From 044017d21e215262cb466800c86612000dd17bf3 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 30 May 2022 15:15:50 +0900 Subject: [PATCH] Auto Update 2022/05/30 06:15:50 --- 2016/CVE-2016-0051.json | 6 +-- 2017/CVE-2017-12615.json | 8 ++-- 2017/CVE-2017-7494.json | 8 ++-- 2017/CVE-2017-9947.json | 12 +++--- 2019/CVE-2019-0708.json | 12 +++--- 2019/CVE-2019-11581.json | 8 ++-- 2020/CVE-2020-1472.json | 8 ++-- 2020/CVE-2020-14883.json | 8 ++-- 2021/CVE-2021-1732.json | 8 ++-- 2021/CVE-2021-22205.json | 8 ++-- 2021/CVE-2021-24160.json | 56 ++++++++++++++++++++++++++ 2021/CVE-2021-25646.json | 8 ++-- 2021/CVE-2021-26857.json | 8 ++-- 2021/CVE-2021-3560.json | 16 ++++---- 2021/CVE-2021-42013.json | 4 +- 2021/CVE-2021-44228.json | 87 +++++----------------------------------- 2022/CVE-2022-0540.json | 8 ++-- 2022/CVE-2022-0543.json | 4 +- 2022/CVE-2022-1388.json | 22 +++++----- 2022/CVE-2022-22947.json | 8 ++-- 2022/CVE-2022-22972.json | 16 ++++---- README.md | 15 +++++-- 22 files changed, 167 insertions(+), 171 deletions(-) create mode 100644 2021/CVE-2021-24160.json diff --git a/2016/CVE-2016-0051.json b/2016/CVE-2016-0051.json index 1a2ca4ec74..686262a833 100644 --- a/2016/CVE-2016-0051.json +++ b/2016/CVE-2016-0051.json @@ -13,16 +13,16 @@ "description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)", "fork": false, "created_at": "2016-02-09T21:30:34Z", - "updated_at": "2022-03-24T19:13:00Z", + "updated_at": "2022-05-30T02:05:40Z", "pushed_at": "2016-05-09T17:53:48Z", "stargazers_count": 330, "watchers_count": 330, - "forks_count": 150, + "forks_count": 151, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 150, + "forks": 151, "watchers": 330, "score": 0 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index cad934037a..9f63d161bc 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -272,14 +272,14 @@ { "id": 328929654, "name": "CVE-2017-12615-EXP", - "full_name": "gardenWhy\/CVE-2017-12615-EXP", + "full_name": "w0x68y\/CVE-2017-12615-EXP", "owner": { - "login": "gardenWhy", + "login": "w0x68y", "id": 22195911, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4", - "html_url": "https:\/\/github.com\/gardenWhy" + "html_url": "https:\/\/github.com\/w0x68y" }, - "html_url": "https:\/\/github.com\/gardenWhy\/CVE-2017-12615-EXP", + "html_url": "https:\/\/github.com\/w0x68y\/CVE-2017-12615-EXP", "description": "CVE-2017-12615 任意文件写入exp,写入webshell", "fork": false, "created_at": "2021-01-12T09:07:12Z", diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 6e2d8cea97..a9eebf706f 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -154,17 +154,17 @@ "description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability", "fork": false, "created_at": "2017-06-05T16:25:57Z", - "updated_at": "2022-05-18T17:45:04Z", + "updated_at": "2022-05-30T04:55:40Z", "pushed_at": "2021-03-09T09:12:55Z", - "stargazers_count": 250, - "watchers_count": 250, + "stargazers_count": 249, + "watchers_count": 249, "forks_count": 83, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 83, - "watchers": 250, + "watchers": 249, "score": 0 }, { diff --git a/2017/CVE-2017-9947.json b/2017/CVE-2017-9947.json index ca228950b1..8edc8d55ef 100644 --- a/2017/CVE-2017-9947.json +++ b/2017/CVE-2017-9947.json @@ -13,17 +13,17 @@ "description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.", "fork": false, "created_at": "2022-05-26T01:13:42Z", - "updated_at": "2022-05-29T23:05:25Z", + "updated_at": "2022-05-30T03:36:24Z", "pushed_at": "2022-05-26T19:14:20Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 1, + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 6, + "forks": 2, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index ac58a768e3..111495aa27 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -681,12 +681,12 @@ "pushed_at": "2019-05-16T02:12:17Z", "stargazers_count": 42, "watchers_count": 42, - "forks_count": 35, + "forks_count": 34, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 35, + "forks": 34, "watchers": 42, "score": 0 }, @@ -2861,17 +2861,17 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2022-05-29T06:14:22Z", + "updated_at": "2022-05-30T01:34:49Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 293, - "watchers_count": 293, + "stargazers_count": 295, + "watchers_count": 295, "forks_count": 71, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 71, - "watchers": 293, + "watchers": 295, "score": 0 }, { diff --git a/2019/CVE-2019-11581.json b/2019/CVE-2019-11581.json index 46e34a60c1..a1d8ebd267 100644 --- a/2019/CVE-2019-11581.json +++ b/2019/CVE-2019-11581.json @@ -13,17 +13,17 @@ "description": "Atlassian JIRA Template injection vulnerability RCE", "fork": false, "created_at": "2019-07-16T02:27:00Z", - "updated_at": "2022-03-09T16:25:30Z", + "updated_at": "2022-05-30T05:56:59Z", "pushed_at": "2019-07-22T06:47:52Z", - "stargazers_count": 84, - "watchers_count": 84, + "stargazers_count": 85, + "watchers_count": 85, "forks_count": 30, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 30, - "watchers": 84, + "watchers": 85, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 323cc99ff2..fe578615a6 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -40,17 +40,17 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2022-05-27T03:03:19Z", + "updated_at": "2022-05-30T04:59:18Z", "pushed_at": "2021-12-08T10:31:54Z", - "stargazers_count": 1457, - "watchers_count": 1457, + "stargazers_count": 1458, + "watchers_count": 1458, "forks_count": 333, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 333, - "watchers": 1457, + "watchers": 1458, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index ae33fd269e..e85e1f674d 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -121,10 +121,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2022-05-27T17:05:07Z", + "updated_at": "2022-05-30T01:20:12Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 960, - "watchers_count": 960, + "stargazers_count": 961, + "watchers_count": 961, "forks_count": 300, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 960, + "watchers": 961, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 006201ca8c..93e57cbd2d 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,17 +13,17 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2022-05-05T02:28:30Z", + "updated_at": "2022-05-30T02:47:05Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 379, - "watchers_count": 379, + "stargazers_count": 380, + "watchers_count": 380, "forks_count": 118, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 118, - "watchers": 379, + "watchers": 380, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index ee4b47d7c9..9cd997caac 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -63,14 +63,14 @@ { "id": 440732240, "name": "Gitlab-CVE-2021-22205", - "full_name": "gardenWhy\/Gitlab-CVE-2021-22205", + "full_name": "w0x68y\/Gitlab-CVE-2021-22205", "owner": { - "login": "gardenWhy", + "login": "w0x68y", "id": 22195911, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4", - "html_url": "https:\/\/github.com\/gardenWhy" + "html_url": "https:\/\/github.com\/w0x68y" }, - "html_url": "https:\/\/github.com\/gardenWhy\/Gitlab-CVE-2021-22205", + "html_url": "https:\/\/github.com\/w0x68y\/Gitlab-CVE-2021-22205", "description": "CVE-2021-22205 的批量检测脚本", "fork": false, "created_at": "2021-12-22T04:30:17Z", diff --git a/2021/CVE-2021-24160.json b/2021/CVE-2021-24160.json new file mode 100644 index 0000000000..7fc00d8020 --- /dev/null +++ b/2021/CVE-2021-24160.json @@ -0,0 +1,56 @@ +[ + { + "id": 497754815, + "name": "CVE-2021-24160", + "full_name": "hnthuan1998\/CVE-2021-24160", + "owner": { + "login": "hnthuan1998", + "id": 106500287, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106500287?v=4", + "html_url": "https:\/\/github.com\/hnthuan1998" + }, + "html_url": "https:\/\/github.com\/hnthuan1998\/CVE-2021-24160", + "description": null, + "fork": false, + "created_at": "2022-05-30T01:46:50Z", + "updated_at": "2022-05-30T01:46:50Z", + "pushed_at": "2022-05-30T01:46:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 497755127, + "name": "Exploit-CVE-2021-24160", + "full_name": "hnthuan1998\/Exploit-CVE-2021-24160", + "owner": { + "login": "hnthuan1998", + "id": 106500287, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106500287?v=4", + "html_url": "https:\/\/github.com\/hnthuan1998" + }, + "html_url": "https:\/\/github.com\/hnthuan1998\/Exploit-CVE-2021-24160", + "description": "Exploit CVE-2021-24160", + "fork": false, + "created_at": "2022-05-30T01:48:27Z", + "updated_at": "2022-05-30T01:52:13Z", + "pushed_at": "2022-05-30T01:52:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index f432ce5ed2..b58a4743be 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -121,10 +121,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2022-05-27T17:05:07Z", + "updated_at": "2022-05-30T01:20:12Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 960, - "watchers_count": 960, + "stargazers_count": 961, + "watchers_count": 961, "forks_count": 300, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 960, + "watchers": 961, "score": 0 }, { diff --git a/2021/CVE-2021-26857.json b/2021/CVE-2021-26857.json index b741efc97c..fe52877443 100644 --- a/2021/CVE-2021-26857.json +++ b/2021/CVE-2021-26857.json @@ -13,17 +13,17 @@ "description": "proxylogon exploit - CVE-2021-26857", "fork": false, "created_at": "2021-03-11T17:32:32Z", - "updated_at": "2022-05-29T22:51:56Z", + "updated_at": "2022-05-30T01:19:27Z", "pushed_at": "2021-03-11T17:34:15Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 114, + "watchers_count": 114, "forks_count": 35, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 35, - "watchers": 113, + "watchers": 114, "score": 0 }, { diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 63fcd9a4ff..76d604b817 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -380,17 +380,17 @@ "description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)", "fork": false, "created_at": "2022-04-29T18:57:30Z", - "updated_at": "2022-05-29T18:09:24Z", + "updated_at": "2022-05-30T06:13:50Z", "pushed_at": "2022-05-02T07:49:01Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 62, + "watchers_count": 62, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 53, + "watchers": 62, "score": 0 }, { @@ -407,17 +407,17 @@ "description": "PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)", "fork": false, "created_at": "2022-04-30T05:53:45Z", - "updated_at": "2022-05-28T11:58:41Z", + "updated_at": "2022-05-30T01:49:35Z", "pushed_at": "2022-05-02T07:49:12Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0 }, { diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index 79b2b1376f..e0b6a8c306 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -44,7 +44,7 @@ "pushed_at": "2022-02-09T17:27:53Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ @@ -53,7 +53,7 @@ "path-traversal-exploitation" ], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 0, "score": 0 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 8f2542d751..ad505ad70a 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -142,46 +142,6 @@ "watchers": 181, "score": 0 }, - { - "id": 436877979, - "name": "cloudrasp-log4j2", - "full_name": "boundaryx\/cloudrasp-log4j2", - "owner": { - "login": "boundaryx", - "id": 95878655, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4", - "html_url": "https:\/\/github.com\/boundaryx" - }, - "html_url": "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2", - "description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.", - "fork": false, - "created_at": "2021-12-10T06:42:37Z", - "updated_at": "2022-05-19T08:41:19Z", - "pushed_at": "2021-12-11T02:49:41Z", - "stargazers_count": 106, - "watchers_count": 106, - "forks_count": 19, - "allow_forking": true, - "is_template": false, - "topics": [ - "cve-2021-44228", - "defense", - "hardening", - "java", - "log4j", - "log4j2", - "protection", - "rasp", - "rce", - "security", - "security-tools", - "vulnerability" - ], - "visibility": "public", - "forks": 19, - "watchers": 106, - "score": 0 - }, { "id": 436881928, "name": "CVE-2021-44228", @@ -649,11 +609,11 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-05-28T13:37:57Z", + "updated_at": "2022-05-30T02:37:39Z", "pushed_at": "2022-03-20T16:33:49Z", - "stargazers_count": 1377, - "watchers_count": 1377, - "forks_count": 377, + "stargazers_count": 1378, + "watchers_count": 1378, + "forks_count": 378, "allow_forking": true, "is_template": false, "topics": [ @@ -663,8 +623,8 @@ "security" ], "visibility": "public", - "forks": 377, - "watchers": 1377, + "forks": 378, + "watchers": 1378, "score": 0 }, { @@ -699,33 +659,6 @@ "watchers": 79, "score": 0 }, - { - "id": 437142312, - "name": "CVE-2021-44228", - "full_name": "racoon-rac\/CVE-2021-44228", - "owner": { - "login": "racoon-rac", - "id": 64579294, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4", - "html_url": "https:\/\/github.com\/racoon-rac" - }, - "html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228", - "description": null, - "fork": false, - "created_at": "2021-12-10T23:37:55Z", - "updated_at": "2021-12-11T01:11:19Z", - "pushed_at": "2021-12-11T01:07:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 437142703, "name": "CVE-2021-44228-PoC", @@ -3175,17 +3108,17 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-05-29T14:54:00Z", + "updated_at": "2022-05-30T02:58:32Z", "pushed_at": "2022-05-17T13:25:17Z", - "stargazers_count": 2899, - "watchers_count": 2899, + "stargazers_count": 2901, + "watchers_count": 2901, "forks_count": 711, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 711, - "watchers": 2899, + "watchers": 2901, "score": 0 }, { diff --git a/2022/CVE-2022-0540.json b/2022/CVE-2022-0540.json index 15532556b4..be139163e3 100644 --- a/2022/CVE-2022-0540.json +++ b/2022/CVE-2022-0540.json @@ -13,17 +13,17 @@ "description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)", "fork": false, "created_at": "2022-05-25T10:47:04Z", - "updated_at": "2022-05-29T13:52:19Z", + "updated_at": "2022-05-30T01:34:01Z", "pushed_at": "2022-05-25T13:43:16Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 15, + "watchers": 16, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json index 59060332ba..0a40200e2c 100644 --- a/2022/CVE-2022-0543.json +++ b/2022/CVE-2022-0543.json @@ -17,12 +17,12 @@ "pushed_at": "2022-03-16T06:48:01Z", "stargazers_count": 46, "watchers_count": 46, - "forks_count": 18, + "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 18, + "forks": 19, "watchers": 46, "score": 0 } diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index e2dc1e7b57..aa32e32fe5 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -310,17 +310,17 @@ "description": "POC for CVE-2022-1388", "fork": false, "created_at": "2022-05-09T11:46:45Z", - "updated_at": "2022-05-27T04:40:12Z", + "updated_at": "2022-05-30T00:35:04Z", "pushed_at": "2022-05-09T20:52:07Z", - "stargazers_count": 201, - "watchers_count": 201, + "stargazers_count": 202, + "watchers_count": 202, "forks_count": 32, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 32, - "watchers": 201, + "watchers": 202, "score": 0 }, { @@ -529,17 +529,17 @@ "description": "PoC For F5 BIG-IP - bash script Exploit one Liner", "fork": false, "created_at": "2022-05-10T02:57:31Z", - "updated_at": "2022-05-28T12:40:11Z", + "updated_at": "2022-05-30T06:16:51Z", "pushed_at": "2022-05-10T08:38:58Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 2, + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 8, + "forks": 3, + "watchers": 9, "score": 0 }, { @@ -1324,7 +1324,7 @@ "fork": false, "created_at": "2022-05-17T10:51:39Z", "updated_at": "2022-05-19T04:36:29Z", - "pushed_at": "2022-05-21T15:36:57Z", + "pushed_at": "2022-05-30T05:40:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 87dde7d673..90d3c8c4c1 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -420,17 +420,17 @@ "description": "CVE-2022-22947批量检测脚本,超时时间不超过2s,已更新可反弹shell的EXP,欢迎师傅们试用", "fork": false, "created_at": "2022-03-04T11:31:00Z", - "updated_at": "2022-05-29T16:45:51Z", + "updated_at": "2022-05-30T02:01:50Z", "pushed_at": "2022-03-08T09:43:50Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 15, - "watchers": 31, + "watchers": 32, "score": 0 }, { diff --git a/2022/CVE-2022-22972.json b/2022/CVE-2022-22972.json index 30d5fa844a..11dc0d364e 100644 --- a/2022/CVE-2022-22972.json +++ b/2022/CVE-2022-22972.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-05-24T20:19:55Z", - "updated_at": "2022-05-29T18:08:08Z", + "updated_at": "2022-05-30T01:26:34Z", "pushed_at": "2022-05-26T16:07:18Z", - "stargazers_count": 105, - "watchers_count": 105, - "forks_count": 18, + "stargazers_count": 106, + "watchers_count": 106, + "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 18, - "watchers": 105, + "forks": 19, + "watchers": 106, "score": 0 }, { @@ -40,8 +40,8 @@ "description": "vmware authentication bypass", "fork": false, "created_at": "2022-05-28T20:56:09Z", - "updated_at": "2022-05-29T12:32:49Z", - "pushed_at": "2022-05-28T21:10:21Z", + "updated_at": "2022-05-30T01:01:11Z", + "pushed_at": "2022-05-30T03:10:48Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/README.md b/README.md index 8f20d85ad1..b59bc6ec5b 100644 --- a/README.md +++ b/README.md @@ -3459,7 +3459,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro - [mr-r3bot/Gitlab-CVE-2021-22205](https://github.com/mr-r3bot/Gitlab-CVE-2021-22205) - [inspiringz/CVE-2021-22205](https://github.com/inspiringz/CVE-2021-22205) -- [gardenWhy/Gitlab-CVE-2021-22205](https://github.com/gardenWhy/Gitlab-CVE-2021-22205) +- [w0x68y/Gitlab-CVE-2021-22205](https://github.com/w0x68y/Gitlab-CVE-2021-22205) - [GitLab-Red-Team/cve-2021-22205-hash-harvester](https://github.com/GitLab-Red-Team/cve-2021-22205-hash-harvester) - [honypot/CVE-2021-22205](https://github.com/honypot/CVE-2021-22205) - [momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-](https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-) @@ -3605,6 +3605,15 @@ Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versi - [dnr6419/CVE-2021-24145](https://github.com/dnr6419/CVE-2021-24145) +### CVE-2021-24160 (2021-04-05) + + +In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site. + + +- [hnthuan1998/CVE-2021-24160](https://github.com/hnthuan1998/CVE-2021-24160) +- [hnthuan1998/Exploit-CVE-2021-24160](https://github.com/hnthuan1998/Exploit-CVE-2021-24160) + ### CVE-2021-24307 (2021-05-24) @@ -5548,7 +5557,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [jacobtread/L4J-Vuln-Patch](https://github.com/jacobtread/L4J-Vuln-Patch) - [jas502n/Log4j2-CVE-2021-44228](https://github.com/jas502n/Log4j2-CVE-2021-44228) - [HyCraftHD/Log4J-RCE-Proof-Of-Concept](https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept) -- [boundaryx/cloudrasp-log4j2](https://github.com/boundaryx/cloudrasp-log4j2) - [dbgee/CVE-2021-44228](https://github.com/dbgee/CVE-2021-44228) - [CreeperHost/Log4jPatcher](https://github.com/CreeperHost/Log4jPatcher) - [DragonSurvivalEU/RCE](https://github.com/DragonSurvivalEU/RCE) @@ -5566,7 +5574,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words) - [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc) - [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot) -- [racoon-rac/CVE-2021-44228](https://github.com/racoon-rac/CVE-2021-44228) - [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC) - [1lann/log4shelldetect](https://github.com/1lann/log4shelldetect) - [binganao/Log4j2-RCE](https://github.com/binganao/Log4j2-RCE) @@ -20627,7 +20634,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e. - [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615) - [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615) - [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615) -- [gardenWhy/CVE-2017-12615-EXP](https://github.com/gardenWhy/CVE-2017-12615-EXP) +- [w0x68y/CVE-2017-12615-EXP](https://github.com/w0x68y/CVE-2017-12615-EXP) ### CVE-2017-12617 (2017-10-03)