From ff7679b0bdb8d981d1f042e29cb61774cd6b46fd Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 16 Jan 2024 15:38:57 +0900 Subject: [PATCH] Auto Update 2024/01/16 06:38:57 --- 2007/CVE-2007-2447.json | 30 ------------------------- 2016/CVE-2016-4437.json | 32 +++++++++++++++++++++++++++ 2016/CVE-2016-9920.json | 8 +++---- 2018/CVE-2018-15473.json | 12 +++++----- 2018/CVE-2018-5955.json | 8 +++---- 2018/CVE-2018-7600.json | 4 ++-- 2019/CVE-2019-11510.json | 8 +++---- 2019/CVE-2019-17558.json | 4 ++-- 2020/CVE-2020-14882.json | 4 ++-- 2021/CVE-2021-21972.json | 8 +++---- 2021/CVE-2021-26855.json | 8 +++---- 2021/CVE-2021-26943.json | 8 +++---- 2021/CVE-2021-34473.json | 8 +++---- 2021/CVE-2021-44228.json | 48 ++++++++++++++++++++-------------------- 2022/CVE-2022-0543.json | 2 +- 2022/CVE-2022-22274.json | 10 ++++----- 2022/CVE-2022-22954.json | 8 +++---- 2022/CVE-2022-38694.json | 2 +- 2023/CVE-2023-0656.json | 10 ++++----- 2023/CVE-2023-0669.json | 4 ++-- 2023/CVE-2023-21036.json | 8 +++---- 2023/CVE-2023-25610.json | 4 ++-- 2023/CVE-2023-26602.json | 2 +- 2023/CVE-2023-26609.json | 2 +- 2023/CVE-2023-31756.json | 10 ++++----- 2023/CVE-2023-35813.json | 2 +- 2023/CVE-2023-36003.json | 10 ++++----- 2023/CVE-2023-36025.json | 8 +++---- 2023/CVE-2023-36745.json | 8 +++---- 2023/CVE-2023-41892.json | 12 +++++----- 2023/CVE-2023-45866.json | 2 +- 2023/CVE-2023-46805.json | 10 ++++++--- 2023/CVE-2023-50164.json | 4 ++-- 2023/CVE-2023-5043.json | 2 +- 2023/CVE-2023-51467.json | 16 +++++++------- 2023/CVE-2023-6875.json | 8 +++---- 2023/CVE-2023-7028.json | 20 ++++++++--------- 2024/CVE-2024-0193.json | 2 +- 2024/CVE-2024-0252.json | 2 +- 2024/CVE-2024-20656.json | 8 +++---- 2024/CVE-2024-21887.json | 10 ++++++--- README.md | 26 +++++++++++++++++----- 42 files changed, 214 insertions(+), 188 deletions(-) diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index 0f455ba2b1..b8b345eea4 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -149,36 +149,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 319098047, - "name": "exploit-CVE-2007-2447", - "full_name": "xlcc4096\/exploit-CVE-2007-2447", - "owner": { - "login": "xlcc4096", - "id": 75581853, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75581853?v=4", - "html_url": "https:\/\/github.com\/xlcc4096" - }, - "html_url": "https:\/\/github.com\/xlcc4096\/exploit-CVE-2007-2447", - "description": "Exploit for the vulnerability CVE-2007-2447", - "fork": false, - "created_at": "2020-12-06T18:04:44Z", - "updated_at": "2020-12-06T18:09:38Z", - "pushed_at": "2020-12-06T18:09:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 319992014, "name": "CVE-2007-2447_Samba_3.0.25rc3", diff --git a/2016/CVE-2016-4437.json b/2016/CVE-2016-4437.json index a5503df24b..71b1c8e9c9 100644 --- a/2016/CVE-2016-4437.json +++ b/2016/CVE-2016-4437.json @@ -118,5 +118,37 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 743434162, + "name": "CVE-2016-4437", + "full_name": "xk-mt\/CVE-2016-4437", + "owner": { + "login": "xk-mt", + "id": 77874955, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77874955?v=4", + "html_url": "https:\/\/github.com\/xk-mt" + }, + "html_url": "https:\/\/github.com\/xk-mt\/CVE-2016-4437", + "description": "1.验证CVE-2016-4437、2.解析rememberMe的文件和CBC加密的IV偏移", + "fork": false, + "created_at": "2024-01-15T08:24:40Z", + "updated_at": "2024-01-16T04:57:40Z", + "pushed_at": "2024-01-16T05:12:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2016-4437" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-9920.json b/2016/CVE-2016-9920.json index be4472f68c..b8a2ddb9a9 100644 --- a/2016/CVE-2016-9920.json +++ b/2016/CVE-2016-9920.json @@ -13,10 +13,10 @@ "description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-06T17:55:44Z", - "updated_at": "2023-09-28T10:38:25Z", + "updated_at": "2024-01-16T00:57:50Z", "pushed_at": "2017-01-06T23:34:03Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 1 } diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 05a999ce75..956717614c 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -119,19 +119,19 @@ "description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473", "fork": false, "created_at": "2018-10-03T10:18:04Z", - "updated_at": "2024-01-11T18:08:54Z", + "updated_at": "2024-01-16T05:58:59Z", "pushed_at": "2019-03-24T11:20:27Z", - "stargazers_count": 88, - "watchers_count": 88, + "stargazers_count": 89, + "watchers_count": 89, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, - "watchers": 88, + "forks": 30, + "watchers": 89, "score": 0, "subscribers_count": 1 }, diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 4022380c2a..acd1cd22db 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -43,10 +43,10 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2024-01-12T14:57:21Z", + "updated_at": "2024-01-16T01:50:17Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 633, - "watchers_count": 633, + "stargazers_count": 634, + "watchers_count": 634, "has_discussions": false, "forks_count": 134, "allow_forking": true, @@ -68,7 +68,7 @@ ], "visibility": "public", "forks": 134, - "watchers": 633, + "watchers": 634, "score": 0, "subscribers_count": 17 }, diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 6f0bae5b35..3565f4b3ab 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -398,7 +398,7 @@ "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -406,7 +406,7 @@ "drupalgeddon2" ], "visibility": "public", - "forks": 15, + "forks": 16, "watchers": 10, "score": 0, "subscribers_count": 4 diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index 9ed4b1362c..292601577d 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -223,10 +223,10 @@ "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", - "updated_at": "2024-01-11T10:14:39Z", + "updated_at": "2024-01-16T05:41:47Z", "pushed_at": "2020-01-15T17:01:50Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 132, + "watchers_count": 132, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -244,7 +244,7 @@ ], "visibility": "public", "forks": 62, - "watchers": 131, + "watchers": 132, "score": 0, "subscribers_count": 15 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index b986d13b26..f463904dd1 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -48,7 +48,7 @@ "stargazers_count": 3974, "watchers_count": 3974, "has_discussions": false, - "forks_count": 1092, + "forks_count": 1091, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,7 +74,7 @@ "webshell" ], "visibility": "public", - "forks": 1092, + "forks": 1091, "watchers": 3974, "score": 0, "subscribers_count": 155 diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index cd4c3c390d..592fa218f5 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -18,7 +18,7 @@ "stargazers_count": 3974, "watchers_count": 3974, "has_discussions": false, - "forks_count": 1092, + "forks_count": 1091, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,7 +44,7 @@ "webshell" ], "visibility": "public", - "forks": 1092, + "forks": 1091, "watchers": 3974, "score": 0, "subscribers_count": 155 diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 333258a5b7..54e92abd67 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-01-12T16:04:41Z", + "updated_at": "2024-01-16T04:53:56Z", "pushed_at": "2023-12-06T15:30:56Z", - "stargazers_count": 1196, - "watchers_count": 1196, + "stargazers_count": 1197, + "watchers_count": 1197, "has_discussions": false, "forks_count": 155, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 155, - "watchers": 1196, + "watchers": 1197, "score": 0, "subscribers_count": 11 } diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 15f80a9fa2..e1ffa0d55b 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -1310,10 +1310,10 @@ "description": "ProxyLogon (CVE-2021-26855+CVE-2021-27065) Exchange Server RCE (SSRF->GetWebShell)", "fork": false, "created_at": "2022-06-27T08:07:48Z", - "updated_at": "2023-08-04T05:23:25Z", + "updated_at": "2024-01-16T03:28:45Z", "pushed_at": "2023-03-28T19:07:50Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1335,7 +1335,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json index feefe46900..aeefe63f2c 100644 --- a/2021/CVE-2021-26943.json +++ b/2021/CVE-2021-26943.json @@ -13,10 +13,10 @@ "description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.", "fork": false, "created_at": "2020-12-31T16:30:02Z", - "updated_at": "2024-01-12T13:09:42Z", + "updated_at": "2024-01-16T05:10:43Z", "pushed_at": "2021-03-29T12:33:38Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 119, + "watchers_count": 119, "has_discussions": true, "forks_count": 23, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 118, + "watchers": 119, "score": 0, "subscribers_count": 11 } diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json index c0ec32e112..9e648114b6 100644 --- a/2021/CVE-2021-34473.json +++ b/2021/CVE-2021-34473.json @@ -193,10 +193,10 @@ "description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability", "fork": false, "created_at": "2022-06-29T12:37:31Z", - "updated_at": "2023-12-30T05:14:10Z", + "updated_at": "2024-01-16T03:28:46Z", "pushed_at": "2022-06-30T08:36:58Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -205,7 +205,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index ffaf6e3eae..8375992297 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -573,10 +573,10 @@ "description": "Hashes for vulnerable LOG4J versions", "fork": false, "created_at": "2021-12-10T18:06:06Z", - "updated_at": "2024-01-12T14:50:39Z", + "updated_at": "2024-01-16T02:06:06Z", "pushed_at": "2021-12-17T17:02:24Z", - "stargazers_count": 151, - "watchers_count": 151, + "stargazers_count": 152, + "watchers_count": 152, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -585,7 +585,7 @@ "topics": [], "visibility": "public", "forks": 38, - "watchers": 151, + "watchers": 152, "score": 0, "subscribers_count": 14 }, @@ -1807,10 +1807,10 @@ "description": "Detections for CVE-2021-44228 inside of nested binaries", "fork": false, "created_at": "2021-12-11T16:08:47Z", - "updated_at": "2023-12-10T13:23:50Z", + "updated_at": "2024-01-16T02:08:45Z", "pushed_at": "2021-12-18T22:20:25Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -1828,7 +1828,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 33, + "watchers": 34, "score": 0, "subscribers_count": 3 }, @@ -1936,10 +1936,10 @@ "description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC", "fork": false, "created_at": "2021-12-12T00:29:03Z", - "updated_at": "2024-01-15T16:00:17Z", + "updated_at": "2024-01-16T02:09:58Z", "pushed_at": "2022-03-10T18:44:50Z", - "stargazers_count": 629, - "watchers_count": 629, + "stargazers_count": 630, + "watchers_count": 630, "has_discussions": false, "forks_count": 99, "allow_forking": true, @@ -1960,7 +1960,7 @@ ], "visibility": "public", "forks": 99, - "watchers": 629, + "watchers": 630, "score": 0, "subscribers_count": 28 }, @@ -3636,10 +3636,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2024-01-15T16:45:06Z", + "updated_at": "2024-01-16T06:09:10Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3326, - "watchers_count": 3326, + "stargazers_count": 3328, + "watchers_count": 3328, "has_discussions": true, "forks_count": 748, "allow_forking": true, @@ -3648,7 +3648,7 @@ "topics": [], "visibility": "public", "forks": 748, - "watchers": 3326, + "watchers": 3328, "score": 0, "subscribers_count": 58 }, @@ -4846,10 +4846,10 @@ "description": "Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.", "fork": false, "created_at": "2021-12-13T18:35:16Z", - "updated_at": "2023-10-24T07:11:30Z", + "updated_at": "2024-01-16T00:41:28Z", "pushed_at": "2021-12-21T16:01:08Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -4867,7 +4867,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 10, + "watchers": 9, "score": 0, "subscribers_count": 2 }, @@ -5655,10 +5655,10 @@ "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)", "fork": false, "created_at": "2021-12-14T10:04:42Z", - "updated_at": "2024-01-04T17:04:10Z", + "updated_at": "2024-01-16T02:05:08Z", "pushed_at": "2022-12-27T17:57:19Z", - "stargazers_count": 435, - "watchers_count": 435, + "stargazers_count": 436, + "watchers_count": 436, "has_discussions": true, "forks_count": 96, "allow_forking": true, @@ -5676,7 +5676,7 @@ ], "visibility": "public", "forks": 96, - "watchers": 435, + "watchers": 436, "score": 0, "subscribers_count": 21 }, diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json index f5d2227aca..d7112d190b 100644 --- a/2022/CVE-2022-0543.json +++ b/2022/CVE-2022-0543.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-03-16T06:41:50Z", "updated_at": "2024-01-08T05:24:14Z", - "pushed_at": "2022-07-23T23:14:02Z", + "pushed_at": "2024-01-16T03:32:12Z", "stargazers_count": 86, "watchers_count": 86, "has_discussions": false, diff --git a/2022/CVE-2022-22274.json b/2022/CVE-2022-22274.json index c694f8aeee..25891b51cd 100644 --- a/2022/CVE-2022-22274.json +++ b/2022/CVE-2022-22274.json @@ -73,10 +73,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T20:03:51Z", - "updated_at": "2024-01-15T20:20:05Z", + "updated_at": "2024-01-16T05:12:16Z", "pushed_at": "2024-01-12T20:15:47Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -85,8 +85,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 3d6deda841..341f443b5c 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -796,10 +796,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-01-12T16:04:41Z", + "updated_at": "2024-01-16T04:53:56Z", "pushed_at": "2023-12-06T15:30:56Z", - "stargazers_count": 1196, - "watchers_count": 1196, + "stargazers_count": 1197, + "watchers_count": 1197, "has_discussions": false, "forks_count": 155, "allow_forking": true, @@ -815,7 +815,7 @@ ], "visibility": "public", "forks": 155, - "watchers": 1196, + "watchers": 1197, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index dc2c55d768..b29ed11751 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-06-10T08:31:26Z", "updated_at": "2024-01-13T23:47:46Z", - "pushed_at": "2024-01-01T13:58:49Z", + "pushed_at": "2024-01-16T03:28:47Z", "stargazers_count": 145, "watchers_count": 145, "has_discussions": true, diff --git a/2023/CVE-2023-0656.json b/2023/CVE-2023-0656.json index 9e6d36f0fc..601ddef8ca 100644 --- a/2023/CVE-2023-0656.json +++ b/2023/CVE-2023-0656.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T20:03:51Z", - "updated_at": "2024-01-15T20:20:05Z", + "updated_at": "2024-01-16T05:12:16Z", "pushed_at": "2024-01-12T20:15:47Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,8 +25,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-0669.json b/2023/CVE-2023-0669.json index 0b49460b5a..314caa8c56 100644 --- a/2023/CVE-2023-0669.json +++ b/2023/CVE-2023-0669.json @@ -18,13 +18,13 @@ "stargazers_count": 101, "watchers_count": 101, "has_discussions": false, - "forks_count": 21, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 21, + "forks": 22, "watchers": 101, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-21036.json b/2023/CVE-2023-21036.json index b177faa5d1..61c6ef5a41 100644 --- a/2023/CVE-2023-21036.json +++ b/2023/CVE-2023-21036.json @@ -50,10 +50,10 @@ "description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036", "fork": false, "created_at": "2023-03-22T14:59:42Z", - "updated_at": "2023-11-11T16:04:05Z", + "updated_at": "2024-01-16T05:37:39Z", "pushed_at": "2023-05-15T12:12:33Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 74, + "watchers": 75, "score": 0, "subscribers_count": 9 }, diff --git a/2023/CVE-2023-25610.json b/2023/CVE-2023-25610.json index ef9e69c77c..a11dee31c1 100644 --- a/2023/CVE-2023-25610.json +++ b/2023/CVE-2023-25610.json @@ -18,13 +18,13 @@ "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 17, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-26602.json b/2023/CVE-2023-26602.json index 3e4f3b6a08..512d8016eb 100644 --- a/2023/CVE-2023-26602.json +++ b/2023/CVE-2023-26602.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-26609.json b/2023/CVE-2023-26609.json index 0fe114ab86..aba721f178 100644 --- a/2023/CVE-2023-26609.json +++ b/2023/CVE-2023-26609.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-31756.json b/2023/CVE-2023-31756.json index 5979cd57c7..3b89910e46 100644 --- a/2023/CVE-2023-31756.json +++ b/2023/CVE-2023-31756.json @@ -13,10 +13,10 @@ "description": "CVE-2023-31756 Proof of Concept - Remote Code Execution for Archer V1\/V2 Routers", "fork": false, "created_at": "2024-01-15T13:32:38Z", - "updated_at": "2024-01-15T13:33:46Z", + "updated_at": "2024-01-16T01:52:02Z", "pushed_at": "2024-01-15T13:54:40Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,8 +25,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-35813.json b/2023/CVE-2023-35813.json index 15e715551c..b783a722c4 100644 --- a/2023/CVE-2023-35813.json +++ b/2023/CVE-2023-35813.json @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36003.json b/2023/CVE-2023-36003.json index e301cf3572..2734b744a6 100644 --- a/2023/CVE-2023-36003.json +++ b/2023/CVE-2023-36003.json @@ -13,10 +13,10 @@ "description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)", "fork": false, "created_at": "2024-01-11T19:17:13Z", - "updated_at": "2024-01-15T21:27:23Z", + "updated_at": "2024-01-16T04:18:58Z", "pushed_at": "2024-01-11T19:42:03Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 70, + "watchers_count": 70, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 67, + "watchers": 70, "score": 0, "subscribers_count": 1 }, @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36025.json b/2023/CVE-2023-36025.json index 4fb3404714..86d326bd6d 100644 --- a/2023/CVE-2023-36025.json +++ b/2023/CVE-2023-36025.json @@ -13,10 +13,10 @@ "description": "Quick test for CVE-2023-26025 behaviours", "fork": false, "created_at": "2023-11-17T15:46:44Z", - "updated_at": "2023-12-25T20:47:15Z", + "updated_at": "2024-01-16T04:47:18Z", "pushed_at": "2023-11-29T10:21:25Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 5, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-36745.json b/2023/CVE-2023-36745.json index 20f128462e..bf35a34d67 100644 --- a/2023/CVE-2023-36745.json +++ b/2023/CVE-2023-36745.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-10-23T19:06:36Z", - "updated_at": "2024-01-12T15:34:38Z", + "updated_at": "2024-01-16T06:20:43Z", "pushed_at": "2023-10-29T11:12:26Z", - "stargazers_count": 140, - "watchers_count": 140, + "stargazers_count": 141, + "watchers_count": 141, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 140, + "watchers": 141, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-41892.json b/2023/CVE-2023-41892.json index ed6923323a..97197c9dd7 100644 --- a/2023/CVE-2023-41892.json +++ b/2023/CVE-2023-41892.json @@ -13,19 +13,19 @@ "description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)", "fork": false, "created_at": "2023-10-06T01:40:34Z", - "updated_at": "2023-12-20T14:15:17Z", + "updated_at": "2024-01-16T04:46:15Z", "pushed_at": "2023-10-07T03:26:00Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 4, + "forks": 2, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 17b6fa242c..6900ac4aff 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-46805.json b/2023/CVE-2023-46805.json index 89fae6932a..a226608e12 100644 --- a/2023/CVE-2023-46805.json +++ b/2023/CVE-2023-46805.json @@ -13,8 +13,8 @@ "description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.", "fork": false, "created_at": "2024-01-14T18:30:11Z", - "updated_at": "2024-01-15T11:24:30Z", - "pushed_at": "2024-01-14T23:43:10Z", + "updated_at": "2024-01-16T04:34:03Z", + "pushed_at": "2024-01-16T05:48:06Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, @@ -22,7 +22,11 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "cve-2023-46805", + "cve-2024-21887", + "ivanti-connect-secure" + ], "visibility": "public", "forks": 0, "watchers": 5, diff --git a/2023/CVE-2023-50164.json b/2023/CVE-2023-50164.json index 799893af1c..a2c038f4da 100644 --- a/2023/CVE-2023-50164.json +++ b/2023/CVE-2023-50164.json @@ -18,13 +18,13 @@ "stargazers_count": 66, "watchers_count": 66, "has_discussions": false, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 17, "watchers": 66, "score": 0, "subscribers_count": 3 diff --git a/2023/CVE-2023-5043.json b/2023/CVE-2023-5043.json index f8f2baf40a..8fd52a401f 100644 --- a/2023/CVE-2023-5043.json +++ b/2023/CVE-2023-5043.json @@ -32,6 +32,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json index 14ae9cb1c3..8b82313e4f 100644 --- a/2023/CVE-2023-51467.json +++ b/2023/CVE-2023-51467.json @@ -124,10 +124,10 @@ "description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.", "fork": false, "created_at": "2024-01-02T14:20:10Z", - "updated_at": "2024-01-14T22:22:41Z", + "updated_at": "2024-01-16T06:01:04Z", "pushed_at": "2024-01-02T15:43:26Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 30, + "watchers": 31, "score": 0, "subscribers_count": 1 }, @@ -214,10 +214,10 @@ "description": "A go-exploit for Apache OFBiz CVE-2023-51467", "fork": false, "created_at": "2024-01-09T16:58:06Z", - "updated_at": "2024-01-14T21:15:22Z", + "updated_at": "2024-01-16T01:31:12Z", "pushed_at": "2024-01-10T21:40:04Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -230,7 +230,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-6875.json b/2023/CVE-2023-6875.json index fe46744cd5..a1f075c192 100644 --- a/2023/CVE-2023-6875.json +++ b/2023/CVE-2023-6875.json @@ -13,10 +13,10 @@ "description": "CVE-2023-6875 PoC", "fork": false, "created_at": "2024-01-13T15:23:17Z", - "updated_at": "2024-01-15T09:14:09Z", + "updated_at": "2024-01-16T03:00:44Z", "pushed_at": "2024-01-15T10:58:20Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 12, + "watchers": 14, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json index 6b5c79d7bc..b186b603ef 100644 --- a/2023/CVE-2023-7028.json +++ b/2023/CVE-2023-7028.json @@ -43,10 +43,10 @@ "description": "CVE-2023-7028", "fork": false, "created_at": "2024-01-12T10:53:50Z", - "updated_at": "2024-01-16T00:19:46Z", + "updated_at": "2024-01-16T04:33:34Z", "pushed_at": "2024-01-12T13:56:38Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -58,7 +58,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 29, + "watchers": 31, "score": 0, "subscribers_count": 1 }, @@ -106,19 +106,19 @@ "description": "This repository presents a proof-of-concept of CVE-2023-7028", "fork": false, "created_at": "2024-01-12T18:29:27Z", - "updated_at": "2024-01-16T00:20:06Z", + "updated_at": "2024-01-16T03:07:32Z", "pushed_at": "2024-01-13T13:50:20Z", - "stargazers_count": 143, - "watchers_count": 143, + "stargazers_count": 146, + "watchers_count": 146, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, - "watchers": 143, + "forks": 24, + "watchers": 146, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-0193.json b/2024/CVE-2024-0193.json index db374bd1ad..4c5eee5484 100644 --- a/2024/CVE-2024-0193.json +++ b/2024/CVE-2024-0193.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0252.json b/2024/CVE-2024-0252.json index d7b1d41522..2522a14054 100644 --- a/2024/CVE-2024-0252.json +++ b/2024/CVE-2024-0252.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-20656.json b/2024/CVE-2024-20656.json index 9870fe8d80..6469ebf9d1 100644 --- a/2024/CVE-2024-20656.json +++ b/2024/CVE-2024-20656.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T15:08:01Z", - "updated_at": "2024-01-15T18:02:58Z", + "updated_at": "2024-01-16T06:03:26Z", "pushed_at": "2024-01-14T07:14:33Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 76, + "watchers_count": 76, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 73, + "watchers": 76, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index dff7a33fb2..ee925023c6 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -43,8 +43,8 @@ "description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.", "fork": false, "created_at": "2024-01-14T18:30:11Z", - "updated_at": "2024-01-15T11:24:30Z", - "pushed_at": "2024-01-14T23:43:10Z", + "updated_at": "2024-01-16T04:34:03Z", + "pushed_at": "2024-01-16T05:48:06Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, @@ -52,7 +52,11 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "cve-2023-46805", + "cve-2024-21887", + "ivanti-connect-secure" + ], "visibility": "public", "forks": 0, "watchers": 5, diff --git a/README.md b/README.md index fc2e48d7f5..1c03db0f85 100644 --- a/README.md +++ b/README.md @@ -5905,10 +5905,18 @@ - [herombey/CVE-2023-47437](https://github.com/herombey/CVE-2023-47437) -### CVE-2023-47459 +### CVE-2023-47459 (-) + +An issue in Knovos Discovery v.22.67.0 allows a remote attacker to obtain sensitive information via the /DiscoveryReview/Service/CaseManagement.svc/GetProductSiteName component. + + - [aleksey-vi/CVE-2023-47459](https://github.com/aleksey-vi/CVE-2023-47459) -### CVE-2023-47460 +### CVE-2023-47460 (-) + +SQL injection vulnerability in Knovos Discovery v.22.67.0 allows a remote attacker to execute arbitrary code via the /DiscoveryProcess/Service/Admin.svc/getGridColumnStructure component. + + - [aleksey-vi/CVE-2023-47460](https://github.com/aleksey-vi/CVE-2023-47460) ### CVE-2023-47488 (2023-11-09) @@ -5981,7 +5989,11 @@ - [aprkr/CVE-2023-48034](https://github.com/aprkr/CVE-2023-48034) -### CVE-2023-48104 +### CVE-2023-48104 (-) + +Alinto SOGo 5.8.0 is vulnerable to HTML Injection. + + - [E1tex/CVE-2023-48104](https://github.com/E1tex/CVE-2023-48104) ### CVE-2023-48123 (2023-12-06) @@ -6372,7 +6384,11 @@ ### CVE-2023-51802 - [geraldoalcantara/CVE-2023-51802](https://github.com/geraldoalcantara/CVE-2023-51802) -### CVE-2023-51810 +### CVE-2023-51810 (-) + +SQL injection vulnerability in StackIdeas EasyDiscuss v.5.0.5 and fixed in v.5.0.10 allows a remote attacker to obtain sensitive information via a crafted request to the search parameter in the Users module. + + - [Pastea/CVE-2023-51810](https://github.com/Pastea/CVE-2023-51810) ### CVE-2023-52251 @@ -34612,6 +34628,7 @@ - [m3terpreter/CVE-2016-4437](https://github.com/m3terpreter/CVE-2016-4437) - [4nth0ny1130/shisoserial](https://github.com/4nth0ny1130/shisoserial) - [pizza-power/CVE-2016-4437](https://github.com/pizza-power/CVE-2016-4437) +- [xk-mt/CVE-2016-4437](https://github.com/xk-mt/CVE-2016-4437) ### CVE-2016-4438 (2016-07-04) @@ -38427,7 +38444,6 @@ - [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap) - [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447) - [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447) -- [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447) - [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3) - [Ziemni/CVE-2007-2447-in-Python](https://github.com/Ziemni/CVE-2007-2447-in-Python) - [0xKn/CVE-2007-2447](https://github.com/0xKn/CVE-2007-2447)