97072c220 100644 --- a/2023/CVE-2023-21554.json +++ b/2023/CVE-2023-21554.json @@ -13,10 +13,10 @@ "description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "fork": false, "created_at": "2023-05-18T10:30:49Z", - "updated_at": "2023-12-01T21:48:35Z", + "updated_at": "2024-03-27T22:00:07Z", "pushed_at": "2023-05-18T10:38:57Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index d4c6914530..9498437025 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-02-07T15:33:41Z", - "updated_at": "2024-01-18T14:51:33Z", + "updated_at": "2024-03-27T19:31:55Z", "pushed_at": "2023-02-09T09:06:15Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 4 }, @@ -103,10 +103,10 @@ "description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC", "fork": false, "created_at": "2023-04-18T21:47:47Z", - "updated_at": "2024-01-02T10:32:22Z", + "updated_at": "2024-03-27T19:12:22Z", "pushed_at": "2023-04-21T14:22:41Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 }, @@ -133,10 +133,10 @@ "description": "OpenSSH 9.1 vulnerability mass scan and exploit", "fork": false, "created_at": "2023-04-28T19:46:03Z", - "updated_at": "2023-12-24T02:52:24Z", + "updated_at": "2024-03-27T19:25:21Z", "pushed_at": "2023-04-28T20:29:10Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index bb2abf0b9a..c7ffe57fae 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -103,10 +103,10 @@ "description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin", "fork": false, "created_at": "2023-06-18T15:42:00Z", - "updated_at": "2024-03-19T00:12:15Z", + "updated_at": "2024-03-28T00:15:48Z", "pushed_at": "2024-03-07T07:23:41Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-3269.json b/2023/CVE-2023-3269.json index 7e9677d7a6..77eb602729 100644 --- a/2023/CVE-2023-3269.json +++ b/2023/CVE-2023-3269.json @@ -13,10 +13,10 @@ "description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability", "fork": false, "created_at": "2023-06-28T13:22:26Z", - "updated_at": "2024-03-25T11:17:49Z", + "updated_at": "2024-03-27T20:50:24Z", "pushed_at": "2023-07-28T13:20:45Z", - "stargazers_count": 446, - "watchers_count": 446, + "stargazers_count": 447, + "watchers_count": 447, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 446, + "watchers": 447, "score": 0, "subscribers_count": 14 } diff --git a/2023/CVE-2023-3338.json b/2023/CVE-2023-3338.json index 018a2b7d3d..094e672e90 100644 --- a/2023/CVE-2023-3338.json +++ b/2023/CVE-2023-3338.json @@ -13,10 +13,10 @@ "description": "Linux kernel LPE practice with an NPD vulnerability", "fork": false, "created_at": "2023-06-29T10:12:18Z", - "updated_at": "2024-02-26T06:09:32Z", + "updated_at": "2024-03-27T21:07:48Z", "pushed_at": "2023-07-11T23:13:38Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-3824.json b/2023/CVE-2023-3824.json index ba7d69d752..c729a07a48 100644 --- a/2023/CVE-2023-3824.json +++ b/2023/CVE-2023-3824.json @@ -1,4 +1,34 @@ [ + { + "id": 773579290, + "name": "CVE-2023-3824-PHP-to-RCE-LockBit-LEAK", + "full_name": "StayBeautiful-collab\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK", + "owner": { + "login": "StayBeautiful-collab", + "id": 106727356, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106727356?v=4", + "html_url": "https:\/\/github.com\/StayBeautiful-collab" + }, + "html_url": "https:\/\/github.com\/StayBeautiful-collab\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK", + "description": null, + "fork": false, + "created_at": "2024-03-18T02:19:03Z", + "updated_at": "2024-03-18T02:19:03Z", + "pushed_at": "2024-03-10T04:37:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 773755811, "name": "CVE-2023-3824", diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json index 1c523fbe87..60b369196a 100644 --- a/2023/CVE-2023-38408.json +++ b/2023/CVE-2023-38408.json @@ -13,10 +13,10 @@ "description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2", "fork": false, "created_at": "2023-08-09T19:56:07Z", - "updated_at": "2024-03-20T23:10:02Z", + "updated_at": "2024-03-27T19:32:37Z", "pushed_at": "2023-08-10T05:12:20Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 1 }, @@ -43,10 +43,10 @@ "description": "Takeover Account OpenSSH", "fork": false, "created_at": "2023-11-09T04:34:39Z", - "updated_at": "2024-03-14T00:54:26Z", + "updated_at": "2024-03-27T19:33:46Z", "pushed_at": "2024-03-14T03:55:10Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 8f1418cc09..faee550c3b 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -1234,10 +1234,10 @@ "description": "evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)", "fork": false, "created_at": "2024-03-25T14:05:24Z", - "updated_at": "2024-03-26T04:12:11Z", + "updated_at": "2024-03-27T18:41:32Z", "pushed_at": "2024-03-25T14:38:29Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -1246,7 +1246,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-41474.json b/2023/CVE-2023-41474.json index 2b7bcd8a1a..cf9f4b93c5 100644 --- a/2023/CVE-2023-41474.json +++ b/2023/CVE-2023-41474.json @@ -13,10 +13,10 @@ "description": "Public disclosure of Ivanti's Avalanche Path Traversal vulnerability", "fork": false, "created_at": "2024-01-08T08:21:39Z", - "updated_at": "2024-01-30T15:10:36Z", + "updated_at": "2024-03-27T20:40:42Z", "pushed_at": "2024-01-08T08:46:27Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index ed13891d55..03b5fcec2f 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,19 +13,19 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-03-27T18:05:15Z", + "updated_at": "2024-03-28T00:12:04Z", "pushed_at": "2024-03-27T18:25:56Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 139, + "watchers_count": 139, "has_discussions": false, - "forks_count": 21, + "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 21, - "watchers": 110, + "forks": 26, + "watchers": 139, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 18c3052395..fb8e2e3fa3 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,12 +13,12 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-03-27T18:04:07Z", + "updated_at": "2024-03-28T00:29:11Z", "pushed_at": "2024-03-27T09:22:28Z", - "stargazers_count": 347, - "watchers_count": 347, + "stargazers_count": 369, + "watchers_count": 369, "has_discussions": false, - "forks_count": 30, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "poc" ], "visibility": "public", - "forks": 30, - "watchers": 347, + "forks": 35, + "watchers": 369, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20767.json b/2024/CVE-2024-20767.json index 4dec6914ef..d7ed2535f7 100644 --- a/2024/CVE-2024-20767.json +++ b/2024/CVE-2024-20767.json @@ -13,12 +13,12 @@ "description": "Exploit for CVE-2024-20767 - Adobe ColdFusion", "fork": false, "created_at": "2024-03-26T06:51:08Z", - "updated_at": "2024-03-27T13:41:37Z", + "updated_at": "2024-03-27T23:31:42Z", "pushed_at": "2024-03-26T15:52:49Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, - "forks_count": 4, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,8 +28,8 @@ "cve-2024-20767" ], "visibility": "public", - "forks": 4, - "watchers": 15, + "forks": 9, + "watchers": 18, "score": 0, "subscribers_count": 1 }, @@ -77,10 +77,10 @@ "description": "Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability", "fork": false, "created_at": "2024-03-26T19:17:14Z", - "updated_at": "2024-03-27T17:01:30Z", + "updated_at": "2024-03-27T21:09:20Z", "pushed_at": "2024-03-26T19:21:19Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -89,7 +89,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20931.json b/2024/CVE-2024-20931.json index 5c00ad5437..a8b7bcfdbc 100644 --- a/2024/CVE-2024-20931.json +++ b/2024/CVE-2024-20931.json @@ -13,10 +13,10 @@ "description": "The Poc for CVE-2024-20931", "fork": false, "created_at": "2024-02-02T01:58:49Z", - "updated_at": "2024-03-26T07:52:42Z", + "updated_at": "2024-03-27T18:45:37Z", "pushed_at": "2024-02-02T02:05:01Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 69, + "watchers": 70, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 2551f074af..3a6c89785b 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -133,10 +133,10 @@ "description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)", "fork": false, "created_at": "2024-03-13T22:57:00Z", - "updated_at": "2024-03-15T15:08:21Z", + "updated_at": "2024-03-27T23:12:59Z", "pushed_at": "2024-03-24T22:01:21Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-28085.json b/2024/CVE-2024-28085.json index 25e7288565..f0425e0177 100644 --- a/2024/CVE-2024-28085.json +++ b/2024/CVE-2024-28085.json @@ -13,10 +13,10 @@ "description": "WallEscape vulnerability in util-linux", "fork": false, "created_at": "2024-03-11T00:15:03Z", - "updated_at": "2024-03-27T16:28:14Z", + "updated_at": "2024-03-27T19:01:51Z", "pushed_at": "2024-03-12T00:28:14Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -24,14 +24,15 @@ "web_commit_signoff_required": false, "topics": [ "cve", - "cve-2024-28085", "exploit", + "privesc", "privilege-escalation", + "redteam", "vulnerability" ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index 3d7c726453..b33dce0b72 100644 --- a/README.md +++ b/README.md @@ -1611,6 +1611,7 @@ In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. \n\n +- [StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK](https://github.com/StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK) - [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824) ### CVE-2023-3836 (2023-07-22) @@ -8521,9 +8522,9 @@ - [killvxk/CVE-2022-1040](https://github.com/killvxk/CVE-2022-1040) -- [APTIRAN/CVE-2022-1040](https://github.com/APTIRAN/CVE-2022-1040) - [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability) - [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040) +- [jackson5sec/CVE-2022-1040](https://github.com/jackson5sec/CVE-2022-1040) - [michealadams30/CVE-2022-1040](https://github.com/michealadams30/CVE-2022-1040) - [Cyb3rEnthusiast/CVE-2022-1040](https://github.com/Cyb3rEnthusiast/CVE-2022-1040) - [xMr110/CVE-2022-1040](https://github.com/xMr110/CVE-2022-1040) @@ -9485,7 +9486,7 @@ - [0x4E0x650x6F/Wordpress-cve-CVE-2022-21661](https://github.com/0x4E0x650x6F/Wordpress-cve-CVE-2022-21661) - [z92g/CVE-2022-21661](https://github.com/z92g/CVE-2022-21661) - [guestzz/CVE-2022-21661](https://github.com/guestzz/CVE-2022-21661) -- [APTIRAN/CVE-2022-21661](https://github.com/APTIRAN/CVE-2022-21661) +- [safe3s/CVE-2022-21661](https://github.com/safe3s/CVE-2022-21661) - [WellingtonEspindula/SSI-CVE-2022-21661](https://github.com/WellingtonEspindula/SSI-CVE-2022-21661) - [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo) - [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC) @@ -20130,6 +20131,7 @@ - [Iris288/CVE-2021-43798](https://github.com/Iris288/CVE-2021-43798) - [wagneralves/CVE-2021-43798](https://github.com/wagneralves/CVE-2021-43798) - [K3ysTr0K3R/CVE-2021-43798-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT) +- [ticofookfook/CVE-2021-43798](https://github.com/ticofookfook/CVE-2021-43798) ### CVE-2021-43799 (2022-01-25)