diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 7f1625e3d6..ad583fca5c 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -129,10 +129,10 @@ "description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.", "fork": false, "created_at": "2017-11-21T15:22:41Z", - "updated_at": "2023-02-21T12:06:17Z", + "updated_at": "2023-03-20T20:36:01Z", "pushed_at": "2017-12-06T12:47:31Z", - "stargazers_count": 307, - "watchers_count": 307, + "stargazers_count": 308, + "watchers_count": 308, "has_discussions": false, "forks_count": 96, "allow_forking": true, @@ -146,7 +146,7 @@ ], "visibility": "public", "forks": 96, - "watchers": 307, + "watchers": 308, "score": 0 }, { diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index bda2fa31a0..f3b4f74401 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -250,7 +250,7 @@ "description": "cve-2018-10933 libssh authentication bypass", "fork": false, "created_at": "2018-10-18T19:13:45Z", - "updated_at": "2022-09-07T06:58:04Z", + "updated_at": "2023-03-20T19:49:55Z", "pushed_at": "2018-10-21T21:24:29Z", "stargazers_count": 101, "watchers_count": 101, diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 776b6fc31e..6975edb16d 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -104,10 +104,10 @@ "description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ", "fork": false, "created_at": "2018-06-07T08:30:07Z", - "updated_at": "2023-02-26T14:56:04Z", + "updated_at": "2023-03-20T20:34:45Z", "pushed_at": "2018-08-08T05:48:24Z", - "stargazers_count": 292, - "watchers_count": 292, + "stargazers_count": 293, + "watchers_count": 293, "has_discussions": false, "forks_count": 126, "allow_forking": true, @@ -116,7 +116,7 @@ "topics": [], "visibility": "public", "forks": 126, - "watchers": 292, + "watchers": 293, "score": 0 }, { diff --git a/2020/CVE-2020-13935.json b/2020/CVE-2020-13935.json index 932d3832be..a79f6f5e74 100644 --- a/2020/CVE-2020-13935.json +++ b/2020/CVE-2020-13935.json @@ -18,13 +18,13 @@ "stargazers_count": 156, "watchers_count": 156, "has_discussions": false, - "forks_count": 40, + "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 40, + "forks": 41, "watchers": 156, "score": 0 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 6cf0b1229f..e9e85edafc 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1532,10 +1532,10 @@ "description": "CVE-2021-3156 POC and Docker and Analysis write up", "fork": false, "created_at": "2022-01-27T02:31:43Z", - "updated_at": "2023-01-31T18:43:03Z", + "updated_at": "2023-03-20T21:20:34Z", "pushed_at": "2022-05-23T01:51:14Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -1544,7 +1544,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2022/CVE-2022-30887.json b/2021/CVE-2021-3656.json similarity index 51% rename from 2022/CVE-2022-30887.json rename to 2021/CVE-2021-3656.json index 26fa6ca150..7a0851561d 100644 --- a/2022/CVE-2022-30887.json +++ b/2021/CVE-2021-3656.json @@ -1,20 +1,20 @@ [ { - "id": 510479826, - "name": "CVE-2022-30887", - "full_name": "MuallimNaci\/CVE-2022-30887", + "id": 562227251, + "name": "CVE-2021-3656-Demo", + "full_name": "rami08448\/CVE-2021-3656-Demo", "owner": { - "login": "MuallimNaci", - "id": 87265009, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87265009?v=4", - "html_url": "https:\/\/github.com\/MuallimNaci" + "login": "rami08448", + "id": 77466752, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77466752?v=4", + "html_url": "https:\/\/github.com\/rami08448" }, - "html_url": "https:\/\/github.com\/MuallimNaci\/CVE-2022-30887", + "html_url": "https:\/\/github.com\/rami08448\/CVE-2021-3656-Demo", "description": null, "fork": false, - "created_at": "2022-07-04T19:24:56Z", - "updated_at": "2022-12-08T03:15:35Z", - "pushed_at": "2022-07-04T19:30:52Z", + "created_at": "2022-11-05T17:32:47Z", + "updated_at": "2023-03-20T20:09:22Z", + "pushed_at": "2022-11-22T03:03:14Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index f8721eb1aa..f64bc02cb7 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -1508,14 +1508,14 @@ { "id": 452478414, "name": "CVE-2021-4034", - "full_name": "T3cnokarita\/CVE-2021-4034", + "full_name": "ch4rum\/CVE-2021-4034", "owner": { - "login": "T3cnokarita", + "login": "ch4rum", "id": 98498025, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98498025?v=4", - "html_url": "https:\/\/github.com\/T3cnokarita" + "html_url": "https:\/\/github.com\/ch4rum" }, - "html_url": "https:\/\/github.com\/T3cnokarita\/CVE-2021-4034", + "html_url": "https:\/\/github.com\/ch4rum\/CVE-2021-4034", "description": null, "fork": false, "created_at": "2022-01-26T23:46:28Z", diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 954d5d8cce..24c23c2e90 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -73,10 +73,10 @@ "description": "LPE exploit for a UAF in Windows (CVE-2021-40449).", "fork": false, "created_at": "2021-10-25T04:58:49Z", - "updated_at": "2023-01-31T18:52:30Z", + "updated_at": "2023-03-20T19:39:52Z", "pushed_at": "2021-11-05T06:54:10Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -87,7 +87,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 35, + "watchers": 36, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 956d98f003..8858dad824 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -923,14 +923,14 @@ { "id": 414574168, "name": "POC-CVE-2021-41773", - "full_name": "Hattan-515\/POC-CVE-2021-41773", + "full_name": "Hattan515\/POC-CVE-2021-41773", "owner": { - "login": "Hattan-515", + "login": "Hattan515", "id": 92092916, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92092916?v=4", - "html_url": "https:\/\/github.com\/Hattan-515" + "html_url": "https:\/\/github.com\/Hattan515" }, - "html_url": "https:\/\/github.com\/Hattan-515\/POC-CVE-2021-41773", + "html_url": "https:\/\/github.com\/Hattan515\/POC-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-07T11:31:03Z", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index fba8fa56be..eb3e21779e 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -909,10 +909,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2023-03-20T10:39:55Z", + "updated_at": "2023-03-21T00:18:22Z", "pushed_at": "2023-02-08T23:41:04Z", - "stargazers_count": 1549, - "watchers_count": 1549, + "stargazers_count": 1550, + "watchers_count": 1550, "has_discussions": false, "forks_count": 449, "allow_forking": true, @@ -926,7 +926,7 @@ ], "visibility": "public", "forks": 449, - "watchers": 1549, + "watchers": 1550, "score": 0 }, { diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json index 507f913f80..fdd490f5b9 100644 --- a/2022/CVE-2022-0492.json +++ b/2022/CVE-2022-0492.json @@ -18,13 +18,13 @@ "stargazers_count": 46, "watchers_count": 46, "has_discussions": false, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, + "forks": 15, "watchers": 46, "score": 0 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 2bd2607bc3..58e4e341df 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1865,64 +1865,6 @@ "watchers": 4, "score": 0 }, - { - "id": 510629189, - "name": "dirtypipe-ebpf_detection", - "full_name": "airbus-cert\/dirtypipe-ebpf_detection", - "owner": { - "login": "airbus-cert", - "id": 26453405, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4", - "html_url": "https:\/\/github.com\/airbus-cert" - }, - "html_url": "https:\/\/github.com\/airbus-cert\/dirtypipe-ebpf_detection", - "description": "An eBPF detection program for CVE-2022-0847", - "fork": false, - "created_at": "2022-07-05T07:20:59Z", - "updated_at": "2023-01-16T18:05:15Z", - "pushed_at": "2022-07-05T14:25:46Z", - "stargazers_count": 21, - "watchers_count": 21, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 21, - "score": 0 - }, - { - "id": 510867863, - "name": "Dirty-Pipe", - "full_name": "edr1412\/Dirty-Pipe", - "owner": { - "login": "edr1412", - "id": 40953911, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4", - "html_url": "https:\/\/github.com\/edr1412" - }, - "html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe", - "description": "exp of CVE-2022-0847", - "fork": false, - "created_at": "2022-07-05T19:22:50Z", - "updated_at": "2023-01-31T12:51:32Z", - "pushed_at": "2022-07-05T19:23:27Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0 - }, { "id": 520138171, "name": "CVE-2022-0847-DirtyPipe-Exploits", diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index e7837e6ed5..d1ee79fa28 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -1592,68 +1592,6 @@ "watchers": 3, "score": 0 }, - { - "id": 509548569, - "name": "CVE-2022-1388_refresh", - "full_name": "Luchoane\/CVE-2022-1388_refresh", - "owner": { - "login": "Luchoane", - "id": 40374879, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4", - "html_url": "https:\/\/github.com\/Luchoane" - }, - "html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh", - "description": "PoC for exploiting CVE-2022-1388 on BIG IP F5", - "fork": false, - "created_at": "2022-07-01T18:08:50Z", - "updated_at": "2022-07-07T19:22:09Z", - "pushed_at": "2022-07-01T20:04:27Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 510239425, - "name": "CVE-2022-1388", - "full_name": "jbharucha05\/CVE-2022-1388", - "owner": { - "login": "jbharucha05", - "id": 13020621, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4", - "html_url": "https:\/\/github.com\/jbharucha05" - }, - "html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388", - "description": "CVE-2022-1388, bypassing iControl REST authentication", - "fork": false, - "created_at": "2022-07-04T06:31:56Z", - "updated_at": "2022-07-04T07:08:22Z", - "pushed_at": "2022-07-04T10:37:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2022-1388", - "f5-big-ip-icontrol-rest-rce", - "f5-bigip" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 557286411, "name": "CVE-2022-1388", diff --git a/2022/CVE-2022-20124.json b/2022/CVE-2022-20124.json deleted file mode 100644 index 3c375d25f2..0000000000 --- a/2022/CVE-2022-20124.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 510660359, - "name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-", - "full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-", - "owner": { - "login": "nidhi7598", - "id": 106973537, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", - "html_url": "https:\/\/github.com\/nidhi7598" - }, - "html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-", - "description": null, - "fork": false, - "created_at": "2022-07-05T08:59:44Z", - "updated_at": "2022-07-05T09:52:45Z", - "pushed_at": "2022-07-05T09:52:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20130.json b/2022/CVE-2022-20130.json deleted file mode 100644 index 64d3262c46..0000000000 --- a/2022/CVE-2022-20130.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 509461641, - "name": "external_aac_AOSP10_r33_CVE-2022-20130", - "full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130", - "owner": { - "login": "Satheesh575555", - "id": 102573923, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", - "html_url": "https:\/\/github.com\/Satheesh575555" - }, - "html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130", - "description": null, - "fork": false, - "created_at": "2022-07-01T13:16:14Z", - "updated_at": "2022-07-01T13:25:04Z", - "pushed_at": "2022-07-01T13:25:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20135.json b/2022/CVE-2022-20135.json deleted file mode 100644 index 8aa3d25bae..0000000000 --- a/2022/CVE-2022-20135.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 510684846, - "name": "frameworks_base_AOSP10_r33_CVE-2022-20135-", - "full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-", - "owner": { - "login": "nidhi7598", - "id": 106973537, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", - "html_url": "https:\/\/github.com\/nidhi7598" - }, - "html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-", - "description": null, - "fork": false, - "created_at": "2022-07-05T10:15:49Z", - "updated_at": "2022-07-05T10:42:21Z", - "pushed_at": "2022-07-05T10:41:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20142.json b/2022/CVE-2022-20142.json index 1f2f947b5f..656b61c3db 100644 --- a/2022/CVE-2022-20142.json +++ b/2022/CVE-2022-20142.json @@ -1,33 +1,4 @@ [ - { - "id": 510346412, - "name": "frameworks_base_AOSP10_r33_CVE-2022-20142", - "full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142", - "owner": { - "login": "Satheesh575555", - "id": 102573923, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", - "html_url": "https:\/\/github.com\/Satheesh575555" - }, - "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142", - "description": null, - "fork": false, - "created_at": "2022-07-04T12:16:05Z", - "updated_at": "2022-07-04T13:19:53Z", - "pushed_at": "2022-07-04T12:21:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 529215266, "name": "frameworks_base_AOSP10_r33_CVE-2022-20142", diff --git a/2022/CVE-2022-21449.json b/2022/CVE-2022-21449.json index 7133298ec5..a337743144 100644 --- a/2022/CVE-2022-21449.json +++ b/2022/CVE-2022-21449.json @@ -202,35 +202,6 @@ "watchers": 0, "score": 0 }, - { - "id": 510875629, - "name": "CVE-2022-21449-I2P-TLS-POC", - "full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC", - "owner": { - "login": "PyterSmithDarkGhost", - "id": 106814901, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4", - "html_url": "https:\/\/github.com\/PyterSmithDarkGhost" - }, - "html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC", - "description": null, - "fork": false, - "created_at": "2022-07-05T19:51:39Z", - "updated_at": "2022-09-01T23:29:48Z", - "pushed_at": "2022-07-05T19:52:05Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0 - }, { "id": 519281774, "name": "CVE-2022-21449-showcase", diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index cf4543f47e..c3d84d00d1 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -637,64 +637,6 @@ "watchers": 0, "score": 0 }, - { - "id": 524471767, - "name": "CVE-2022-22954", - "full_name": "amit-pathak009\/CVE-2022-22954", - "owner": { - "login": "amit-pathak009", - "id": 72250138, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", - "html_url": "https:\/\/github.com\/amit-pathak009" - }, - "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954", - "description": null, - "fork": false, - "created_at": "2022-08-13T18:00:04Z", - "updated_at": "2022-06-02T01:44:19Z", - "pushed_at": "2022-06-02T01:44:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 524471940, - "name": "CVE-2022-22954-PoC", - "full_name": "amit-pathak009\/CVE-2022-22954-PoC", - "owner": { - "login": "amit-pathak009", - "id": 72250138, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", - "html_url": "https:\/\/github.com\/amit-pathak009" - }, - "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC", - "description": null, - "fork": false, - "created_at": "2022-08-13T18:00:39Z", - "updated_at": "2022-06-01T22:41:09Z", - "pushed_at": "2022-06-01T22:41:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 545257457, "name": "VcenterKiller", diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index db11310721..399a835db9 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -18,7 +18,7 @@ "stargazers_count": 318, "watchers_count": 318, "has_discussions": false, - "forks_count": 103, + "forks_count": 104, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,7 +33,7 @@ "tomcat" ], "visibility": "public", - "forks": 103, + "forks": 104, "watchers": 318, "score": 0 }, @@ -1896,35 +1896,6 @@ "watchers": 71, "score": 0 }, - { - "id": 510562121, - "name": "CVE-2022-22965", - "full_name": "trhacknon\/CVE-2022-22965", - "owner": { - "login": "trhacknon", - "id": 98242014, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", - "html_url": "https:\/\/github.com\/trhacknon" - }, - "html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22965", - "description": null, - "fork": false, - "created_at": "2022-07-05T02:30:29Z", - "updated_at": "2022-09-27T23:19:26Z", - "pushed_at": "2022-07-05T02:32:04Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0 - }, { "id": 510569312, "name": "Spring4Shell-CVE-2022-22965", diff --git a/2022/CVE-2022-24342.json b/2022/CVE-2022-24342.json deleted file mode 100644 index c0114266b3..0000000000 --- a/2022/CVE-2022-24342.json +++ /dev/null @@ -1,39 +0,0 @@ -[ - { - "id": 509870464, - "name": "CVE-2022-24342", - "full_name": "yuriisanin\/CVE-2022-24342", - "owner": { - "login": "yuriisanin", - "id": 11749007, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4", - "html_url": "https:\/\/github.com\/yuriisanin" - }, - "html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-24342", - "description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication", - "fork": false, - "created_at": "2022-07-02T22:04:29Z", - "updated_at": "2023-02-12T21:01:11Z", - "pushed_at": "2022-07-05T17:31:35Z", - "stargazers_count": 34, - "watchers_count": 34, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "csrf", - "cve", - "cve-2022-24342", - "exploit", - "jetbrains", - "teamcity", - "vulnerability" - ], - "visibility": "public", - "forks": 6, - "watchers": 34, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24706.json b/2022/CVE-2022-24706.json index 70ddb064e3..005bcb96fc 100644 --- a/2022/CVE-2022-24706.json +++ b/2022/CVE-2022-24706.json @@ -57,35 +57,6 @@ "watchers": 0, "score": 0 }, - { - "id": 510182546, - "name": "CVE-2022-24706", - "full_name": "superzerosec\/CVE-2022-24706", - "owner": { - "login": "superzerosec", - "id": 57648217, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4", - "html_url": "https:\/\/github.com\/superzerosec" - }, - "html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-24706", - "description": "CVE-2022-24706 POC exploit", - "fork": false, - "created_at": "2022-07-04T02:06:27Z", - "updated_at": "2022-07-04T02:06:27Z", - "pushed_at": "2022-07-04T02:06:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 533101052, "name": "CVE-2022-24706-CouchDB-Exploit", diff --git a/2022/CVE-2022-24715.json b/2022/CVE-2022-24715.json index 04154ae6eb..55bdc83d5a 100644 --- a/2022/CVE-2022-24715.json +++ b/2022/CVE-2022-24715.json @@ -13,10 +13,10 @@ "description": " Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10", "fork": false, "created_at": "2023-03-20T04:31:32Z", - "updated_at": "2023-03-20T17:20:55Z", + "updated_at": "2023-03-20T19:53:26Z", "pushed_at": "2023-03-20T18:07:40Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-24716.json b/2022/CVE-2022-24716.json index 8ca4b40520..fd831fc3c1 100644 --- a/2022/CVE-2022-24716.json +++ b/2022/CVE-2022-24716.json @@ -13,10 +13,10 @@ "description": "Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10", "fork": false, "created_at": "2023-03-19T20:41:46Z", - "updated_at": "2023-03-20T17:03:44Z", + "updated_at": "2023-03-20T23:34:15Z", "pushed_at": "2023-03-20T05:02:21Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0 }, { @@ -42,10 +42,10 @@ "description": "CVE-2022-24716 | Arbitrary File Disclosure Icingaweb2", "fork": false, "created_at": "2023-03-20T02:25:55Z", - "updated_at": "2023-03-20T17:33:14Z", - "pushed_at": "2023-03-20T02:32:26Z", - "stargazers_count": 3, - "watchers_count": 3, + "updated_at": "2023-03-20T23:30:28Z", + "pushed_at": "2023-03-20T23:26:18Z", + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index b33270f541..20ea2a2a7c 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -1280,35 +1280,6 @@ "watchers": 0, "score": 0 }, - { - "id": 510402169, - "name": "TryHackMe-Atlassian-CVE-2022-26134", - "full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134", - "owner": { - "login": "r1skkam", - "id": 58542375, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4", - "html_url": "https:\/\/github.com\/r1skkam" - }, - "html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134", - "description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.", - "fork": false, - "created_at": "2022-07-04T15:00:21Z", - "updated_at": "2022-07-19T02:30:51Z", - "pushed_at": "2022-07-04T16:49:41Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 510586350, "name": "CVE-2022-26134", @@ -1343,44 +1314,6 @@ "watchers": 10, "score": 0 }, - { - "id": 510624422, - "name": "CVE-2022-26134", - "full_name": "Debajyoti0-0\/CVE-2022-26134", - "owner": { - "login": "Debajyoti0-0", - "id": 79437050, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4", - "html_url": "https:\/\/github.com\/Debajyoti0-0" - }, - "html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134", - "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).", - "fork": false, - "created_at": "2022-07-05T07:04:50Z", - "updated_at": "2022-07-10T08:52:10Z", - "pushed_at": "2022-07-05T09:40:39Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "atlassian-confluence", - "cve-2022-26134", - "infosec", - "ognl-injection-vulnerability", - "payload", - "python", - "rce", - "unauthenticated" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 510946912, "name": "cve-2022-26134", diff --git a/2022/CVE-2022-26763.json b/2022/CVE-2022-26763.json deleted file mode 100644 index 0e6526a6f4..0000000000 --- a/2022/CVE-2022-26763.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 509675215, - "name": "PCICrash", - "full_name": "zhuowei\/PCICrash", - "owner": { - "login": "zhuowei", - "id": 704768, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4", - "html_url": "https:\/\/github.com\/zhuowei" - }, - "html_url": "https:\/\/github.com\/zhuowei\/PCICrash", - "description": "PCIDriverKit proof-of-concept for CVE-2022-26763", - "fork": false, - "created_at": "2022-07-02T06:15:29Z", - "updated_at": "2022-09-15T17:20:03Z", - "pushed_at": "2022-07-02T06:15:40Z", - "stargazers_count": 36, - "watchers_count": 36, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 36, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26766.json b/2022/CVE-2022-26766.json deleted file mode 100644 index 3d549753a1..0000000000 --- a/2022/CVE-2022-26766.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 509675427, - "name": "CoreTrustDemo", - "full_name": "zhuowei\/CoreTrustDemo", - "owner": { - "login": "zhuowei", - "id": 704768, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4", - "html_url": "https:\/\/github.com\/zhuowei" - }, - "html_url": "https:\/\/github.com\/zhuowei\/CoreTrustDemo", - "description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1", - "fork": false, - "created_at": "2022-07-02T06:16:33Z", - "updated_at": "2023-02-26T02:08:22Z", - "pushed_at": "2022-07-02T17:14:41Z", - "stargazers_count": 74, - "watchers_count": 74, - "has_discussions": false, - "forks_count": 12, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 12, - "watchers": 74, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26923.json b/2022/CVE-2022-26923.json index 905981bbb5..11a752d14f 100644 --- a/2022/CVE-2022-26923.json +++ b/2022/CVE-2022-26923.json @@ -42,10 +42,10 @@ "description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.", "fork": false, "created_at": "2022-05-14T09:27:06Z", - "updated_at": "2023-03-19T05:40:30Z", + "updated_at": "2023-03-20T18:33:42Z", "pushed_at": "2022-05-14T20:56:39Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 29, + "watchers": 30, "score": 0 }, { diff --git a/2022/CVE-2022-28219.json b/2022/CVE-2022-28219.json index a408c68aa8..f07cb82b26 100644 --- a/2022/CVE-2022-28219.json +++ b/2022/CVE-2022-28219.json @@ -28,35 +28,6 @@ "watchers": 38, "score": 0 }, - { - "id": 509605278, - "name": "manageengine-auditad-cve-2022-28219", - "full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219", - "owner": { - "login": "rbowes-r7", - "id": 104588115, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4", - "html_url": "https:\/\/github.com\/rbowes-r7" - }, - "html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219", - "description": null, - "fork": false, - "created_at": "2022-07-01T22:40:46Z", - "updated_at": "2022-07-19T13:50:08Z", - "pushed_at": "2022-07-05T22:13:12Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0 - }, { "id": 518384320, "name": "CVE-2022-28219-Like", diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 0b47aef01e..e9e8137b49 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -554,64 +554,6 @@ "watchers": 4, "score": 0 }, - { - "id": 524474931, - "name": "CVE-2022-29464", - "full_name": "amit-pathak009\/CVE-2022-29464", - "owner": { - "login": "amit-pathak009", - "id": 72250138, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", - "html_url": "https:\/\/github.com\/amit-pathak009" - }, - "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464", - "description": null, - "fork": false, - "created_at": "2022-08-13T18:14:43Z", - "updated_at": "2022-05-19T21:24:13Z", - "pushed_at": "2022-05-19T21:24:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - }, - { - "id": 524475053, - "name": "CVE-2022-29464-mass", - "full_name": "amit-pathak009\/CVE-2022-29464-mass", - "owner": { - "login": "amit-pathak009", - "id": 72250138, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", - "html_url": "https:\/\/github.com\/amit-pathak009" - }, - "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass", - "description": null, - "fork": false, - "created_at": "2022-08-13T18:15:18Z", - "updated_at": "2023-01-11T06:21:01Z", - "pushed_at": "2022-05-29T19:16:06Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0 - }, { "id": 540011346, "name": "CVE-2022-29464", diff --git a/2022/CVE-2022-29885.json b/2022/CVE-2022-29885.json index ecc43149a6..049f063d7e 100644 --- a/2022/CVE-2022-29885.json +++ b/2022/CVE-2022-29885.json @@ -27,34 +27,5 @@ "forks": 4, "watchers": 4, "score": 0 - }, - { - "id": 509388193, - "name": "CVE-2022-29885", - "full_name": "iveresk\/CVE-2022-29885", - "owner": { - "login": "iveresk", - "id": 28754633, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", - "html_url": "https:\/\/github.com\/iveresk" - }, - "html_url": "https:\/\/github.com\/iveresk\/CVE-2022-29885", - "description": "Apache Tomcat DoS (CVE-2022-29885) Exploit", - "fork": false, - "created_at": "2022-07-01T09:02:10Z", - "updated_at": "2023-01-24T17:20:21Z", - "pushed_at": "2022-07-05T06:23:18Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-30333.json b/2022/CVE-2022-30333.json index b7efd96188..5477b9db81 100644 --- a/2022/CVE-2022-30333.json +++ b/2022/CVE-2022-30333.json @@ -1,33 +1,4 @@ [ - { - "id": 510563141, - "name": "CVE-2022-30333-PoC", - "full_name": "TheL1ghtVn\/CVE-2022-30333-PoC", - "owner": { - "login": "TheL1ghtVn", - "id": 89027345, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027345?v=4", - "html_url": "https:\/\/github.com\/TheL1ghtVn" - }, - "html_url": "https:\/\/github.com\/TheL1ghtVn\/CVE-2022-30333-PoC", - "description": null, - "fork": false, - "created_at": "2022-07-05T02:35:12Z", - "updated_at": "2022-11-19T19:17:38Z", - "pushed_at": "2022-07-05T02:58:30Z", - "stargazers_count": 14, - "watchers_count": 14, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 14, - "score": 0 - }, { "id": 514420724, "name": "unrar-cve-2022-30333-poc", diff --git a/2022/CVE-2022-30594.json b/2022/CVE-2022-30594.json deleted file mode 100644 index dc45e8bbdf..0000000000 --- a/2022/CVE-2022-30594.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 510304709, - "name": "linux-4.19.72_CVE-2022-30594", - "full_name": "nidhi7598\/linux-4.19.72_CVE-2022-30594", - "owner": { - "login": "nidhi7598", - "id": 106973537, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", - "html_url": "https:\/\/github.com\/nidhi7598" - }, - "html_url": "https:\/\/github.com\/nidhi7598\/linux-4.19.72_CVE-2022-30594", - "description": null, - "fork": false, - "created_at": "2022-07-04T10:01:05Z", - "updated_at": "2023-03-08T01:26:26Z", - "pushed_at": "2022-07-04T10:18:57Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30929.json b/2022/CVE-2022-30929.json deleted file mode 100644 index a39df0b2e4..0000000000 --- a/2022/CVE-2022-30929.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 511398695, - "name": "CVE-2022-30929", - "full_name": "nanaao\/CVE-2022-30929", - "owner": { - "login": "nanaao", - "id": 77666853, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4", - "html_url": "https:\/\/github.com\/nanaao" - }, - "html_url": "https:\/\/github.com\/nanaao\/CVE-2022-30929", - "description": "CVE-2022-30929 POC", - "fork": false, - "created_at": "2022-07-07T05:44:56Z", - "updated_at": "2023-01-31T12:52:11Z", - "pushed_at": "2022-07-04T06:19:57Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41082.json b/2022/CVE-2022-41082.json index 7208e6cde2..4f0f62f91e 100644 --- a/2022/CVE-2022-41082.json +++ b/2022/CVE-2022-41082.json @@ -129,10 +129,10 @@ "description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers", "fork": false, "created_at": "2022-12-22T09:35:26Z", - "updated_at": "2023-03-19T18:12:30Z", + "updated_at": "2023-03-20T22:43:45Z", "pushed_at": "2023-01-10T08:09:36Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -149,7 +149,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 61, + "watchers": 62, "score": 0 }, { diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json index 1d415a0933..5b0e42def8 100644 --- a/2022/CVE-2022-46169.json +++ b/2022/CVE-2022-46169.json @@ -271,5 +271,34 @@ "forks": 1, "watchers": 1, "score": 0 + }, + { + "id": 616701865, + "name": "CVE-2022-46169", + "full_name": "doosec101\/CVE-2022-46169", + "owner": { + "login": "doosec101", + "id": 128431701, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4", + "html_url": "https:\/\/github.com\/doosec101" + }, + "html_url": "https:\/\/github.com\/doosec101\/CVE-2022-46169", + "description": "Repo for CVE-2022-46169", + "fork": false, + "created_at": "2023-03-20T22:54:18Z", + "updated_at": "2023-03-20T23:57:27Z", + "pushed_at": "2023-03-20T23:31:38Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-0179.json b/2023/CVE-2023-0179.json index 8098ee7510..d742aa931b 100644 --- a/2023/CVE-2023-0179.json +++ b/2023/CVE-2023-0179.json @@ -42,10 +42,10 @@ "description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。", "fork": false, "created_at": "2023-03-16T02:20:52Z", - "updated_at": "2023-03-20T15:46:03Z", + "updated_at": "2023-03-20T20:14:54Z", "pushed_at": "2023-03-16T02:22:28Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 26, + "watchers": 27, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-0669.json b/2023/CVE-2023-0669.json index 12023a53d5..02f5c69ec2 100644 --- a/2023/CVE-2023-0669.json +++ b/2023/CVE-2023-0669.json @@ -13,10 +13,10 @@ "description": "CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.", "fork": false, "created_at": "2023-02-10T13:02:55Z", - "updated_at": "2023-03-19T04:28:18Z", + "updated_at": "2023-03-20T20:08:49Z", "pushed_at": "2023-02-13T07:15:28Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 78, + "watchers_count": 78, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 77, + "watchers": 78, "score": 0 }, { diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index e280ea7496..69c7bfe6a7 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,19 +13,19 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2023-03-20T11:20:57Z", + "updated_at": "2023-03-20T22:51:34Z", "pushed_at": "2023-03-10T08:58:44Z", - "stargazers_count": 313, - "watchers_count": 313, + "stargazers_count": 315, + "watchers_count": 315, "has_discussions": false, - "forks_count": 116, + "forks_count": 117, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 116, - "watchers": 313, + "forks": 117, + "watchers": 315, "score": 0 }, { diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index 681a8dfe1e..b89993580f 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -13,19 +13,19 @@ "description": "Exploit for the CVE-2023-23397", "fork": false, "created_at": "2023-03-15T17:03:38Z", - "updated_at": "2023-03-20T14:12:09Z", + "updated_at": "2023-03-21T00:18:35Z", "pushed_at": "2023-03-15T17:53:53Z", - "stargazers_count": 122, - "watchers_count": 122, + "stargazers_count": 123, + "watchers_count": 123, "has_discussions": false, - "forks_count": 34, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 34, - "watchers": 122, + "forks": 35, + "watchers": 123, "score": 0 }, { @@ -168,19 +168,19 @@ "description": null, "fork": false, "created_at": "2023-03-16T19:43:39Z", - "updated_at": "2023-03-20T15:55:28Z", + "updated_at": "2023-03-21T00:18:00Z", "pushed_at": "2023-03-17T07:47:40Z", - "stargazers_count": 209, - "watchers_count": 209, + "stargazers_count": 212, + "watchers_count": 212, "has_discussions": false, - "forks_count": 31, + "forks_count": 32, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 31, - "watchers": 209, + "forks": 32, + "watchers": 212, "score": 0 }, { @@ -371,10 +371,10 @@ "description": "Simple CVE-2023-23397 poc with sending of the payload by email.", "fork": false, "created_at": "2023-03-20T16:31:54Z", - "updated_at": "2023-03-20T16:47:16Z", + "updated_at": "2023-03-21T00:22:14Z", "pushed_at": "2023-03-20T16:55:25Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -383,7 +383,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2023/CVE-2023-27326.json b/2023/CVE-2023-27326.json index 2b62220f5f..57eb702141 100644 --- a/2023/CVE-2023-27326.json +++ b/2023/CVE-2023-27326.json @@ -13,19 +13,19 @@ "description": "VM Escape for Parallels Desktop <18.1.1", "fork": false, "created_at": "2023-03-20T11:47:54Z", - "updated_at": "2023-03-20T18:21:05Z", + "updated_at": "2023-03-20T23:40:35Z", "pushed_at": "2023-03-20T12:51:29Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 3, + "forks": 1, + "watchers": 11, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-27587.json b/2023/CVE-2023-27587.json index 5560b87f5e..5df23ee4f1 100644 --- a/2023/CVE-2023-27587.json +++ b/2023/CVE-2023-27587.json @@ -13,10 +13,10 @@ "description": "The simple PoC of CVE-2023-27587", "fork": false, "created_at": "2023-03-15T15:52:20Z", - "updated_at": "2023-03-17T17:06:31Z", + "updated_at": "2023-03-20T22:48:05Z", "pushed_at": "2023-03-15T16:31:11Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 543c6d4e70..c19fdfc1fd 100644 --- a/README.md +++ b/README.md @@ -697,8 +697,6 @@ A flaw was found in the way the "flags" member of the new pipe buffer - [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher) - [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape) - [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits) -- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection) -- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe) - [eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits) - [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847) - [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape) @@ -949,8 +947,6 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5. - [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC) - [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388) - [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388) -- [Luchoane/CVE-2022-1388_refresh](https://github.com/Luchoane/CVE-2022-1388_refresh) -- [jbharucha05/CVE-2022-1388](https://github.com/jbharucha05/CVE-2022-1388) - [On-Cyber-War/CVE-2022-1388](https://github.com/On-Cyber-War/CVE-2022-1388) - [OnCyberWar/CVE-2022-1388](https://github.com/OnCyberWar/CVE-2022-1388) - [revanmalang/CVE-2022-1388](https://github.com/revanmalang/CVE-2022-1388) @@ -1341,14 +1337,6 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther - [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007) - [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007) -### CVE-2022-20124 (2022-06-15) - - -In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036 - - -- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-) - ### CVE-2022-20126 (2022-06-15) @@ -1360,14 +1348,6 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo ### CVE-2022-20128 - [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128) -### CVE-2022-20130 (2022-06-15) - - -In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979 - - -- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130) - ### CVE-2022-20133 (2022-06-15) @@ -1376,14 +1356,6 @@ In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of - [nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133](https://github.com/nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133) -### CVE-2022-20135 (2022-06-15) - - -In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465 - - -- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-) - ### CVE-2022-20138 (2022-06-15) @@ -1400,7 +1372,6 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962 -- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142) - [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142) ### CVE-2022-20186 (2022-06-15) @@ -1591,7 +1562,6 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o - [thack1/CVE-2022-21449](https://github.com/thack1/CVE-2022-21449) - [Damok82/SignChecker](https://github.com/Damok82/SignChecker) - [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449) -- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC) - [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase) - [davwwwx/CVE-2022-21449](https://github.com/davwwwx/CVE-2022-21449) @@ -2042,8 +2012,6 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution - [badboy-sft/CVE-2022-22954](https://github.com/badboy-sft/CVE-2022-22954) - [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954) - [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954) -- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954) -- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC) - [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller) - [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_) - [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954) @@ -2144,7 +2112,6 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t - [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965) - [cxzero/CVE-2022-22965-spring4shell](https://github.com/cxzero/CVE-2022-22965-spring4shell) - [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan) -- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965) - [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965) - [iloveflag/Fast-CVE-2022-22965](https://github.com/iloveflag/Fast-CVE-2022-22965) - [ClemExp/CVE-2022-22965-PoC](https://github.com/ClemExp/CVE-2022-22965-PoC) @@ -2530,14 +2497,6 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System - [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181) -### CVE-2022-24342 (2022-02-25) - - -In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible. - - -- [yuriisanin/CVE-2022-24342](https://github.com/yuriisanin/CVE-2022-24342) - ### CVE-2022-24348 (2022-02-04) @@ -2656,7 +2615,6 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d - [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit) - [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-) -- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706) - [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit) ### CVE-2022-24707 (2022-02-23) @@ -3062,9 +3020,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134) - [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134) - [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU) -- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134) - [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134) -- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134) - [f4yd4-s3c/cve-2022-26134](https://github.com/f4yd4-s3c/cve-2022-26134) - [coskper-papa/CVE-2022-26134](https://github.com/coskper-papa/CVE-2022-26134) - [p4b3l1t0/confusploit](https://github.com/p4b3l1t0/confusploit) @@ -3190,22 +3146,6 @@ A use after free issue was addressed with improved memory management. This issue - [Dylbin/flow_divert](https://github.com/Dylbin/flow_divert) -### CVE-2022-26763 (2022-05-26) - - -An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges. - - -- [zhuowei/PCICrash](https://github.com/zhuowei/PCICrash) - -### CVE-2022-26766 (2022-05-26) - - -A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation. - - -- [zhuowei/CoreTrustDemo](https://github.com/zhuowei/CoreTrustDemo) - ### CVE-2022-26809 (2022-04-15) @@ -3454,7 +3394,6 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe - [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219) -- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219) - [aeifkz/CVE-2022-28219-Like](https://github.com/aeifkz/CVE-2022-28219-Like) ### CVE-2022-28281 (2022-12-22) @@ -3729,8 +3668,6 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code - [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464) - [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464) - [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464) -- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464) -- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass) - [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464) - [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464) - [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-) @@ -3837,7 +3774,6 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20 - [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885) -- [iveresk/CVE-2022-29885](https://github.com/iveresk/CVE-2022-29885) ### CVE-2022-29932 (2022-05-11) @@ -4017,7 +3953,6 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected. -- [TheL1ghtVn/CVE-2022-30333-PoC](https://github.com/TheL1ghtVn/CVE-2022-30333-PoC) - [rbowes-r7/unrar-cve-2022-30333-poc](https://github.com/rbowes-r7/unrar-cve-2022-30333-poc) - [J0hnbX/CVE-2022-30333](https://github.com/J0hnbX/CVE-2022-30333) - [aslitsecurity/Zimbra-CVE-2022-30333](https://github.com/aslitsecurity/Zimbra-CVE-2022-30333) @@ -4128,14 +4063,6 @@ liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandl - [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks) -### CVE-2022-30594 (2022-05-12) - - -The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. - - -- [nidhi7598/linux-4.19.72_CVE-2022-30594](https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594) - ### CVE-2022-30600 (2022-05-18) @@ -4163,22 +4090,6 @@ Gitea before 1.16.7 does not escape git fetch remote. - [wuhan005/CVE-2022-30781](https://github.com/wuhan005/CVE-2022-30781) -### CVE-2022-30887 (2022-05-20) - - -Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file. - - -- [MuallimNaci/CVE-2022-30887](https://github.com/MuallimNaci/CVE-2022-30887) - -### CVE-2022-30929 (2022-07-06) - - -Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper. - - -- [nanaao/CVE-2022-30929](https://github.com/nanaao/CVE-2022-30929) - ### CVE-2022-31007 (2022-05-31) @@ -6293,6 +6204,7 @@ Cacti is an open source platform which provides a robust and extensible operatio - [N1arut/CVE-2022-46169_POC](https://github.com/N1arut/CVE-2022-46169_POC) - [miko550/CVE-2022-46169](https://github.com/miko550/CVE-2022-46169) - [ariyaadinatha/cacti-cve-2022-46169-exploit](https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit) +- [doosec101/CVE-2022-46169](https://github.com/doosec101/CVE-2022-46169) ### CVE-2022-46175 (2022-12-23) @@ -7598,6 +7510,14 @@ Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain H - [szymonh/zephyr_cve-2021-3625](https://github.com/szymonh/zephyr_cve-2021-3625) +### CVE-2021-3656 (2022-03-04) + + +A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. + + +- [rami08448/CVE-2021-3656-Demo](https://github.com/rami08448/CVE-2021-3656-Demo) + ### CVE-2021-3707 (2021-08-16) @@ -7697,7 +7617,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility. - [vilasboasph/CVE-2021-4034](https://github.com/vilasboasph/CVE-2021-4034) - [nobelh/CVE-2021-4034](https://github.com/nobelh/CVE-2021-4034) - [callrbx/pkexec-lpe-poc](https://github.com/callrbx/pkexec-lpe-poc) -- [T3cnokarita/CVE-2021-4034](https://github.com/T3cnokarita/CVE-2021-4034) +- [ch4rum/CVE-2021-4034](https://github.com/ch4rum/CVE-2021-4034) - [cd80-ctf/CVE-2021-4034](https://github.com/cd80-ctf/CVE-2021-4034) - [Al1ex/CVE-2021-4034](https://github.com/Al1ex/CVE-2021-4034) - [puckiestyle/CVE-2021-4034](https://github.com/puckiestyle/CVE-2021-4034) @@ -11451,7 +11371,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2) - [vinhjaxt/CVE-2021-41773-exploit](https://github.com/vinhjaxt/CVE-2021-41773-exploit) - [sixpacksecurity/CVE-2021-41773](https://github.com/sixpacksecurity/CVE-2021-41773) -- [Hattan-515/POC-CVE-2021-41773](https://github.com/Hattan-515/POC-CVE-2021-41773) +- [Hattan515/POC-CVE-2021-41773](https://github.com/Hattan515/POC-CVE-2021-41773) - [twseptian/cve-2021-41773](https://github.com/twseptian/cve-2021-41773) - [noflowpls/CVE-2021-41773](https://github.com/noflowpls/CVE-2021-41773) - [McSl0vv/CVE-2021-41773](https://github.com/McSl0vv/CVE-2021-41773)