diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json index ac601527d1..74b21bba49 100644 --- a/2002/CVE-2002-20001.json +++ b/2002/CVE-2002-20001.json @@ -13,10 +13,10 @@ "description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.", "fork": false, "created_at": "2021-08-31T09:51:12Z", - "updated_at": "2022-09-16T11:36:47Z", + "updated_at": "2022-09-28T12:35:10Z", "pushed_at": "2022-07-06T11:52:16Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 109, + "watchers": 110, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-11317.json b/2017/CVE-2017-11317.json index 71446fb7d0..0b0cc2892e 100644 --- a/2017/CVE-2017-11317.json +++ b/2017/CVE-2017-11317.json @@ -13,10 +13,10 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2022-09-17T06:57:03Z", + "updated_at": "2022-09-28T12:15:24Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 135, - "watchers_count": 135, + "stargazers_count": 136, + "watchers_count": 136, "forks_count": 43, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 135, + "watchers": 136, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5415.json b/2017/CVE-2017-5415.json index 722ebe263f..9d26093882 100644 --- a/2017/CVE-2017-5415.json +++ b/2017/CVE-2017-5415.json @@ -17,13 +17,13 @@ "pushed_at": "2017-04-14T04:55:51Z", "stargazers_count": 7, "watchers_count": 7, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 7, "score": 0 } diff --git a/2017/CVE-2017-8759.json b/2017/CVE-2017-8759.json index 15cc901bb1..4d8855dfe7 100644 --- a/2017/CVE-2017-8759.json +++ b/2017/CVE-2017-8759.json @@ -218,13 +218,13 @@ "pushed_at": "2017-12-28T07:16:15Z", "stargazers_count": 84, "watchers_count": 84, - "forks_count": 50, + "forks_count": 49, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 50, + "forks": 49, "watchers": 84, "score": 0 }, diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index bd78f00ed0..89390e35a6 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -13,10 +13,10 @@ "description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)", "fork": false, "created_at": "2018-01-16T00:23:34Z", - "updated_at": "2022-09-10T11:05:37Z", + "updated_at": "2022-09-28T12:15:10Z", "pushed_at": "2020-12-22T03:10:47Z", - "stargazers_count": 125, - "watchers_count": 125, + "stargazers_count": 126, + "watchers_count": 126, "forks_count": 43, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 125, + "watchers": 126, "score": 0 }, { diff --git a/2018/CVE-2018-10562.json b/2018/CVE-2018-10562.json index 8c31908f55..0537e5f727 100644 --- a/2018/CVE-2018-10562.json +++ b/2018/CVE-2018-10562.json @@ -45,13 +45,13 @@ "pushed_at": "2018-05-26T06:44:44Z", "stargazers_count": 21, "watchers_count": 21, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 11, "watchers": 21, "score": 0 }, diff --git a/2018/CVE-2018-11776.json b/2018/CVE-2018-11776.json index b3d1c37d36..21462c3b9c 100644 --- a/2018/CVE-2018-11776.json +++ b/2018/CVE-2018-11776.json @@ -111,7 +111,7 @@ "pushed_at": "2018-08-25T02:14:49Z", "stargazers_count": 125, "watchers_count": 125, - "forks_count": 51, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -123,7 +123,7 @@ "struts2" ], "visibility": "public", - "forks": 51, + "forks": 52, "watchers": 125, "score": 0 }, @@ -324,13 +324,13 @@ "pushed_at": "2018-08-30T00:16:01Z", "stargazers_count": 53, "watchers_count": 53, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 53, "score": 0 }, diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index ff08aa0fb2..76f1d6505b 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -13,18 +13,18 @@ "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", "fork": false, "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2022-09-20T16:23:17Z", + "updated_at": "2022-09-28T14:05:03Z", "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 160, - "watchers_count": 160, - "forks_count": 51, + "stargazers_count": 161, + "watchers_count": 161, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 51, - "watchers": 160, + "forks": 52, + "watchers": 161, "score": 0 }, { diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index 8187a8b2b3..51df680336 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -41,10 +41,10 @@ "description": "Proof of Concept for CVE-2019-18634", "fork": false, "created_at": "2020-02-07T18:07:03Z", - "updated_at": "2022-09-15T02:05:48Z", + "updated_at": "2022-09-28T14:18:03Z", "pushed_at": "2021-09-12T02:55:24Z", - "stargazers_count": 148, - "watchers_count": 148, + "stargazers_count": 149, + "watchers_count": 149, "forks_count": 43, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 148, + "watchers": 149, "score": 0 }, { diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 924e68e550..3ff3586f1d 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -13,10 +13,10 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2022-09-17T06:57:03Z", + "updated_at": "2022-09-28T12:15:24Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 135, - "watchers_count": 135, + "stargazers_count": 136, + "watchers_count": 136, "forks_count": 43, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 135, + "watchers": 136, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index f172725e08..411ae76fc1 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -101,13 +101,13 @@ "pushed_at": "2020-04-26T10:49:25Z", "stargazers_count": 838, "watchers_count": 838, - "forks_count": 174, + "forks_count": 173, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 174, + "forks": 173, "watchers": 838, "score": 0 }, diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json index 0a7364afe5..e47c71c7e7 100644 --- a/2019/CVE-2019-7304.json +++ b/2019/CVE-2019-7304.json @@ -13,10 +13,10 @@ "description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)", "fork": false, "created_at": "2019-02-12T06:02:06Z", - "updated_at": "2022-09-08T09:18:42Z", + "updated_at": "2022-09-28T12:26:41Z", "pushed_at": "2019-05-09T21:34:26Z", - "stargazers_count": 621, - "watchers_count": 621, + "stargazers_count": 622, + "watchers_count": 622, "forks_count": 157, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 157, - "watchers": 621, + "watchers": 622, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 2444e0e157..edfe1547db 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1054,10 +1054,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2022-09-27T16:12:01Z", + "updated_at": "2022-09-28T17:22:29Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1214, - "watchers_count": 1214, + "stargazers_count": 1215, + "watchers_count": 1215, "forks_count": 375, "allow_forking": true, "is_template": false, @@ -1071,7 +1071,7 @@ ], "visibility": "public", "forks": 375, - "watchers": 1214, + "watchers": 1215, "score": 0 }, { @@ -1380,10 +1380,10 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2022-09-25T20:58:02Z", + "updated_at": "2022-09-28T17:16:53Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 474, - "watchers_count": 474, + "stargazers_count": 475, + "watchers_count": 475, "forks_count": 154, "allow_forking": true, "is_template": false, @@ -1397,7 +1397,7 @@ ], "visibility": "public", "forks": 154, - "watchers": 474, + "watchers": 475, "score": 0 }, { @@ -1638,10 +1638,10 @@ "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "fork": false, "created_at": "2020-06-10T16:44:39Z", - "updated_at": "2022-09-21T18:18:01Z", + "updated_at": "2022-09-28T12:54:37Z", "pushed_at": "2022-03-30T14:02:04Z", - "stargazers_count": 193, - "watchers_count": 193, + "stargazers_count": 194, + "watchers_count": 194, "forks_count": 44, "allow_forking": true, "is_template": false, @@ -1649,7 +1649,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 193, + "watchers": 194, "score": 0 }, { diff --git a/2021/CVE-2021-1585.json b/2021/CVE-2021-1585.json index 7254cf1eed..83239ea0d3 100644 --- a/2021/CVE-2021-1585.json +++ b/2021/CVE-2021-1585.json @@ -13,10 +13,10 @@ "description": "Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE", "fork": false, "created_at": "2022-02-10T21:52:24Z", - "updated_at": "2022-06-23T14:55:38Z", + "updated_at": "2022-09-28T14:01:50Z", "pushed_at": "2022-08-15T18:13:20Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 8, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index 902c290e8b..4323a44351 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -41,10 +41,10 @@ "description": null, "fork": false, "created_at": "2021-12-18T08:18:50Z", - "updated_at": "2022-09-28T12:20:51Z", + "updated_at": "2022-09-28T14:36:45Z", "pushed_at": "2021-12-22T10:32:37Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 132, + "watchers_count": 132, "forks_count": 38, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 38, - "watchers": 131, + "watchers": 132, "score": 0 }, { diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json index cb3fd427fd..22c09ad8c8 100644 --- a/2021/CVE-2021-30955.json +++ b/2021/CVE-2021-30955.json @@ -97,18 +97,18 @@ "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955", "fork": false, "created_at": "2022-03-01T12:41:03Z", - "updated_at": "2022-09-27T21:55:52Z", + "updated_at": "2022-09-28T18:10:29Z", "pushed_at": "2022-03-01T16:11:31Z", - "stargazers_count": 250, - "watchers_count": 250, - "forks_count": 44, + "stargazers_count": 249, + "watchers_count": 249, + "forks_count": 45, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 44, - "watchers": 250, + "forks": 45, + "watchers": 249, "score": 0 }, { @@ -181,18 +181,18 @@ "description": "A test app to check if your device is vulnerable to CVE-2021-30955", "fork": false, "created_at": "2022-03-18T12:32:10Z", - "updated_at": "2022-09-27T15:02:34Z", + "updated_at": "2022-09-28T18:11:42Z", "pushed_at": "2022-03-18T16:11:21Z", - "stargazers_count": 18, - "watchers_count": 18, - "forks_count": 4, + "stargazers_count": 17, + "watchers_count": 17, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 18, + "forks": 5, + "watchers": 17, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 4d21e63347..f88d49e6a6 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -1860,13 +1860,13 @@ "pushed_at": "2022-04-19T12:33:32Z", "stargazers_count": 317, "watchers_count": 317, - "forks_count": 37, + "forks_count": 38, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 37, + "forks": 38, "watchers": 317, "score": 0 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 42c411fba5..8a11fbe75f 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1810,10 +1810,10 @@ "description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸", "fork": false, "created_at": "2022-06-04T08:31:32Z", - "updated_at": "2022-09-25T13:45:33Z", + "updated_at": "2022-09-28T13:41:53Z", "pushed_at": "2022-06-16T17:14:10Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -1829,7 +1829,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2022/CVE-2022-1040.json b/2022/CVE-2022-1040.json index f3a8c799f2..56148b7463 100644 --- a/2022/CVE-2022-1040.json +++ b/2022/CVE-2022-1040.json @@ -106,10 +106,10 @@ "description": "CVE-2022-1040", "fork": false, "created_at": "2022-09-25T15:15:01Z", - "updated_at": "2022-09-26T01:45:47Z", + "updated_at": "2022-09-28T15:32:00Z", "pushed_at": "2022-09-25T15:15:44Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -117,7 +117,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21661.json b/2022/CVE-2022-21661.json index b1b4adc844..82cc438bbf 100644 --- a/2022/CVE-2022-21661.json +++ b/2022/CVE-2022-21661.json @@ -125,10 +125,10 @@ "description": "WordPress WP_Query SQL Injection POC", "fork": false, "created_at": "2022-07-28T13:12:51Z", - "updated_at": "2022-09-06T07:33:15Z", + "updated_at": "2022-09-28T14:33:55Z", "pushed_at": "2022-07-30T08:20:53Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2022/CVE-2022-2274.json b/2022/CVE-2022-2274.json index 125fb7d69a..2d993400b3 100644 --- a/2022/CVE-2022-2274.json +++ b/2022/CVE-2022-2274.json @@ -13,10 +13,10 @@ "description": "A POC OF CVE-2022-2274 (openssl)", "fork": false, "created_at": "2022-09-24T21:30:34Z", - "updated_at": "2022-09-27T10:55:23Z", + "updated_at": "2022-09-28T14:55:07Z", "pushed_at": "2022-09-24T21:37:16Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 44f0fa1a57..9e67fcefd0 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -525,10 +525,10 @@ "description": "SpringFramework 远程代码执行漏洞CVE-2022-22965", "fork": false, "created_at": "2022-04-01T04:51:44Z", - "updated_at": "2022-09-28T10:31:22Z", + "updated_at": "2022-09-28T15:37:10Z", "pushed_at": "2022-04-01T12:08:45Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 54, + "watchers_count": 54, "forks_count": 14, "allow_forking": true, "is_template": false, @@ -536,7 +536,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 51, + "watchers": 54, "score": 0 }, { diff --git a/2022/CVE-2022-25845.json b/2022/CVE-2022-25845.json index c3d4453a46..691cb5f1f4 100644 --- a/2022/CVE-2022-25845.json +++ b/2022/CVE-2022-25845.json @@ -13,10 +13,10 @@ "description": "[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload", "fork": false, "created_at": "2022-09-01T04:36:50Z", - "updated_at": "2022-09-28T04:53:20Z", + "updated_at": "2022-09-28T15:01:36Z", "pushed_at": "2022-09-02T11:00:28Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 63, + "watchers": 64, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json index 93762a0a81..c28f471057 100644 --- a/2022/CVE-2022-2588.json +++ b/2022/CVE-2022-2588.json @@ -13,10 +13,10 @@ "description": "exploit for CVE-2022-2588", "fork": false, "created_at": "2022-08-11T06:01:24Z", - "updated_at": "2022-09-28T11:17:49Z", + "updated_at": "2022-09-28T18:18:04Z", "pushed_at": "2022-09-24T16:43:58Z", - "stargazers_count": 288, - "watchers_count": 288, + "stargazers_count": 291, + "watchers_count": 291, "forks_count": 32, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 288, + "watchers": 291, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index a9061c83d9..0222ccc798 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-09-28T09:07:01Z", + "updated_at": "2022-09-28T13:59:03Z", "pushed_at": "2022-08-29T12:54:56Z", - "stargazers_count": 785, - "watchers_count": 785, + "stargazers_count": 786, + "watchers_count": 786, "forks_count": 141, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 141, - "watchers": 785, + "watchers": 786, "score": 0 }, { diff --git a/2022/CVE-2022-29581.json b/2022/CVE-2022-29581.json index 09f20b7fb1..922f0193d8 100644 --- a/2022/CVE-2022-29581.json +++ b/2022/CVE-2022-29581.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-09-26T04:52:12Z", - "updated_at": "2022-09-26T05:25:38Z", + "updated_at": "2022-09-28T15:02:24Z", "pushed_at": "2022-09-26T05:23:05Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index ca4c78c4f3..3a65cf3a75 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -10,23 +10,23 @@ "html_url": "https:\/\/github.com\/flux10n" }, "html_url": "https:\/\/github.com\/flux10n\/CVE-2022-30190", - "description": "CVE-2022-30190", + "description": "CVE-2022-30190 (Exploit Microsoft)", "fork": false, "created_at": "2022-03-02T12:17:56Z", - "updated_at": "2022-09-28T12:10:51Z", - "pushed_at": "2022-09-28T12:11:21Z", - "stargazers_count": 2, - "watchers_count": 2, + "updated_at": "2022-09-28T15:16:08Z", + "pushed_at": "2022-09-28T12:43:56Z", + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ - "yeah" + "exploit-microsoft" ], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2022/CVE-2022-37706.json b/2022/CVE-2022-37706.json index e7b0046ac2..59060e3491 100644 --- a/2022/CVE-2022-37706.json +++ b/2022/CVE-2022-37706.json @@ -13,10 +13,10 @@ "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "fork": false, "created_at": "2022-09-12T19:22:44Z", - "updated_at": "2022-09-26T07:26:22Z", + "updated_at": "2022-09-28T12:53:03Z", "pushed_at": "2022-09-19T19:41:34Z", - "stargazers_count": 165, - "watchers_count": 165, + "stargazers_count": 166, + "watchers_count": 166, "forks_count": 19, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 165, + "watchers": 166, "score": 0 }, { diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index c7b42c8556..47e13ce22c 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -213,10 +213,10 @@ "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "fork": false, "created_at": "2022-09-26T08:58:21Z", - "updated_at": "2022-09-28T10:09:49Z", + "updated_at": "2022-09-28T17:06:59Z", "pushed_at": "2022-09-26T13:20:38Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -228,7 +228,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 66, + "watchers": 67, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-40490.json b/2022/CVE-2022-40490.json new file mode 100644 index 0000000000..4b088d85fb --- /dev/null +++ b/2022/CVE-2022-40490.json @@ -0,0 +1,30 @@ +[ + { + "id": 542635261, + "name": "CVE-2022-40490", + "full_name": "whitej3rry\/CVE-2022-40490", + "owner": { + "login": "whitej3rry", + "id": 60222364, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60222364?v=4", + "html_url": "https:\/\/github.com\/whitej3rry" + }, + "html_url": "https:\/\/github.com\/whitej3rry\/CVE-2022-40490", + "description": "Tiny File Manager v2.4.7 and below are vulnerable to Cross Site Scripting", + "fork": false, + "created_at": "2022-09-28T14:32:41Z", + "updated_at": "2022-09-28T14:32:42Z", + "pushed_at": "2022-09-28T14:37:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40916.json b/2022/CVE-2022-40916.json new file mode 100644 index 0000000000..013555d552 --- /dev/null +++ b/2022/CVE-2022-40916.json @@ -0,0 +1,30 @@ +[ + { + "id": 537484841, + "name": "CVE-2022-40916", + "full_name": "whitej3rry\/CVE-2022-40916", + "owner": { + "login": "whitej3rry", + "id": 60222364, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60222364?v=4", + "html_url": "https:\/\/github.com\/whitej3rry" + }, + "html_url": "https:\/\/github.com\/whitej3rry\/CVE-2022-40916", + "description": null, + "fork": false, + "created_at": "2022-09-16T14:07:35Z", + "updated_at": "2022-09-28T14:29:21Z", + "pushed_at": "2022-09-28T14:37:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index 004a870958..5c7be1d760 100644 --- a/README.md +++ b/README.md @@ -3807,6 +3807,12 @@ OpenKM 6.3.11 allows stored XSS related to the javascript: substring i - [izdiwho/CVE-2022-40317](https://github.com/izdiwho/CVE-2022-40317) +### CVE-2022-40490 +- [whitej3rry/CVE-2022-40490](https://github.com/whitej3rry/CVE-2022-40490) + +### CVE-2022-40916 +- [whitej3rry/CVE-2022-40916](https://github.com/whitej3rry/CVE-2022-40916) + ## 2021 ### CVE-2021-0302 (2021-02-10)