diff --git a/2009/CVE-2009-4137.json b/2009/CVE-2009-4137.json
new file mode 100644
index 0000000000..99c156e071
--- /dev/null
+++ b/2009/CVE-2009-4137.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 112379736,
+ "name": "CVE-2009-4137",
+ "full_name": "Alexeyan\/CVE-2009-4137",
+ "owner": {
+ "login": "Alexeyan",
+ "id": 6674109,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6674109?v=4",
+ "html_url": "https:\/\/github.com\/Alexeyan"
+ },
+ "html_url": "https:\/\/github.com\/Alexeyan\/CVE-2009-4137",
+ "description": "Exploit for piwik CVE-2009-4140 RCE",
+ "fork": false,
+ "created_at": "2017-11-28T19:31:47Z",
+ "updated_at": "2019-12-19T19:46:29Z",
+ "pushed_at": "2018-01-15T10:40:23Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 6,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 6,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2009/CVE-2009-5147.json b/2009/CVE-2009-5147.json
index 7c8cc8e124..62a3b8ae71 100644
--- a/2009/CVE-2009-5147.json
+++ b/2009/CVE-2009-5147.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 84927797,
+ "name": "CVE-2009-5147",
+ "full_name": "vpereira\/CVE-2009-5147",
+ "owner": {
+ "login": "vpereira",
+ "id": 37418,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37418?v=4",
+ "html_url": "https:\/\/github.com\/vpereira"
+ },
+ "html_url": "https:\/\/github.com\/vpereira\/CVE-2009-5147",
+ "description": "poc for CVE-2009-5147",
+ "fork": false,
+ "created_at": "2017-03-14T09:04:14Z",
+ "updated_at": "2017-03-14T09:06:07Z",
+ "pushed_at": "2017-03-14T09:16:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 3
+ },
{
"id": 183373457,
"name": "-Ruby-dl-handle.c-CVE-2009-5147-",
diff --git a/2016/CVE-2016-2118.json b/2016/CVE-2016-2118.json
new file mode 100644
index 0000000000..51822187ee
--- /dev/null
+++ b/2016/CVE-2016-2118.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 56461631,
+ "name": "cfengine-CVE-2016-2118",
+ "full_name": "nickanderson\/cfengine-CVE-2016-2118",
+ "owner": {
+ "login": "nickanderson",
+ "id": 202896,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
+ "html_url": "https:\/\/github.com\/nickanderson"
+ },
+ "html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
+ "description": "An example detection and remediation policy.",
+ "fork": false,
+ "created_at": "2016-04-17T22:22:04Z",
+ "updated_at": "2016-04-18T02:57:44Z",
+ "pushed_at": "2016-04-19T14:24:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2016/CVE-2016-3141.json b/2016/CVE-2016-3141.json
new file mode 100644
index 0000000000..c8f293c780
--- /dev/null
+++ b/2016/CVE-2016-3141.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 56758577,
+ "name": "CVE-2016-3141",
+ "full_name": "peternguyen93\/CVE-2016-3141",
+ "owner": {
+ "login": "peternguyen93",
+ "id": 1802870,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
+ "html_url": "https:\/\/github.com\/peternguyen93"
+ },
+ "html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
+ "description": "CVE-2016-3141",
+ "fork": false,
+ "created_at": "2016-04-21T08:59:05Z",
+ "updated_at": "2023-03-11T18:41:15Z",
+ "pushed_at": "2016-04-23T15:55:01Z",
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 15,
+ "score": 0,
+ "subscribers_count": 3
+ }
+]
\ No newline at end of file
diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json
index 36dc31e556..6874395331 100644
--- a/2018/CVE-2018-9995.json
+++ b/2018/CVE-2018-9995.json
@@ -13,10 +13,10 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
- "updated_at": "2024-01-10T14:12:02Z",
+ "updated_at": "2024-01-13T22:06:04Z",
"pushed_at": "2019-01-23T14:27:21Z",
- "stargazers_count": 512,
- "watchers_count": 512,
+ "stargazers_count": 513,
+ "watchers_count": 513,
"has_discussions": false,
"forks_count": 204,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 204,
- "watchers": 512,
+ "watchers": 513,
"score": 0,
"subscribers_count": 34
},
diff --git a/2019/CVE-2019-0604.json b/2019/CVE-2019-0604.json
index 311e23b674..4f98b66921 100644
--- a/2019/CVE-2019-0604.json
+++ b/2019/CVE-2019-0604.json
@@ -171,10 +171,10 @@
"description": "Automated tool to exploit sharepoint CVE-2019-0604",
"fork": false,
"created_at": "2021-04-22T12:11:22Z",
- "updated_at": "2022-10-10T00:04:00Z",
+ "updated_at": "2024-01-13T21:23:36Z",
"pushed_at": "2021-02-12T14:04:25Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -183,7 +183,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 0
},
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index ee34954a9e..67679d87b8 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -2494,5 +2494,35 @@
"watchers": 6,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 742980382,
+ "name": "https-github.com-jamf-CVE-2020-0796-RCE-POC",
+ "full_name": "Vladshambaryan\/https-github.com-jamf-CVE-2020-0796-RCE-POC",
+ "owner": {
+ "login": "Vladshambaryan",
+ "id": 132017930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132017930?v=4",
+ "html_url": "https:\/\/github.com\/Vladshambaryan"
+ },
+ "html_url": "https:\/\/github.com\/Vladshambaryan\/https-github.com-jamf-CVE-2020-0796-RCE-POC",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-13T23:54:45Z",
+ "updated_at": "2024-01-13T23:54:45Z",
+ "pushed_at": "2024-01-13T23:54:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-11932.json b/2020/CVE-2020-11932.json
index 24f5a14ecd..1b91c87966 100644
--- a/2020/CVE-2020-11932.json
+++ b/2020/CVE-2020-11932.json
@@ -60,7 +60,7 @@
"forks": 2,
"watchers": 2,
"score": 0,
- "subscribers_count": 2
+ "subscribers_count": 3
},
{
"id": 352007665,
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index a1eee6f7e0..270afd16f5 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
- "updated_at": "2024-01-12T18:04:07Z",
+ "updated_at": "2024-01-13T19:20:57Z",
"pushed_at": "2021-07-20T15:28:13Z",
- "stargazers_count": 1767,
- "watchers_count": 1767,
+ "stargazers_count": 1768,
+ "watchers_count": 1768,
"has_discussions": false,
"forks_count": 584,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 584,
- "watchers": 1767,
+ "watchers": 1768,
"score": 0,
"subscribers_count": 44
},
@@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
- "updated_at": "2024-01-03T16:27:29Z",
+ "updated_at": "2024-01-13T19:21:00Z",
"pushed_at": "2021-07-05T08:54:06Z",
- "stargazers_count": 951,
- "watchers_count": 951,
+ "stargazers_count": 952,
+ "watchers_count": 952,
"has_discussions": false,
"forks_count": 229,
"allow_forking": true,
@@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 229,
- "watchers": 951,
+ "watchers": 952,
"score": 0,
"subscribers_count": 26
},
diff --git a/2021/CVE-2021-25253.json b/2021/CVE-2021-25253.json
index bd5651037e..c3ffdbce6c 100644
--- a/2021/CVE-2021-25253.json
+++ b/2021/CVE-2021-25253.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index 3471c74b71..be1919c61b 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -899,10 +899,10 @@
"description": "CVE-2021-40444",
"fork": false,
"created_at": "2021-12-19T08:16:07Z",
- "updated_at": "2023-09-28T11:34:15Z",
+ "updated_at": "2024-01-13T18:39:54Z",
"pushed_at": "2021-12-19T08:27:33Z",
- "stargazers_count": 64,
- "watchers_count": 64,
+ "stargazers_count": 65,
+ "watchers_count": 65,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@@ -911,7 +911,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
- "watchers": 64,
+ "watchers": 65,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 349ded1490..f27e62d858 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -2451,7 +2451,7 @@
"forks": 31,
"watchers": 81,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 2
},
{
"id": 469576020,
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 82829feca2..2e1b22058b 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -7053,7 +7053,7 @@
"forks": 0,
"watchers": 4,
"score": 0,
- "subscribers_count": 2
+ "subscribers_count": 3
},
{
"id": 438791130,
@@ -10269,7 +10269,7 @@
"fork": false,
"created_at": "2022-01-03T04:36:41Z",
"updated_at": "2022-01-09T19:59:25Z",
- "pushed_at": "2023-12-01T14:59:22Z",
+ "pushed_at": "2024-01-13T19:12:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2022/CVE-2022-0219.json b/2022/CVE-2022-0219.json
new file mode 100644
index 0000000000..1e64d49a02
--- /dev/null
+++ b/2022/CVE-2022-0219.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 450128440,
+ "name": "CVE-2022-0219",
+ "full_name": "Haxatron\/CVE-2022-0219",
+ "owner": {
+ "login": "Haxatron",
+ "id": 76475453,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4",
+ "html_url": "https:\/\/github.com\/Haxatron"
+ },
+ "html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-01-20T14:24:45Z",
+ "updated_at": "2022-01-20T14:24:45Z",
+ "pushed_at": "2022-01-20T14:35:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-0236.json b/2022/CVE-2022-0236.json
new file mode 100644
index 0000000000..1815a5c0dc
--- /dev/null
+++ b/2022/CVE-2022-0236.json
@@ -0,0 +1,64 @@
+[
+ {
+ "id": 448514056,
+ "name": "CVE-2022-0236",
+ "full_name": "qurbat\/CVE-2022-0236",
+ "owner": {
+ "login": "qurbat",
+ "id": 37518297,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
+ "html_url": "https:\/\/github.com\/qurbat"
+ },
+ "html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
+ "description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
+ "fork": false,
+ "created_at": "2022-01-16T09:52:28Z",
+ "updated_at": "2023-01-28T03:56:57Z",
+ "pushed_at": "2022-01-18T17:14:53Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "wordpress-security"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 3,
+ "score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 448893968,
+ "name": "CVE-2022-0236",
+ "full_name": "xiska62314\/CVE-2022-0236",
+ "owner": {
+ "login": "xiska62314",
+ "id": 97891523,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
+ "html_url": "https:\/\/github.com\/xiska62314"
+ },
+ "html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
+ "description": "CVE-2022-0236",
+ "fork": false,
+ "created_at": "2022-01-17T12:56:19Z",
+ "updated_at": "2022-01-17T12:56:19Z",
+ "pushed_at": "2022-01-17T12:56:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-21658.json b/2022/CVE-2022-21658.json
new file mode 100644
index 0000000000..41ecb52efd
--- /dev/null
+++ b/2022/CVE-2022-21658.json
@@ -0,0 +1,36 @@
+[
+ {
+ "id": 450374545,
+ "name": "cve-2022-21658",
+ "full_name": "sagittarius-a\/cve-2022-21658",
+ "owner": {
+ "login": "sagittarius-a",
+ "id": 8809698,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8809698?v=4",
+ "html_url": "https:\/\/github.com\/sagittarius-a"
+ },
+ "html_url": "https:\/\/github.com\/sagittarius-a\/cve-2022-21658",
+ "description": "POC for cve-2022-21658",
+ "fork": false,
+ "created_at": "2022-01-21T06:09:16Z",
+ "updated_at": "2023-10-03T02:34:46Z",
+ "pushed_at": "2022-01-21T06:09:29Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2022-21658",
+ "poc",
+ "rust"
+ ],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-21660.json b/2022/CVE-2022-21660.json
index 69d302d40d..653ef529ba 100644
--- a/2022/CVE-2022-21660.json
+++ b/2022/CVE-2022-21660.json
@@ -1,4 +1,34 @@
[
+ {
+ "id": 446296593,
+ "name": "Gin-Vue-admin-poc-CVE-2022-21660",
+ "full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
+ "owner": {
+ "login": "UzJu",
+ "id": 50813806,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4",
+ "html_url": "https:\/\/github.com\/UzJu"
+ },
+ "html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
+ "description": "CVE-2022-21660",
+ "fork": false,
+ "created_at": "2022-01-10T05:50:35Z",
+ "updated_at": "2023-08-04T05:22:54Z",
+ "pushed_at": "2022-01-10T05:52:03Z",
+ "stargazers_count": 25,
+ "watchers_count": 25,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 25,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 462232980,
"name": "CVE-2022-21660",
diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json
index bcc1766ae9..897c583c52 100644
--- a/2022/CVE-2022-21907.json
+++ b/2022/CVE-2022-21907.json
@@ -79,6 +79,66 @@
"score": 0,
"subscribers_count": 3
},
+ {
+ "id": 448729790,
+ "name": "CVE-2022-21907",
+ "full_name": "ZZ-SOCMAP\/CVE-2022-21907",
+ "owner": {
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
+ },
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
+ "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
+ "fork": false,
+ "created_at": "2022-01-17T02:28:50Z",
+ "updated_at": "2024-01-12T14:50:41Z",
+ "pushed_at": "2022-01-20T02:07:59Z",
+ "stargazers_count": 361,
+ "watchers_count": 361,
+ "has_discussions": false,
+ "forks_count": 98,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 98,
+ "watchers": 361,
+ "score": 0,
+ "subscribers_count": 10
+ },
+ {
+ "id": 448909871,
+ "name": "CVE-2022-21907",
+ "full_name": "xiska62314\/CVE-2022-21907",
+ "owner": {
+ "login": "xiska62314",
+ "id": 97891523,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
+ "html_url": "https:\/\/github.com\/xiska62314"
+ },
+ "html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
+ "description": "CVE-2022-21907",
+ "fork": false,
+ "created_at": "2022-01-17T13:42:44Z",
+ "updated_at": "2022-01-17T13:42:44Z",
+ "pushed_at": "2022-01-17T13:42:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",
@@ -116,6 +176,36 @@
"score": 0,
"subscribers_count": 6
},
+ {
+ "id": 451128086,
+ "name": "CVE-2022-21907-Vulnerability-PoC",
+ "full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
+ "owner": {
+ "login": "michelep",
+ "id": 1425559,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
+ "html_url": "https:\/\/github.com\/michelep"
+ },
+ "html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
+ "description": "CVE-2022-21907 Vulnerability PoC",
+ "fork": false,
+ "created_at": "2022-01-23T14:25:12Z",
+ "updated_at": "2023-12-27T10:23:02Z",
+ "pushed_at": "2022-01-23T14:28:54Z",
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "has_discussions": false,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 22,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 477659433,
"name": "CVE-2022-21907",
diff --git a/2022/CVE-2022-22296.json b/2022/CVE-2022-22296.json
new file mode 100644
index 0000000000..b67748456d
--- /dev/null
+++ b/2022/CVE-2022-22296.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 450430110,
+ "name": "CVE-2022-22296",
+ "full_name": "vlakhani28\/CVE-2022-22296",
+ "owner": {
+ "login": "vlakhani28",
+ "id": 42069316,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42069316?v=4",
+ "html_url": "https:\/\/github.com\/vlakhani28"
+ },
+ "html_url": "https:\/\/github.com\/vlakhani28\/CVE-2022-22296",
+ "description": "All Details about CVE-2022-22296",
+ "fork": false,
+ "created_at": "2022-01-21T09:29:21Z",
+ "updated_at": "2023-09-28T11:35:14Z",
+ "pushed_at": "2022-01-21T09:45:29Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-23305.json b/2022/CVE-2022-23305.json
index 92ed1c4ce1..e0462d8868 100644
--- a/2022/CVE-2022-23305.json
+++ b/2022/CVE-2022-23305.json
@@ -48,6 +48,38 @@
"score": 0,
"subscribers_count": 5
},
+ {
+ "id": 450360735,
+ "name": "CVE-2022-RCE",
+ "full_name": "AlphabugX\/CVE-2022-RCE",
+ "owner": {
+ "login": "AlphabugX",
+ "id": 27001865,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27001865?v=4",
+ "html_url": "https:\/\/github.com\/AlphabugX"
+ },
+ "html_url": "https:\/\/github.com\/AlphabugX\/CVE-2022-RCE",
+ "description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
+ "fork": false,
+ "created_at": "2022-01-21T05:07:59Z",
+ "updated_at": "2022-11-05T22:58:02Z",
+ "pushed_at": "2022-01-21T05:21:25Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2020-"
+ ],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 5,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 670307374,
"name": "CVE-2022-23305_POC",
diff --git a/2022/CVE-2022-38181.json b/2022/CVE-2022-38181.json
index e915cec995..e2791e7001 100644
--- a/2022/CVE-2022-38181.json
+++ b/2022/CVE-2022-38181.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-38181 POC for FireTV 2nd gen Cube (raven)",
"fork": false,
"created_at": "2023-04-13T13:19:04Z",
- "updated_at": "2023-07-14T06:01:23Z",
+ "updated_at": "2024-01-13T18:37:05Z",
"pushed_at": "2023-06-15T17:08:34Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json
index ee931b6e93..8742edefad 100644
--- a/2022/CVE-2022-38694.json
+++ b/2022/CVE-2022-38694.json
@@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
- "updated_at": "2024-01-12T01:49:22Z",
+ "updated_at": "2024-01-13T23:47:46Z",
"pushed_at": "2024-01-01T13:58:49Z",
- "stargazers_count": 144,
- "watchers_count": 144,
+ "stargazers_count": 145,
+ "watchers_count": 145,
"has_discussions": true,
"forks_count": 20,
"allow_forking": true,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 20,
- "watchers": 144,
+ "watchers": 145,
"score": 0,
"subscribers_count": 4
}
diff --git a/2023/CVE-2023-20887.json b/2023/CVE-2023-20887.json
index 9aa45ef824..ecef170c97 100644
--- a/2023/CVE-2023-20887.json
+++ b/2023/CVE-2023-20887.json
@@ -13,10 +13,10 @@
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
"fork": false,
"created_at": "2023-06-13T13:17:23Z",
- "updated_at": "2024-01-07T11:05:49Z",
+ "updated_at": "2024-01-13T19:26:06Z",
"pushed_at": "2023-06-13T14:39:17Z",
- "stargazers_count": 221,
- "watchers_count": 221,
+ "stargazers_count": 222,
+ "watchers_count": 222,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 45,
- "watchers": 221,
+ "watchers": 222,
"score": 0,
"subscribers_count": 4
},
diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json
index a6468fbf45..d6c2427e36 100644
--- a/2023/CVE-2023-25136.json
+++ b/2023/CVE-2023-25136.json
@@ -199,10 +199,10 @@
"description": "OpenSSH 9.1漏洞大规模扫描和利用",
"fork": false,
"created_at": "2023-06-30T09:34:36Z",
- "updated_at": "2023-12-28T06:43:17Z",
+ "updated_at": "2024-01-14T00:20:17Z",
"pushed_at": "2023-06-30T09:36:19Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -211,7 +211,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-36003.json b/2023/CVE-2023-36003.json
index bbd23be524..1906136c61 100644
--- a/2023/CVE-2023-36003.json
+++ b/2023/CVE-2023-36003.json
@@ -13,10 +13,10 @@
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
"fork": false,
"created_at": "2024-01-11T19:17:13Z",
- "updated_at": "2024-01-13T16:40:40Z",
+ "updated_at": "2024-01-13T22:29:12Z",
"pushed_at": "2024-01-11T19:42:03Z",
- "stargazers_count": 46,
- "watchers_count": 46,
+ "stargazers_count": 49,
+ "watchers_count": 49,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 46,
+ "watchers": 49,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json
index 5ce8bb418e..36d649bfef 100644
--- a/2023/CVE-2023-36802.json
+++ b/2023/CVE-2023-36802.json
@@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
- "updated_at": "2024-01-13T14:15:06Z",
+ "updated_at": "2024-01-13T22:26:48Z",
"pushed_at": "2023-10-26T11:44:46Z",
- "stargazers_count": 87,
- "watchers_count": 87,
+ "stargazers_count": 88,
+ "watchers_count": 88,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 87,
+ "watchers": 88,
"score": 0,
"subscribers_count": 3
}
diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json
index 7465b1077c..0c9647008d 100644
--- a/2023/CVE-2023-38408.json
+++ b/2023/CVE-2023-38408.json
@@ -43,10 +43,10 @@
"description": "Takeover Account OpenSSH",
"fork": false,
"created_at": "2023-11-09T04:34:39Z",
- "updated_at": "2024-01-09T15:15:00Z",
+ "updated_at": "2024-01-13T18:36:08Z",
"pushed_at": "2023-11-09T04:36:07Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index 5fa033173b..13038c84e2 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
- "updated_at": "2024-01-12T13:09:45Z",
+ "updated_at": "2024-01-13T21:48:44Z",
"pushed_at": "2023-11-26T06:46:44Z",
- "stargazers_count": 730,
- "watchers_count": 730,
+ "stargazers_count": 732,
+ "watchers_count": 732,
"has_discussions": false,
"forks_count": 132,
"allow_forking": true,
@@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 132,
- "watchers": 730,
+ "watchers": 732,
"score": 0,
"subscribers_count": 9
},
diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json
index e63fd2ac1d..79abb7dcf9 100644
--- a/2023/CVE-2023-46604.json
+++ b/2023/CVE-2023-46604.json
@@ -43,10 +43,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
- "updated_at": "2024-01-12T11:01:49Z",
+ "updated_at": "2024-01-13T23:13:28Z",
"pushed_at": "2024-01-04T16:03:13Z",
- "stargazers_count": 182,
- "watchers_count": 182,
+ "stargazers_count": 183,
+ "watchers_count": 183,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
- "watchers": 182,
+ "watchers": 183,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-46747.json b/2023/CVE-2023-46747.json
index e64f685779..70d08c1a22 100644
--- a/2023/CVE-2023-46747.json
+++ b/2023/CVE-2023-46747.json
@@ -43,10 +43,10 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
- "updated_at": "2024-01-12T02:58:13Z",
+ "updated_at": "2024-01-13T23:27:32Z",
"pushed_at": "2023-12-07T03:10:06Z",
- "stargazers_count": 159,
- "watchers_count": 159,
+ "stargazers_count": 160,
+ "watchers_count": 160,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 35,
- "watchers": 159,
+ "watchers": 160,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json
index 3c4e4d62f0..2f42ba7290 100644
--- a/2023/CVE-2023-4863.json
+++ b/2023/CVE-2023-4863.json
@@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-25T10:33:09Z",
- "updated_at": "2023-11-20T15:46:28Z",
+ "updated_at": "2024-01-13T19:41:48Z",
"pushed_at": "2023-09-25T16:09:48Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-51467.json b/2023/CVE-2023-51467.json
index e7e10586cc..84b74be703 100644
--- a/2023/CVE-2023-51467.json
+++ b/2023/CVE-2023-51467.json
@@ -89,10 +89,10 @@
"description": "A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass",
"fork": false,
"created_at": "2023-12-29T17:47:54Z",
- "updated_at": "2024-01-12T22:04:57Z",
+ "updated_at": "2024-01-13T22:16:10Z",
"pushed_at": "2023-12-31T21:29:59Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -106,7 +106,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json
index a60c4cf9e3..c6b471d72f 100644
--- a/2023/CVE-2023-7028.json
+++ b/2023/CVE-2023-7028.json
@@ -43,10 +43,10 @@
"description": "CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T10:53:50Z",
- "updated_at": "2024-01-13T16:24:51Z",
+ "updated_at": "2024-01-14T00:30:19Z",
"pushed_at": "2024-01-12T13:56:38Z",
- "stargazers_count": 15,
- "watchers_count": 15,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 15,
+ "watchers": 17,
"score": 0,
"subscribers_count": 1
},
@@ -106,19 +106,19 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
- "updated_at": "2024-01-13T18:23:32Z",
+ "updated_at": "2024-01-14T00:30:24Z",
"pushed_at": "2024-01-13T13:50:20Z",
- "stargazers_count": 80,
- "watchers_count": 80,
+ "stargazers_count": 91,
+ "watchers_count": 91,
"has_discussions": false,
- "forks_count": 9,
+ "forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 9,
- "watchers": 80,
+ "forks": 13,
+ "watchers": 91,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-20656.json b/2024/CVE-2024-20656.json
index 0b9ac74532..aab755a2d6 100644
--- a/2024/CVE-2024-20656.json
+++ b/2024/CVE-2024-20656.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
- "updated_at": "2024-01-13T18:15:26Z",
+ "updated_at": "2024-01-13T22:22:24Z",
"pushed_at": "2024-01-12T15:16:59Z",
- "stargazers_count": 31,
- "watchers_count": 31,
+ "stargazers_count": 41,
+ "watchers_count": 41,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 31,
+ "watchers": 41,
"score": 0,
"subscribers_count": 1
}
diff --git a/README.md b/README.md
index d495a626ce..e0ddfb8faf 100644
--- a/README.md
+++ b/README.md
@@ -6326,6 +6326,21 @@
- [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion)
- [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit)
+### CVE-2022-0219 (2022-01-20)
+
+Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
+
+
+- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
+
+### CVE-2022-0236 (2022-01-18)
+
+The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
+
+
+- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
+- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
+
### CVE-2022-0265 (2022-03-03)
Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
@@ -7610,11 +7625,19 @@
- [rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit)
- [sahabrifki/CVE-2022-21587-Oracle-EBS-](https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS-)
+### CVE-2022-21658 (2022-01-20)
+
+Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
+
+
+- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658)
+
### CVE-2022-21660 (2022-02-09)
Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
+- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660)
- [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660)
### CVE-2022-21661 (2022-01-06)
@@ -7706,7 +7729,10 @@
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
+- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
+- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
+- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)
- [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907)
- [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys)
@@ -7784,6 +7810,13 @@
- [4lucardSec/Sonic_CVE-2022-22274_poc](https://github.com/4lucardSec/Sonic_CVE-2022-22274_poc)
- [forthisvideo/CVE-2022-22274_poc](https://github.com/forthisvideo/CVE-2022-22274_poc)
+### CVE-2022-22296 (2022-01-24)
+
+Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
+
+
+- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296)
+
### CVE-2022-22536 (2022-02-09)
SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n\n
@@ -8290,6 +8323,7 @@
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
+- [AlphabugX/CVE-2022-RCE](https://github.com/AlphabugX/CVE-2022-RCE)
- [tkomlodi/CVE-2022-23305_POC](https://github.com/tkomlodi/CVE-2022-23305_POC)
### CVE-2022-23342 (2022-06-21)
@@ -19864,6 +19898,7 @@
- [OldDream666/cve-2020-0796](https://github.com/OldDream666/cve-2020-0796)
- [heeloo123/CVE-2020-0796](https://github.com/heeloo123/CVE-2020-0796)
- [Ajomix/CVE-2020-0796](https://github.com/Ajomix/CVE-2020-0796)
+- [Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC](https://github.com/Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC)
### CVE-2020-0799 (2020-03-12)
@@ -34246,6 +34281,13 @@
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
+### CVE-2016-2118 (2016-04-12)
+
+The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
+
+
+- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
+
### CVE-2016-2173 (2017-04-21)
org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
@@ -34367,6 +34409,13 @@
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
+### CVE-2016-3141 (2016-03-31)
+
+Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
+
+
+- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
+
### CVE-2016-3238 (2016-07-12)
The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability."
@@ -38105,6 +38154,13 @@
- [alt3kx/CVE-2009-4118](https://github.com/alt3kx/CVE-2009-4118)
+### CVE-2009-4137 (2009-12-24)
+
+The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does not validate strings obtained from cookies before calling the unserialize function, which allows remote attackers to execute arbitrary code or upload arbitrary files via vectors related to the __destruct function in the Piwik_Config class; php://filter URIs; the __destruct functions in Zend Framework, as demonstrated by the Zend_Log destructor; the shutdown functions in Zend Framework, as demonstrated by the Zend_Log_Writer_Mail class; the render function in the Piwik_View class; Smarty templates; and the _eval function in Smarty.
+
+
+- [Alexeyan/CVE-2009-4137](https://github.com/Alexeyan/CVE-2009-4137)
+
### CVE-2009-4623 (2010-01-18)
Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the ACS_path parameter to (1) index.php and (2) admin.php in advanced_comment_system/. NOTE: this might only be a vulnerability when the administrator has not followed installation instructions in install.php. NOTE: this might be the same as CVE-2020-35598.
@@ -38126,6 +38182,7 @@
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
+- [vpereira/CVE-2009-5147](https://github.com/vpereira/CVE-2009-5147)
- [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-)