From 3cd1d9ba3c5715061d9dfe0f33f3cc56f672c77a Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 19 Nov 2022 03:26:09 +0900 Subject: [PATCH] Auto Update 2022/11/18 18:26:09 --- 2012/CVE-2012-1823.json | 29 ++++++++++++++++ 2014/CVE-2014-4210.json | 4 +-- 2014/CVE-2014-7920.json | 8 ++--- 2015/CVE-2015-3636.json | 8 ++--- 2016/CVE-2016-0638.json | 4 +-- 2017/CVE-2017-3248.json | 4 +-- 2017/CVE-2017-5487.json | 4 +-- 2017/CVE-2017-9248.json | 12 +++---- 2018/CVE-2018-18026.json | 8 ++--- 2018/CVE-2018-2628.json | 4 +-- 2019/CVE-2019-1064.json | 8 ++--- 2019/CVE-2019-15107.json | 4 +-- 2019/CVE-2019-18371.json | 4 +-- 2019/CVE-2019-2618.json | 4 +-- 2019/CVE-2019-2725.json | 4 +-- 2019/CVE-2019-2888.json | 4 +-- 2019/CVE-2019-3810.json | 4 +-- 2020/CVE-2020-0728.json | 8 ++--- 2020/CVE-2020-1313.json | 8 ++--- 2020/CVE-2020-1337.json | 8 ++--- 2020/CVE-2020-1938.json | 8 ++--- 2020/CVE-2020-2551.json | 4 +-- 2021/CVE-2021-21972.json | 8 ++--- 2021/CVE-2021-4034.json | 12 +++---- 2021/CVE-2021-41773.json | 29 ++++++++++++++++ 2021/CVE-2021-42013.json | 29 ++++++++++++++++ 2021/CVE-2021-44228.json | 74 +++++----------------------------------- 2022/CVE-2022-0824.json | 2 +- 2022/CVE-2022-0847.json | 8 ++--- 2022/CVE-2022-21882.json | 8 ++--- 2022/CVE-2022-22954.json | 16 ++++----- 2022/CVE-2022-2639.json | 8 ++--- 2022/CVE-2022-33679.json | 12 +++---- 2022/CVE-2022-3602.json | 6 ++-- 2022/CVE-2022-40127.json | 36 +++++++++++++++++++ 2022/CVE-2022-41352.json | 12 +++---- 2022/CVE-2022-41622.json | 8 ++--- README.md | 13 +++++-- 38 files changed, 254 insertions(+), 180 deletions(-) create mode 100644 2022/CVE-2022-40127.json diff --git a/2012/CVE-2012-1823.json b/2012/CVE-2012-1823.json index aa8e7b7577..f5fe355727 100644 --- a/2012/CVE-2012-1823.json +++ b/2012/CVE-2012-1823.json @@ -143,5 +143,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 567728889, + "name": "CVE-2012-1823", + "full_name": "daai1\/CVE-2012-1823", + "owner": { + "login": "daai1", + "id": 86880819, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86880819?v=4", + "html_url": "https:\/\/github.com\/daai1" + }, + "html_url": "https:\/\/github.com\/daai1\/CVE-2012-1823", + "description": null, + "fork": false, + "created_at": "2022-11-18T12:46:10Z", + "updated_at": "2022-11-18T12:47:34Z", + "pushed_at": "2022-11-18T12:47:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 85306b2854..ef00cd94b0 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -47,7 +47,7 @@ "stargazers_count": 1539, "watchers_count": 1539, "has_discussions": false, - "forks_count": 311, + "forks_count": 312, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,7 +74,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 311, + "forks": 312, "watchers": 1539, "score": 0 }, diff --git a/2014/CVE-2014-7920.json b/2014/CVE-2014-7920.json index 163fb83660..98164c0b3e 100644 --- a/2014/CVE-2014-7920.json +++ b/2014/CVE-2014-7920.json @@ -13,10 +13,10 @@ "description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1", "fork": false, "created_at": "2016-01-24T13:49:03Z", - "updated_at": "2022-07-20T11:41:39Z", + "updated_at": "2022-11-18T12:24:19Z", "pushed_at": "2016-01-24T22:20:44Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 76, + "watchers": 75, "score": 0 }, { diff --git a/2015/CVE-2015-3636.json b/2015/CVE-2015-3636.json index 992096f11c..fa3569b677 100644 --- a/2015/CVE-2015-3636.json +++ b/2015/CVE-2015-3636.json @@ -100,10 +100,10 @@ "description": "PoC code for 32 bit Android OS", "fork": false, "created_at": "2015-09-12T01:31:36Z", - "updated_at": "2022-09-13T10:00:24Z", + "updated_at": "2022-11-18T12:24:17Z", "pushed_at": "2015-12-15T05:42:02Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 130, + "watchers_count": 130, "has_discussions": false, "forks_count": 93, "allow_forking": true, @@ -112,7 +112,7 @@ "topics": [], "visibility": "public", "forks": 93, - "watchers": 131, + "watchers": 130, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 1545516f1b..9f8eb0aae6 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -18,7 +18,7 @@ "stargazers_count": 1539, "watchers_count": 1539, "has_discussions": false, - "forks_count": 311, + "forks_count": 312, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,7 +45,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 311, + "forks": 312, "watchers": 1539, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index f9afb5683d..3433edb84d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -47,7 +47,7 @@ "stargazers_count": 1539, "watchers_count": 1539, "has_discussions": false, - "forks_count": 311, + "forks_count": 312, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,7 +74,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 311, + "forks": 312, "watchers": 1539, "score": 0 }, diff --git a/2017/CVE-2017-5487.json b/2017/CVE-2017-5487.json index ff309f79bb..2fc2209ebb 100644 --- a/2017/CVE-2017-5487.json +++ b/2017/CVE-2017-5487.json @@ -76,13 +76,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 2, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 1, "watchers": 2, "score": 0 }, diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index a28c92d38c..bd1a14668c 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -158,12 +158,12 @@ "description": "Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.", "fork": false, "created_at": "2022-10-04T21:09:27Z", - "updated_at": "2022-11-16T14:15:53Z", + "updated_at": "2022-11-18T13:59:19Z", "pushed_at": "2022-11-16T22:49:39Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -174,8 +174,8 @@ "vulnerability" ], "visibility": "public", - "forks": 5, - "watchers": 33, + "forks": 6, + "watchers": 34, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-18026.json b/2018/CVE-2018-18026.json index 2ce971c7a8..3cc2f570fb 100644 --- a/2018/CVE-2018-18026.json +++ b/2018/CVE-2018-18026.json @@ -13,10 +13,10 @@ "description": "PoC Code for CVE-2018-18026 (exploit by stack overflow)", "fork": false, "created_at": "2018-10-18T16:51:26Z", - "updated_at": "2022-08-13T08:25:28Z", + "updated_at": "2022-11-18T14:12:47Z", "pushed_at": "2018-11-07T04:00:59Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 5d4b73a430..f647ec4298 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -573,7 +573,7 @@ "stargazers_count": 1539, "watchers_count": 1539, "has_discussions": false, - "forks_count": 311, + "forks_count": 312, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -600,7 +600,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 311, + "forks": 312, "watchers": 1539, "score": 0 }, diff --git a/2019/CVE-2019-1064.json b/2019/CVE-2019-1064.json index d54adaa321..aa4929c569 100644 --- a/2019/CVE-2019-1064.json +++ b/2019/CVE-2019-1064.json @@ -42,10 +42,10 @@ "description": "CVE-2019-1064 Local Privilege Escalation Vulnerability", "fork": false, "created_at": "2019-06-12T15:54:55Z", - "updated_at": "2020-07-13T12:07:03Z", + "updated_at": "2022-11-18T13:46:41Z", "pushed_at": "2019-06-12T12:25:42Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 11, + "watchers": 12, "score": 0 }, { diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index fd82eec088..dcbdf4ee08 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -18,13 +18,13 @@ "stargazers_count": 54, "watchers_count": 54, "has_discussions": false, - "forks_count": 19, + "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 19, + "forks": 20, "watchers": 54, "score": 0 }, diff --git a/2019/CVE-2019-18371.json b/2019/CVE-2019-18371.json index 5f548fa199..7905a90733 100644 --- a/2019/CVE-2019-18371.json +++ b/2019/CVE-2019-18371.json @@ -18,13 +18,13 @@ "stargazers_count": 168, "watchers_count": 168, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, + "forks": 30, "watchers": 168, "score": 0 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index ee40390910..aff4fd6d5a 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -192,7 +192,7 @@ "stargazers_count": 1539, "watchers_count": 1539, "has_discussions": false, - "forks_count": 311, + "forks_count": 312, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -219,7 +219,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 311, + "forks": 312, "watchers": 1539, "score": 0 } diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index df38a4a31c..8f3dc85197 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -366,13 +366,13 @@ "stargazers_count": 67, "watchers_count": 67, "has_discussions": false, - "forks_count": 35, + "forks_count": 34, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 35, + "forks": 34, "watchers": 67, "score": 0 }, diff --git a/2019/CVE-2019-2888.json b/2019/CVE-2019-2888.json index b2cce74bc1..f72efa4b69 100644 --- a/2019/CVE-2019-2888.json +++ b/2019/CVE-2019-2888.json @@ -18,13 +18,13 @@ "stargazers_count": 53, "watchers_count": 53, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, + "forks": 24, "watchers": 53, "score": 0 } diff --git a/2019/CVE-2019-3810.json b/2019/CVE-2019-3810.json index 1a65b38979..d31a384e30 100644 --- a/2019/CVE-2019-3810.json +++ b/2019/CVE-2019-3810.json @@ -18,13 +18,13 @@ "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 18, "score": 0 } diff --git a/2020/CVE-2020-0728.json b/2020/CVE-2020-0728.json index 61c3a92bae..992c3fcfab 100644 --- a/2020/CVE-2020-0728.json +++ b/2020/CVE-2020-0728.json @@ -13,10 +13,10 @@ "description": "Proof of Concept code for CVE-2020-0728", "fork": false, "created_at": "2020-02-12T22:32:28Z", - "updated_at": "2022-10-04T23:08:25Z", + "updated_at": "2022-11-18T13:46:43Z", "pushed_at": "2020-02-12T22:50:22Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 45, + "watchers": 46, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1313.json b/2020/CVE-2020-1313.json index a18431d64d..008b77de46 100644 --- a/2020/CVE-2020-1313.json +++ b/2020/CVE-2020-1313.json @@ -13,10 +13,10 @@ "description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability", "fork": false, "created_at": "2020-07-29T15:56:50Z", - "updated_at": "2022-11-09T18:08:47Z", + "updated_at": "2022-11-18T13:46:47Z", "pushed_at": "2020-07-30T07:48:40Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 114, + "watchers": 115, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1337.json b/2020/CVE-2020-1337.json index d5d52adb02..5f4c1ff8cc 100644 --- a/2020/CVE-2020-1337.json +++ b/2020/CVE-2020-1337.json @@ -110,10 +110,10 @@ "description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)", "fork": false, "created_at": "2020-08-12T10:05:36Z", - "updated_at": "2022-11-09T18:08:59Z", + "updated_at": "2022-11-18T13:46:48Z", "pushed_at": "2020-08-13T07:16:12Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -126,7 +126,7 @@ ], "visibility": "public", "forks": 48, - "watchers": 169, + "watchers": 170, "score": 0 }, { diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 382434e9d3..f8d0d54aa9 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -390,10 +390,10 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2022-11-18T05:10:43Z", + "updated_at": "2022-11-18T13:30:29Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 275, - "watchers_count": 275, + "stargazers_count": 276, + "watchers_count": 276, "has_discussions": false, "forks_count": 105, "allow_forking": true, @@ -408,7 +408,7 @@ ], "visibility": "public", "forks": 105, - "watchers": 275, + "watchers": 276, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 04498a72c7..cda28d3386 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -18,7 +18,7 @@ "stargazers_count": 1539, "watchers_count": 1539, "has_discussions": false, - "forks_count": 311, + "forks_count": 312, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,7 +45,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 311, + "forks": 312, "watchers": 1539, "score": 0 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 435fb3b7c3..2f7c49dfcb 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -795,10 +795,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2022-11-18T11:41:04Z", + "updated_at": "2022-11-18T12:41:14Z", "pushed_at": "2022-10-28T14:26:56Z", - "stargazers_count": 616, - "watchers_count": 616, + "stargazers_count": 617, + "watchers_count": 617, "has_discussions": false, "forks_count": 67, "allow_forking": true, @@ -814,7 +814,7 @@ ], "visibility": "public", "forks": 67, - "watchers": 616, + "watchers": 617, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index a1cf2bfc70..5a9df07809 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -77,19 +77,19 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-11-17T08:09:34Z", + "updated_at": "2022-11-18T12:41:55Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1701, - "watchers_count": 1701, + "stargazers_count": 1702, + "watchers_count": 1702, "has_discussions": false, - "forks_count": 488, + "forks_count": 489, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 488, - "watchers": 1701, + "forks": 489, + "watchers": 1702, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 6e9472e4a0..e12790ab14 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -1287,5 +1287,34 @@ "forks": 1, "watchers": 5, "score": 0 + }, + { + "id": 567720828, + "name": "CVE-2021-41773", + "full_name": "12345qwert123456\/CVE-2021-41773", + "owner": { + "login": "12345qwert123456", + "id": 63474188, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4", + "html_url": "https:\/\/github.com\/12345qwert123456" + }, + "html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-41773", + "description": "Vulnerable configuration Apache HTTP Server version 2.4.49", + "fork": false, + "created_at": "2022-11-18T12:23:04Z", + "updated_at": "2022-11-18T18:02:12Z", + "pushed_at": "2022-11-18T18:04:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index c09af14c75..a012a74dce 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -455,5 +455,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 567841093, + "name": "CVE-2021-42013", + "full_name": "12345qwert123456\/CVE-2021-42013", + "owner": { + "login": "12345qwert123456", + "id": 63474188, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4", + "html_url": "https:\/\/github.com\/12345qwert123456" + }, + "html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-42013", + "description": "Vulnerable configuration Apache HTTP Server version 2.4.49\/2.4.50", + "fork": false, + "created_at": "2022-11-18T17:53:46Z", + "updated_at": "2022-11-18T18:02:31Z", + "pushed_at": "2022-11-18T18:03:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 0f59a3ed44..eac5bfb94b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -13,10 +13,10 @@ "description": "Apache Log4j 远程代码执行", "fork": false, "created_at": "2021-12-09T15:27:38Z", - "updated_at": "2022-11-15T13:10:15Z", + "updated_at": "2022-11-18T13:39:11Z", "pushed_at": "2022-07-25T20:41:30Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 40, + "watchers": 41, "score": 0 }, { @@ -411,10 +411,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-11-18T03:08:35Z", + "updated_at": "2022-11-18T16:06:12Z", "pushed_at": "2022-11-18T08:36:03Z", - "stargazers_count": 542, - "watchers_count": 542, + "stargazers_count": 543, + "watchers_count": 543, "has_discussions": false, "forks_count": 101, "allow_forking": true, @@ -428,7 +428,7 @@ ], "visibility": "public", "forks": 101, - "watchers": 542, + "watchers": 543, "score": 0 }, { @@ -2291,35 +2291,6 @@ "watchers": 7, "score": 0 }, - { - "id": 438650245, - "name": "log4j_temp_CVE-2021-44228", - "full_name": "111coding\/log4j_temp_CVE-2021-44228", - "owner": { - "login": "111coding", - "id": 49793527, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49793527?v=4", - "html_url": "https:\/\/github.com\/111coding" - }, - "html_url": "https:\/\/github.com\/111coding\/log4j_temp_CVE-2021-44228", - "description": null, - "fork": false, - "created_at": "2021-12-15T14:01:23Z", - "updated_at": "2021-12-18T17:13:29Z", - "pushed_at": "2021-12-18T17:13:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 438689577, "name": "Log4j", @@ -3257,35 +3228,6 @@ "watchers": 0, "score": 0 }, - { - "id": 439658571, - "name": "log4j-pcap-activity", - "full_name": "Apipia\/log4j-pcap-activity", - "owner": { - "login": "Apipia", - "id": 17787069, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17787069?v=4", - "html_url": "https:\/\/github.com\/Apipia" - }, - "html_url": "https:\/\/github.com\/Apipia\/log4j-pcap-activity", - "description": "A fun activity using a packet capture file from the log4j exploit (CVE-2021-44228)", - "fork": false, - "created_at": "2021-12-18T16:09:49Z", - "updated_at": "2022-10-18T10:59:33Z", - "pushed_at": "2021-12-18T16:51:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 439698618, "name": "log4shell-docker-lab", diff --git a/2022/CVE-2022-0824.json b/2022/CVE-2022-0824.json index 64f5917f42..59be993eab 100644 --- a/2022/CVE-2022-0824.json +++ b/2022/CVE-2022-0824.json @@ -111,7 +111,7 @@ "fork": false, "created_at": "2022-11-08T15:22:55Z", "updated_at": "2022-11-08T15:54:59Z", - "pushed_at": "2022-11-08T16:22:07Z", + "pushed_at": "2022-11-18T15:29:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 2e611da8f4..991c93dfb9 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -2232,10 +2232,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-11-16T03:44:14Z", - "updated_at": "2022-11-18T00:05:55Z", + "updated_at": "2022-11-18T16:57:17Z", "pushed_at": "2022-11-16T03:50:57Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -2244,7 +2244,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index 8ec28fd88a..67e88d665e 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -100,10 +100,10 @@ "description": "lpe poc for cve-2022-21882 ", "fork": false, "created_at": "2022-02-07T03:45:36Z", - "updated_at": "2022-11-09T18:15:15Z", + "updated_at": "2022-11-18T13:47:02Z", "pushed_at": "2022-02-07T03:49:37Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -116,7 +116,7 @@ ], "visibility": "public", "forks": 20, - "watchers": 41, + "watchers": 42, "score": 0 }, { diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 72046de44d..b6bfd30d50 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -45,10 +45,10 @@ "description": "POC for VMWARE CVE-2022-22954", "fork": false, "created_at": "2022-04-11T13:59:23Z", - "updated_at": "2022-11-15T17:36:03Z", + "updated_at": "2022-11-18T14:35:52Z", "pushed_at": "2022-04-13T06:15:11Z", - "stargazers_count": 282, - "watchers_count": 282, + "stargazers_count": 283, + "watchers_count": 283, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 282, + "watchers": 283, "score": 0 }, { @@ -712,10 +712,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2022-11-18T11:41:04Z", + "updated_at": "2022-11-18T12:41:14Z", "pushed_at": "2022-10-28T14:26:56Z", - "stargazers_count": 616, - "watchers_count": 616, + "stargazers_count": 617, + "watchers_count": 617, "has_discussions": false, "forks_count": 67, "allow_forking": true, @@ -731,7 +731,7 @@ ], "visibility": "public", "forks": 67, - "watchers": 616, + "watchers": 617, "score": 0 }, { diff --git a/2022/CVE-2022-2639.json b/2022/CVE-2022-2639.json index 384da5fb78..a1062f9f48 100644 --- a/2022/CVE-2022-2639.json +++ b/2022/CVE-2022-2639.json @@ -13,10 +13,10 @@ "description": "CVE-2022-2639 Linux kernel openvswitch local privilege escalation", "fork": false, "created_at": "2022-09-05T15:31:56Z", - "updated_at": "2022-11-15T17:40:54Z", + "updated_at": "2022-11-18T15:23:38Z", "pushed_at": "2022-09-05T14:25:17Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 70, + "watchers": 71, "score": 0 }, { diff --git a/2022/CVE-2022-33679.json b/2022/CVE-2022-33679.json index a7ea32018a..4c15349109 100644 --- a/2022/CVE-2022-33679.json +++ b/2022/CVE-2022-33679.json @@ -13,19 +13,19 @@ "description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html", "fork": false, "created_at": "2022-11-02T18:38:01Z", - "updated_at": "2022-11-18T07:26:44Z", + "updated_at": "2022-11-18T13:34:29Z", "pushed_at": "2022-11-07T16:21:14Z", - "stargazers_count": 299, - "watchers_count": 299, + "stargazers_count": 300, + "watchers_count": 300, "has_discussions": false, - "forks_count": 50, + "forks_count": 51, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 50, - "watchers": 299, + "forks": 51, + "watchers": 300, "score": 0 }, { diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json index 32e0fb6935..8a89a5fcd7 100644 --- a/2022/CVE-2022-3602.json +++ b/2022/CVE-2022-3602.json @@ -14,11 +14,11 @@ "fork": false, "created_at": "2022-10-28T09:51:41Z", "updated_at": "2022-11-16T01:14:45Z", - "pushed_at": "2022-11-17T12:24:25Z", + "pushed_at": "2022-11-18T15:47:17Z", "stargazers_count": 525, "watchers_count": 525, "has_discussions": false, - "forks_count": 114, + "forks_count": 115, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,7 +29,7 @@ "spookyssl" ], "visibility": "public", - "forks": 114, + "forks": 115, "watchers": 525, "score": 0 }, diff --git a/2022/CVE-2022-40127.json b/2022/CVE-2022-40127.json new file mode 100644 index 0000000000..999f302d05 --- /dev/null +++ b/2022/CVE-2022-40127.json @@ -0,0 +1,36 @@ +[ + { + "id": 567740887, + "name": "CVE-2022-40127", + "full_name": "Mr-xn\/CVE-2022-40127", + "owner": { + "login": "Mr-xn", + "id": 18260135, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4", + "html_url": "https:\/\/github.com\/Mr-xn" + }, + "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-40127", + "description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC", + "fork": false, + "created_at": "2022-11-18T13:19:23Z", + "updated_at": "2022-11-18T15:25:45Z", + "pushed_at": "2022-11-18T13:26:18Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "apache-airflow", + "cve", + "poc", + "rce" + ], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41352.json b/2022/CVE-2022-41352.json index 78f0bd189b..75fe3c6d75 100644 --- a/2022/CVE-2022-41352.json +++ b/2022/CVE-2022-41352.json @@ -42,12 +42,12 @@ "description": "Zimbra <9.0.0.p27 RCE", "fork": false, "created_at": "2022-11-11T20:58:08Z", - "updated_at": "2022-11-17T15:23:09Z", + "updated_at": "2022-11-18T16:48:31Z", "pushed_at": "2022-11-14T17:54:57Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -60,8 +60,8 @@ "zimbra" ], "visibility": "public", - "forks": 13, - "watchers": 63, + "forks": 14, + "watchers": 66, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-41622.json b/2022/CVE-2022-41622.json index 18b65ec7ed..4d326f5834 100644 --- a/2022/CVE-2022-41622.json +++ b/2022/CVE-2022-41622.json @@ -13,10 +13,10 @@ "description": "A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root", "fork": false, "created_at": "2022-08-03T21:20:29Z", - "updated_at": "2022-11-18T09:47:09Z", + "updated_at": "2022-11-18T14:59:55Z", "pushed_at": "2022-10-20T17:37:43Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index f2375648a7..085f964ccd 100644 --- a/README.md +++ b/README.md @@ -4087,6 +4087,14 @@ A misconfiguration in the Service Mode profile directory of Clash for Windows v0 - [LovelyWei/CVE-2022-40126](https://github.com/LovelyWei/CVE-2022-40126) +### CVE-2022-40127 (2022-11-14) + + +A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0. + + +- [Mr-xn/CVE-2022-40127](https://github.com/Mr-xn/CVE-2022-40127) + ### CVE-2022-40140 (2022-09-19) @@ -7900,6 +7908,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [juuso0/CVE-2021-41773](https://github.com/juuso0/CVE-2021-41773) - [aqiao-jashell/CVE-2021-41773](https://github.com/aqiao-jashell/CVE-2021-41773) - [aqiao-jashell/py-CVE-2021-41773](https://github.com/aqiao-jashell/py-CVE-2021-41773) +- [12345qwert123456/CVE-2021-41773](https://github.com/12345qwert123456/CVE-2021-41773) ### CVE-2021-41946 (2022-05-18) @@ -7938,6 +7947,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in - [mightysai1997/cve-2021-42013](https://github.com/mightysai1997/cve-2021-42013) - [mightysai1997/cve-2021-42013L](https://github.com/mightysai1997/cve-2021-42013L) - [mightysai1997/cve-2021-42013.get](https://github.com/mightysai1997/cve-2021-42013.get) +- [12345qwert123456/CVE-2021-42013](https://github.com/12345qwert123456/CVE-2021-42013) ### CVE-2021-42056 (2022-06-24) @@ -8485,7 +8495,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul) - [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228) - [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1) -- [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228) - [isuruwa/Log4j](https://github.com/isuruwa/Log4j) - [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner) - [MkTech-0-8YT3/CVE-2021-44228](https://github.com/MkTech-0-8YT3/CVE-2021-44228) @@ -8517,7 +8526,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [ankur-katiyar/log4j-docker](https://github.com/ankur-katiyar/log4j-docker) - [immunityinc/Log4j-JNDIServer](https://github.com/immunityinc/Log4j-JNDIServer) - [DANSI/PowerShell-Log4J-Scanner](https://github.com/DANSI/PowerShell-Log4J-Scanner) -- [Apipia/log4j-pcap-activity](https://github.com/Apipia/log4j-pcap-activity) - [axelcurmi/log4shell-docker-lab](https://github.com/axelcurmi/log4shell-docker-lab) - [otaviokr/log4j-2021-vulnerability-study](https://github.com/otaviokr/log4j-2021-vulnerability-study) - [kkyehit/log4j_CVE-2021-44228](https://github.com/kkyehit/log4j_CVE-2021-44228) @@ -27966,6 +27974,7 @@ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured - [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2) - [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823) - [theykillmeslowly/CVE-2012-1823](https://github.com/theykillmeslowly/CVE-2012-1823) +- [daai1/CVE-2012-1823](https://github.com/daai1/CVE-2012-1823) ### CVE-2012-1870 (2012-07-10)