diff --git a/2016/CVE-2016-3714.json b/2016/CVE-2016-3714.json index 62fcf25178..32cf9cda3b 100644 --- a/2016/CVE-2016-3714.json +++ b/2016/CVE-2016-3714.json @@ -105,13 +105,13 @@ "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 15, + "forks": 16, "watchers": 19, "score": 0 }, diff --git a/2017/CVE-2017-5124.json b/2017/CVE-2017-5124.json index b869f6def2..8119dc0796 100644 --- a/2017/CVE-2017-5124.json +++ b/2017/CVE-2017-5124.json @@ -13,10 +13,10 @@ "description": "Chrome < 62 uxss exploit (CVE-2017-5124)", "fork": false, "created_at": "2017-11-13T21:33:55Z", - "updated_at": "2023-01-13T03:31:42Z", + "updated_at": "2023-02-23T12:11:37Z", "pushed_at": "2017-11-14T10:26:28Z", - "stargazers_count": 158, - "watchers_count": 158, + "stargazers_count": 159, + "watchers_count": 159, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 158, + "watchers": 159, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 63ca6efc69..c193641ede 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -3153,6 +3153,35 @@ "watchers": 0, "score": 0 }, + { + "id": 318113571, + "name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit", + "full_name": "DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit", + "owner": { + "login": "DeathStroke-source", + "id": 23089257, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23089257?v=4", + "html_url": "https:\/\/github.com\/DeathStroke-source" + }, + "html_url": "https:\/\/github.com\/DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit", + "description": "Scan through given ip list", + "fork": false, + "created_at": "2020-12-03T07:40:19Z", + "updated_at": "2021-01-29T14:08:43Z", + "pushed_at": "2019-05-22T22:32:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 330872202, "name": "CVE-2019-0708-EXP-Windows", diff --git a/2019/CVE-2019-1579.json b/2019/CVE-2019-1579.json index c8aeede1c6..bfd9c13fd8 100644 --- a/2019/CVE-2019-1579.json +++ b/2019/CVE-2019-1579.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2019-09-10T02:53:03Z", - "updated_at": "2022-07-22T10:51:25Z", + "updated_at": "2023-02-23T15:29:12Z", "pushed_at": "2019-09-10T15:57:23Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, - "forks_count": 27, + "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 27, - "watchers": 64, + "forks": 28, + "watchers": 65, "score": 0 }, { diff --git a/2019/CVE-2019-16113.json b/2019/CVE-2019-16113.json index e9381b9b97..11fee4ab1c 100644 --- a/2019/CVE-2019-16113.json +++ b/2019/CVE-2019-16113.json @@ -86,6 +86,35 @@ "watchers": 2, "score": 0 }, + { + "id": 276850480, + "name": "CVE-2019-16113-Dockerfile", + "full_name": "Kenun99\/CVE-2019-16113-Dockerfile", + "owner": { + "login": "Kenun99", + "id": 43341053, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43341053?v=4", + "html_url": "https:\/\/github.com\/Kenun99" + }, + "html_url": "https:\/\/github.com\/Kenun99\/CVE-2019-16113-Dockerfile", + "description": null, + "fork": false, + "created_at": "2020-07-03T08:37:43Z", + "updated_at": "2020-07-04T08:34:53Z", + "pushed_at": "2020-07-04T08:34:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 280433276, "name": "CVE-2019-16113", diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index e2b46ad88e..849dbfc42f 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -134,52 +134,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 602277724, - "name": "Popular-CVEs", - "full_name": "kuckibf\/Popular-CVEs", - "owner": { - "login": "kuckibf", - "id": 125511909, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125511909?v=4", - "html_url": "https:\/\/github.com\/kuckibf" - }, - "html_url": "https:\/\/github.com\/kuckibf\/Popular-CVEs", - "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 ", - "fork": false, - "created_at": "2023-02-15T21:43:32Z", - "updated_at": "2023-02-23T02:37:32Z", - "pushed_at": "2023-02-19T15:20:23Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0-day", - "0day", - "1-day", - "1day", - "cve-2019-0708", - "cve-2020-0796", - "cve-2020-2551", - "cve-2021", - "cve-2021-4034", - "cve-2021-44228", - "cve-2021-45046", - "cve-2022-22965", - "cve-2022-26134", - "cve-2022-42889", - "cve-2023-21608", - "cve-scanning", - "cve-search" - ], - "visibility": "public", - "forks": 2, - "watchers": 8, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-18988.json b/2019/CVE-2019-18988.json index ecb226c3c9..efe9f4ce82 100644 --- a/2019/CVE-2019-18988.json +++ b/2019/CVE-2019-18988.json @@ -1,4 +1,33 @@ [ + { + "id": 276340960, + "name": "CVE-2019-18988", + "full_name": "reversebrain\/CVE-2019-18988", + "owner": { + "login": "reversebrain", + "id": 8024261, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8024261?v=4", + "html_url": "https:\/\/github.com\/reversebrain" + }, + "html_url": "https:\/\/github.com\/reversebrain\/CVE-2019-18988", + "description": null, + "fork": false, + "created_at": "2020-07-01T09:56:29Z", + "updated_at": "2021-10-29T06:37:37Z", + "pushed_at": "2020-07-01T10:03:15Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 279341511, "name": "CVE-2019-18988", diff --git a/2020/CVE-2020-0418.json b/2020/CVE-2020-0418.json index 1759ce5038..6c4d7f4cd0 100644 --- a/2020/CVE-2020-0418.json +++ b/2020/CVE-2020-0418.json @@ -27,5 +27,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 605678403, + "name": "CVE-2020-0418", + "full_name": "fernandodruszcz\/CVE-2020-0418", + "owner": { + "login": "fernandodruszcz", + "id": 55147100, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55147100?v=4", + "html_url": "https:\/\/github.com\/fernandodruszcz" + }, + "html_url": "https:\/\/github.com\/fernandodruszcz\/CVE-2020-0418", + "description": null, + "fork": false, + "created_at": "2023-02-23T17:05:42Z", + "updated_at": "2023-02-23T17:08:36Z", + "pushed_at": "2023-02-23T17:18:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 0d08562c6f..825df815dd 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -105,7 +105,7 @@ "stargazers_count": 633, "watchers_count": 633, "has_discussions": false, - "forks_count": 208, + "forks_count": 207, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -113,7 +113,7 @@ "cve-2020-0796" ], "visibility": "public", - "forks": 208, + "forks": 207, "watchers": 633, "score": 0 }, diff --git a/2020/CVE-2020-10560.json b/2020/CVE-2020-10560.json index 8d4b9e2f96..7b778970b3 100644 --- a/2020/CVE-2020-10560.json +++ b/2020/CVE-2020-10560.json @@ -43,7 +43,7 @@ "fork": false, "created_at": "2020-03-28T22:09:39Z", "updated_at": "2022-11-09T18:06:56Z", - "pushed_at": "2023-02-22T17:29:31Z", + "pushed_at": "2023-02-23T17:25:17Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 49d9cafafd..c071eea5f9 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -830,52 +830,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 602277724, - "name": "Popular-CVEs", - "full_name": "kuckibf\/Popular-CVEs", - "owner": { - "login": "kuckibf", - "id": 125511909, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125511909?v=4", - "html_url": "https:\/\/github.com\/kuckibf" - }, - "html_url": "https:\/\/github.com\/kuckibf\/Popular-CVEs", - "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 ", - "fork": false, - "created_at": "2023-02-15T21:43:32Z", - "updated_at": "2023-02-23T02:37:32Z", - "pushed_at": "2023-02-19T15:20:23Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "0-day", - "0day", - "1-day", - "1day", - "cve-2019-0708", - "cve-2020-0796", - "cve-2020-2551", - "cve-2021", - "cve-2021-4034", - "cve-2021-44228", - "cve-2021-45046", - "cve-2022-22965", - "cve-2022-26134", - "cve-2022-42889", - "cve-2023-21608", - "cve-scanning", - "cve-search" - ], - "visibility": "public", - "forks": 2, - "watchers": 8, - "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-15568.json b/2020/CVE-2020-15568.json index 1ae386ef12..bcd27cf4a5 100644 --- a/2020/CVE-2020-15568.json +++ b/2020/CVE-2020-15568.json @@ -42,10 +42,10 @@ "description": "Repository for CVE-2020-15568 Metasploit module", "fork": false, "created_at": "2023-02-21T13:10:45Z", - "updated_at": "2023-02-22T08:59:57Z", + "updated_at": "2023-02-23T14:14:43Z", "pushed_at": "2023-02-21T13:10:47Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index 0bf7305706..31417ed5cc 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -71,19 +71,19 @@ "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "fork": false, "created_at": "2020-03-07T18:58:09Z", - "updated_at": "2023-02-21T04:21:43Z", + "updated_at": "2023-02-23T12:45:49Z", "pushed_at": "2022-12-15T00:36:55Z", - "stargazers_count": 172, - "watchers_count": 172, + "stargazers_count": 173, + "watchers_count": 173, "has_discussions": false, - "forks_count": 53, + "forks_count": 54, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 53, - "watchers": 172, + "forks": 54, + "watchers": 173, "score": 0 }, { diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index a2718af474..308af4b9e3 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -54,13 +54,13 @@ "stargazers_count": 710, "watchers_count": 710, "has_discussions": false, - "forks_count": 114, + "forks_count": 115, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 114, + "forks": 115, "watchers": 710, "score": 0 }, diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index ebd814d663..f78cdb6ff6 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -134,7 +134,7 @@ "stargazers_count": 55, "watchers_count": 55, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -143,7 +143,7 @@ "exploit" ], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 55, "score": 0 } diff --git a/2021/CVE-2021-39670.json b/2021/CVE-2021-39670.json index d9f51894c2..1adb72c94f 100644 --- a/2021/CVE-2021-39670.json +++ b/2021/CVE-2021-39670.json @@ -13,10 +13,10 @@ "description": "Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system", "fork": false, "created_at": "2023-02-23T06:36:47Z", - "updated_at": "2023-02-23T09:15:13Z", + "updated_at": "2023-02-23T18:14:54Z", "pushed_at": "2023-02-23T09:15:53Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index f6580032e8..3822e53cb7 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -77,19 +77,19 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2023-02-22T14:19:15Z", + "updated_at": "2023-02-23T14:12:22Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1747, - "watchers_count": 1747, + "stargazers_count": 1748, + "watchers_count": 1748, "has_discussions": false, - "forks_count": 505, + "forks_count": 506, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 505, - "watchers": 1747, + "forks": 506, + "watchers": 1748, "score": 0 }, { @@ -913,7 +913,7 @@ "stargazers_count": 742, "watchers_count": 742, "has_discussions": false, - "forks_count": 152, + "forks_count": 153, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -921,7 +921,7 @@ "cve-2021-4034" ], "visibility": "public", - "forks": 152, + "forks": 153, "watchers": 742, "score": 0 }, @@ -1819,7 +1819,7 @@ "description": "LSM BPF module to block pwnkit (CVE-2021-4034) like exploits", "fork": false, "created_at": "2022-01-27T10:26:46Z", - "updated_at": "2023-02-21T13:38:21Z", + "updated_at": "2023-02-23T15:39:06Z", "pushed_at": "2022-02-17T16:46:44Z", "stargazers_count": 18, "watchers_count": 18, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 0c23cd7e27..1f943f0141 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -47,10 +47,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2023-02-22T14:29:20Z", + "updated_at": "2023-02-23T14:33:59Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 532, - "watchers_count": 532, + "stargazers_count": 533, + "watchers_count": 533, "has_discussions": false, "forks_count": 95, "allow_forking": true, @@ -59,7 +59,7 @@ "topics": [], "visibility": "public", "forks": 95, - "watchers": 532, + "watchers": 533, "score": 0 }, { diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 111ac9eef2..586662abcd 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,10 +13,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2023-02-23T12:01:49Z", + "updated_at": "2023-02-23T13:49:33Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1185, - "watchers_count": 1185, + "stargazers_count": 1186, + "watchers_count": 1186, "has_discussions": false, "forks_count": 305, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 305, - "watchers": 1185, + "watchers": 1186, "score": 0 }, { diff --git a/2021/CVE-2021-42756.json b/2021/CVE-2021-42756.json new file mode 100644 index 0000000000..72675e4cff --- /dev/null +++ b/2021/CVE-2021-42756.json @@ -0,0 +1,31 @@ +[ + { + "id": 605630069, + "name": "CVE-2021-42756", + "full_name": "3ndorph1n\/CVE-2021-42756", + "owner": { + "login": "3ndorph1n", + "id": 126174263, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126174263?v=4", + "html_url": "https:\/\/github.com\/3ndorph1n" + }, + "html_url": "https:\/\/github.com\/3ndorph1n\/CVE-2021-42756", + "description": null, + "fork": false, + "created_at": "2023-02-23T15:10:06Z", + "updated_at": "2023-02-23T15:10:49Z", + "pushed_at": "2023-02-23T15:10:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b95a002ce9..3a5d391d13 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -909,10 +909,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2023-02-23T07:26:09Z", + "updated_at": "2023-02-23T15:42:23Z", "pushed_at": "2023-02-08T23:41:04Z", - "stargazers_count": 1537, - "watchers_count": 1537, + "stargazers_count": 1536, + "watchers_count": 1536, "has_discussions": false, "forks_count": 444, "allow_forking": true, @@ -926,7 +926,7 @@ ], "visibility": "public", "forks": 444, - "watchers": 1537, + "watchers": 1536, "score": 0 }, { @@ -1414,7 +1414,7 @@ "stargazers_count": 841, "watchers_count": 841, "has_discussions": false, - "forks_count": 179, + "forks_count": 178, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1433,7 +1433,7 @@ "scanner" ], "visibility": "public", - "forks": 179, + "forks": 178, "watchers": 841, "score": 0 }, diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json index b871d3df29..df022194ef 100644 --- a/2022/CVE-2022-0337.json +++ b/2022/CVE-2022-0337.json @@ -13,10 +13,10 @@ "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "fork": false, "created_at": "2022-03-19T08:10:46Z", - "updated_at": "2023-02-17T07:36:56Z", + "updated_at": "2023-02-23T14:17:25Z", "pushed_at": "2022-09-04T17:28:56Z", - "stargazers_count": 311, - "watchers_count": 311, + "stargazers_count": 312, + "watchers_count": 312, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -41,7 +41,7 @@ ], "visibility": "public", "forks": 40, - "watchers": 311, + "watchers": 312, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0811.json b/2022/CVE-2022-0811.json index 922d531497..76de60c746 100644 --- a/2022/CVE-2022-0811.json +++ b/2022/CVE-2022-0811.json @@ -13,7 +13,7 @@ "description": "Simple webhook to block exploitation of CVE-2022-0811", "fork": false, "created_at": "2022-03-21T09:39:22Z", - "updated_at": "2023-01-31T14:05:08Z", + "updated_at": "2023-02-23T13:04:49Z", "pushed_at": "2022-03-21T09:58:35Z", "stargazers_count": 8, "watchers_count": 8, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 8cb74a2396..06debeca88 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -368,7 +368,7 @@ "description": "POC for CVE-2022-1388", "fork": false, "created_at": "2022-05-09T11:46:45Z", - "updated_at": "2023-01-08T20:56:27Z", + "updated_at": "2023-02-23T12:44:11Z", "pushed_at": "2022-05-09T20:52:07Z", "stargazers_count": 232, "watchers_count": 232, diff --git a/2022/CVE-2022-21974.json b/2022/CVE-2022-21974.json index 0758bb21cb..f549794c33 100644 --- a/2022/CVE-2022-21974.json +++ b/2022/CVE-2022-21974.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"", "fork": false, "created_at": "2022-02-26T18:53:56Z", - "updated_at": "2023-02-23T12:09:24Z", + "updated_at": "2023-02-23T16:24:54Z", "pushed_at": "2022-02-26T19:12:12Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 56, + "watchers": 55, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 79a5dc2bad..4831b03b38 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,12 +13,12 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2023-02-23T03:47:42Z", + "updated_at": "2023-02-23T13:29:21Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 694, - "watchers_count": 694, + "stargazers_count": 696, + "watchers_count": 696, "has_discussions": false, - "forks_count": 148, + "forks_count": 149, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -27,8 +27,8 @@ "cve-2022-22718" ], "visibility": "public", - "forks": 148, - "watchers": 694, + "forks": 149, + "watchers": 696, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index bd1e100d39..7d8d84d196 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1237,10 +1237,10 @@ "description": "Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)", "fork": false, "created_at": "2022-04-15T15:41:36Z", - "updated_at": "2023-02-20T04:55:23Z", + "updated_at": "2023-02-23T12:27:26Z", "pushed_at": "2022-04-15T15:48:07Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1256,7 +1256,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 9, + "watchers": 10, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 66d4194c3c..e44bbbfefc 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -304,10 +304,10 @@ "description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.", "fork": false, "created_at": "2022-03-31T15:01:12Z", - "updated_at": "2022-11-12T14:45:21Z", + "updated_at": "2023-02-23T15:42:41Z", "pushed_at": "2022-04-06T15:00:14Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -316,7 +316,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 41, + "watchers": 40, "score": 0 }, { diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json index 90895a36cb..fdddd3b80d 100644 --- a/2022/CVE-2022-23222.json +++ b/2022/CVE-2022-23222.json @@ -13,10 +13,10 @@ "description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation", "fork": false, "created_at": "2022-06-07T03:20:23Z", - "updated_at": "2023-02-21T05:53:34Z", + "updated_at": "2023-02-23T12:37:38Z", "pushed_at": "2022-06-07T03:41:13Z", - "stargazers_count": 526, - "watchers_count": 526, + "stargazers_count": 527, + "watchers_count": 527, "has_discussions": false, "forks_count": 91, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 91, - "watchers": 526, + "watchers": 527, "score": 0 }, { diff --git a/2022/CVE-2022-31898.json b/2022/CVE-2022-31898.json index 36258d8f7e..ce6a5dc455 100644 --- a/2022/CVE-2022-31898.json +++ b/2022/CVE-2022-31898.json @@ -13,10 +13,10 @@ "description": "Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215", "fork": false, "created_at": "2022-11-11T05:11:14Z", - "updated_at": "2022-12-12T21:11:21Z", + "updated_at": "2023-02-23T14:52:52Z", "pushed_at": "2022-11-17T12:58:20Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 13, + "watchers": 14, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-36067.json b/2022/CVE-2022-36067.json index 81b09f61d6..ce04757170 100644 --- a/2022/CVE-2022-36067.json +++ b/2022/CVE-2022-36067.json @@ -42,19 +42,19 @@ "description": "This repo contains payload for the CVE-2022-36067", "fork": false, "created_at": "2022-11-05T13:28:27Z", - "updated_at": "2023-02-06T13:17:58Z", + "updated_at": "2023-02-23T14:50:19Z", "pushed_at": "2022-12-28T15:55:24Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 7, + "forks": 2, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-36537.json b/2022/CVE-2022-36537.json index d82f2b4f93..3f1d1a480e 100644 --- a/2022/CVE-2022-36537.json +++ b/2022/CVE-2022-36537.json @@ -46,10 +46,10 @@ "description": "POC of CVE-2022-36537", "fork": false, "created_at": "2022-12-09T14:15:52Z", - "updated_at": "2023-02-12T21:31:16Z", + "updated_at": "2023-02-23T15:26:03Z", "pushed_at": "2022-12-11T13:13:21Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -66,7 +66,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 16, + "watchers": 18, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json index 6b8f5efa72..c775fc581b 100644 --- a/2022/CVE-2022-39952.json +++ b/2022/CVE-2022-39952.json @@ -13,19 +13,19 @@ "description": "POC for CVE-2022-39952", "fork": false, "created_at": "2023-02-20T15:12:33Z", - "updated_at": "2023-02-23T11:36:56Z", + "updated_at": "2023-02-23T18:19:19Z", "pushed_at": "2023-02-20T15:14:51Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 166, + "watchers_count": 166, "has_discussions": false, - "forks_count": 28, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 28, - "watchers": 144, + "forks": 33, + "watchers": 166, "score": 0 }, { diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index f06fcbe6ac..bff9b0ca63 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -13,10 +13,10 @@ "description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "fork": false, "created_at": "2022-10-13T14:24:12Z", - "updated_at": "2023-02-22T22:27:07Z", + "updated_at": "2023-02-23T18:11:35Z", "pushed_at": "2022-10-13T15:25:00Z", - "stargazers_count": 306, - "watchers_count": 306, + "stargazers_count": 307, + "watchers_count": 307, "has_discussions": false, "forks_count": 90, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 90, - "watchers": 306, + "watchers": 307, "score": 0 }, { diff --git a/2022/CVE-2022-41082.json b/2022/CVE-2022-41082.json index 76494a6e92..c0c2ea2527 100644 --- a/2022/CVE-2022-41082.json +++ b/2022/CVE-2022-41082.json @@ -129,10 +129,10 @@ "description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers", "fork": false, "created_at": "2022-12-22T09:35:26Z", - "updated_at": "2023-02-23T04:38:45Z", + "updated_at": "2023-02-23T14:14:16Z", "pushed_at": "2023-01-10T08:09:36Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -149,7 +149,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 51, + "watchers": 52, "score": 0 }, { diff --git a/2022/CVE-2022-44666.json b/2022/CVE-2022-44666.json index f36cb389bd..66ec24679b 100644 --- a/2022/CVE-2022-44666.json +++ b/2022/CVE-2022-44666.json @@ -13,10 +13,10 @@ "description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.", "fork": false, "created_at": "2023-02-15T18:12:04Z", - "updated_at": "2023-02-23T12:14:18Z", + "updated_at": "2023-02-23T14:23:26Z", "pushed_at": "2023-02-15T18:18:21Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 87, + "watchers": 88, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-44789.json b/2022/CVE-2022-44789.json index 9134851fa6..152b3a79d1 100644 --- a/2022/CVE-2022-44789.json +++ b/2022/CVE-2022-44789.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-11-22T23:11:08Z", - "updated_at": "2023-02-22T05:58:06Z", + "updated_at": "2023-02-23T18:04:30Z", "pushed_at": "2023-01-28T10:31:02Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 11, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 337f225539..2f376ab23a 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2023-02-21T16:08:56Z", - "updated_at": "2023-02-23T10:55:49Z", + "updated_at": "2023-02-23T16:54:41Z", "pushed_at": "2023-02-21T16:32:33Z", - "stargazers_count": 112, - "watchers_count": 112, + "stargazers_count": 119, + "watchers_count": 119, "has_discussions": false, - "forks_count": 25, + "forks_count": 27, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 25, - "watchers": 112, + "forks": 27, + "watchers": 119, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-22809.json b/2023/CVE-2023-22809.json index 0f970624ef..46dd8ef5ae 100644 --- a/2023/CVE-2023-22809.json +++ b/2023/CVE-2023-22809.json @@ -13,10 +13,10 @@ "description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability", "fork": false, "created_at": "2023-01-21T15:19:23Z", - "updated_at": "2023-02-23T01:53:37Z", + "updated_at": "2023-02-23T15:14:21Z", "pushed_at": "2023-02-15T18:10:53Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 50, + "watchers": 51, "score": 0 }, { diff --git a/2023/CVE-2023-22974.json b/2023/CVE-2023-22974.json new file mode 100644 index 0000000000..7d5a64390a --- /dev/null +++ b/2023/CVE-2023-22974.json @@ -0,0 +1,31 @@ +[ + { + "id": 605704470, + "name": "CVE-2023-22974", + "full_name": "gbrsh\/CVE-2023-22974", + "owner": { + "login": "gbrsh", + "id": 36970331, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36970331?v=4", + "html_url": "https:\/\/github.com\/gbrsh" + }, + "html_url": "https:\/\/github.com\/gbrsh\/CVE-2023-22974", + "description": "OpenEMR < 7.0.0 Arbitrary File Read", + "fork": false, + "created_at": "2023-02-23T18:14:05Z", + "updated_at": "2023-02-23T18:15:38Z", + "pushed_at": "2023-02-23T18:15:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index 2f89e58ddb..3abc902ea1 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -224,13 +224,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index f87bc7d901..6913783527 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-02-07T15:33:41Z", - "updated_at": "2023-02-23T03:42:38Z", + "updated_at": "2023-02-23T15:56:26Z", "pushed_at": "2023-02-09T09:06:15Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 28, + "watchers": 27, "score": 0 }, { diff --git a/2023/CVE-2023-999991.json b/2023/CVE-2023-999991.json new file mode 100644 index 0000000000..57093ccb22 --- /dev/null +++ b/2023/CVE-2023-999991.json @@ -0,0 +1,31 @@ +[ + { + "id": 605646637, + "name": "CVE-2023-999991", + "full_name": "yrtsec\/CVE-2023-999991", + "owner": { + "login": "yrtsec", + "id": 38080956, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38080956?v=4", + "html_url": "https:\/\/github.com\/yrtsec" + }, + "html_url": "https:\/\/github.com\/yrtsec\/CVE-2023-999991", + "description": null, + "fork": false, + "created_at": "2023-02-23T15:48:55Z", + "updated_at": "2023-02-23T16:13:47Z", + "pushed_at": "2023-02-23T15:55:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index 2fa20a2007..fcaa04733e 100644 --- a/README.md +++ b/README.md @@ -114,6 +114,14 @@ Lexmark products through 2023-01-10 have Improper Control of Interaction Frequen - [t3l3machus/CVE-2023-22960](https://github.com/t3l3machus/CVE-2023-22960) - [manas3c/CVE-2023-22960](https://github.com/manas3c/CVE-2023-22960) +### CVE-2023-22974 (2023-02-22) + + +A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticated users to read arbitrary files by controlling a connection to an attacker-controlled MySQL server. + + +- [gbrsh/CVE-2023-22974](https://github.com/gbrsh/CVE-2023-22974) + ### CVE-2023-23333 (2023-02-06) @@ -202,6 +210,9 @@ A possible security vulnerability has been identified in Apache Kafka Connect. T - [ohnonoyesyes/CVE-2023-25194](https://github.com/ohnonoyesyes/CVE-2023-25194) +### CVE-2023-999991 +- [yrtsec/CVE-2023-999991](https://github.com/yrtsec/CVE-2023-999991) + ## 2022 ### CVE-2022-0185 (2022-02-11) @@ -11311,6 +11322,14 @@ ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafte - [EkamSinghWalia/Detection-and-Mitigation-script-for-CVE-2021-42717](https://github.com/EkamSinghWalia/Detection-and-Mitigation-script-for-CVE-2021-42717) +### CVE-2021-42756 (2023-02-16) + + +Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4 all versions may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests. + + +- [3ndorph1n/CVE-2021-42756](https://github.com/3ndorph1n/CVE-2021-42756) + ### CVE-2021-42835 (2021-12-08) @@ -12936,6 +12955,7 @@ In getPermissionInfosForGroup of Utils.java, there is a logic error. This could - [Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418](https://github.com/Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418) +- [fernandodruszcz/CVE-2020-0418](https://github.com/fernandodruszcz/CVE-2020-0418) ### CVE-2020-0421 (2020-10-14) @@ -16199,7 +16219,6 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [exploitblizzard/CVE-2020-14882-WebLogic](https://github.com/exploitblizzard/CVE-2020-14882-WebLogic) - [N0Coriander/CVE-2020-14882-14883](https://github.com/N0Coriander/CVE-2020-14882-14883) - [Manor99/CVE-2020-14882-](https://github.com/Manor99/CVE-2020-14882-) -- [kuckibf/Popular-CVEs](https://github.com/kuckibf/Popular-CVEs) ### CVE-2020-14883 (2020-10-21) @@ -18275,6 +18294,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly - [JSec1337/Scanner-CVE-2019-0708](https://github.com/JSec1337/Scanner-CVE-2019-0708) - [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI) - [AaronCaiii/CVE-2019-0708-POC](https://github.com/AaronCaiii/CVE-2019-0708-POC) +- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit) - [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows) - [FroydCod3r/CVE-2019-0708](https://github.com/FroydCod3r/CVE-2019-0708) - [pywc/CVE-2019-0708](https://github.com/pywc/CVE-2019-0708) @@ -21271,6 +21291,7 @@ Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php b - [ynots0ups/CVE-2019-16113](https://github.com/ynots0ups/CVE-2019-16113) - [cybervaca/CVE-2019-16113](https://github.com/cybervaca/CVE-2019-16113) - [hg8/CVE-2019-16113-PoC](https://github.com/hg8/CVE-2019-16113-PoC) +- [Kenun99/CVE-2019-16113-Dockerfile](https://github.com/Kenun99/CVE-2019-16113-Dockerfile) - [itsjeffersonli/CVE-2019-16113](https://github.com/itsjeffersonli/CVE-2019-16113) - [0xkasra/CVE-2019-16113](https://github.com/0xkasra/CVE-2019-16113) - [DXY0411/CVE-2019-16113](https://github.com/DXY0411/CVE-2019-16113) @@ -21565,7 +21586,6 @@ Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution - [zhzyker/exphub](https://github.com/zhzyker/exphub) - [Ma1Dong/Solr_CVE-2019-17558](https://github.com/Ma1Dong/Solr_CVE-2019-17558) - [xkyrage/Exploit_CVE-2019-17558-RCE](https://github.com/xkyrage/Exploit_CVE-2019-17558-RCE) -- [kuckibf/Popular-CVEs](https://github.com/kuckibf/Popular-CVEs) ### CVE-2019-17564 (2020-04-01) @@ -21791,6 +21811,7 @@ Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deseria TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access control because the same key is used for different customers' installations. It used a shared AES key for all installations since at least as far back as v7.0.43148, and used it for at least OptionsPasswordAES in the current version of the product. If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer. With versions before v9.x , this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decrypt the required password to login to the system. +- [reversebrain/CVE-2019-18988](https://github.com/reversebrain/CVE-2019-18988) - [mr-r3b00t/CVE-2019-18988](https://github.com/mr-r3b00t/CVE-2019-18988) ### CVE-2019-19012 (2019-11-16)