diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json index d5e9a3e997..795821539c 100644 --- a/2002/CVE-2002-20001.json +++ b/2002/CVE-2002-20001.json @@ -13,10 +13,10 @@ "description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.", "fork": false, "created_at": "2021-08-31T09:51:12Z", - "updated_at": "2022-07-14T07:59:12Z", + "updated_at": "2022-07-19T01:52:42Z", "pushed_at": "2022-07-06T11:52:16Z", - "stargazers_count": 101, - "watchers_count": 101, + "stargazers_count": 102, + "watchers_count": 102, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 101, + "watchers": 102, "score": 0 } ] \ No newline at end of file diff --git a/2015/CVE-2015-7547.json b/2015/CVE-2015-7547.json index ac4890642e..4c72b48250 100644 --- a/2015/CVE-2015-7547.json +++ b/2015/CVE-2015-7547.json @@ -13,10 +13,10 @@ "description": "Proof of concept for CVE-2015-7547", "fork": false, "created_at": "2016-02-10T21:13:54Z", - "updated_at": "2022-07-18T19:54:33Z", + "updated_at": "2022-07-19T05:49:52Z", "pushed_at": "2016-02-20T07:57:58Z", - "stargazers_count": 548, - "watchers_count": 548, + "stargazers_count": 549, + "watchers_count": 549, "forks_count": 178, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 178, - "watchers": 548, + "watchers": 549, "score": 0 }, { @@ -181,10 +181,10 @@ "description": "PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)", "fork": false, "created_at": "2016-04-05T13:50:28Z", - "updated_at": "2022-05-26T01:49:35Z", + "updated_at": "2022-07-19T05:50:01Z", "pushed_at": "2016-04-25T16:14:09Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 5, "allow_forking": true, "is_template": false, @@ -192,7 +192,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 9, + "watchers": 10, "score": 0 }, { diff --git a/2016/CVE-2016-4977.json b/2016/CVE-2016-4977.json index 0396dce54a..a434d48854 100644 --- a/2016/CVE-2016-4977.json +++ b/2016/CVE-2016-4977.json @@ -41,10 +41,10 @@ "description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977", "fork": false, "created_at": "2022-06-19T13:16:55Z", - "updated_at": "2022-07-15T07:53:52Z", + "updated_at": "2022-07-19T01:01:47Z", "pushed_at": "2022-06-27T02:34:05Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 36, + "watchers": 37, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 967ce27872..b4871e2a3a 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -419,10 +419,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2022-07-17T04:09:25Z", + "updated_at": "2022-07-19T02:32:12Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 621, - "watchers_count": 621, + "stargazers_count": 622, + "watchers_count": 622, "forks_count": 396, "allow_forking": true, "is_template": false, @@ -434,7 +434,7 @@ ], "visibility": "public", "forks": 396, - "watchers": 621, + "watchers": 622, "score": 0 }, { diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index f6fe2b26a1..4a7e81e378 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -13,10 +13,10 @@ "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "fork": false, "created_at": "2017-10-09T15:13:25Z", - "updated_at": "2022-06-17T10:53:59Z", + "updated_at": "2022-07-19T03:21:27Z", "pushed_at": "2021-07-29T12:00:48Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "forks_count": 46, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 46, - "watchers": 85, + "watchers": 86, "score": 0 }, { diff --git a/2017/CVE-2017-7529.json b/2017/CVE-2017-7529.json index 537373b278..8853376ab0 100644 --- a/2017/CVE-2017-7529.json +++ b/2017/CVE-2017-7529.json @@ -41,10 +41,10 @@ "description": "CVE-2017-7529_PoC", "fork": false, "created_at": "2018-06-20T15:16:10Z", - "updated_at": "2022-06-15T12:11:27Z", + "updated_at": "2022-07-19T03:16:08Z", "pushed_at": "2018-06-20T15:16:39Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 26, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 16, + "watchers": 17, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index a2842819ea..f86c42fdb2 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -13,10 +13,10 @@ "description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).", "fork": false, "created_at": "2018-08-17T23:48:15Z", - "updated_at": "2022-07-06T23:36:46Z", + "updated_at": "2022-07-19T04:10:45Z", "pushed_at": "2019-11-15T08:12:32Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 133, + "watchers_count": 133, "forks_count": 32, "allow_forking": true, "is_template": false, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 32, - "watchers": 132, + "watchers": 133, "score": 0 }, { diff --git a/2018/CVE-2018-20250.json b/2018/CVE-2018-20250.json index 3d3c50523c..ca01001e2d 100644 --- a/2018/CVE-2018-20250.json +++ b/2018/CVE-2018-20250.json @@ -13,10 +13,10 @@ "description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar", "fork": false, "created_at": "2019-02-22T04:52:08Z", - "updated_at": "2022-07-07T05:15:39Z", + "updated_at": "2022-07-19T01:56:50Z", "pushed_at": "2019-08-05T10:45:34Z", - "stargazers_count": 480, - "watchers_count": 480, + "stargazers_count": 481, + "watchers_count": 481, "forks_count": 187, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 187, - "watchers": 480, + "watchers": 481, "score": 0 }, { diff --git a/2019/CVE-2019-12725.json b/2019/CVE-2019-12725.json index fab14c5a1c..2616ff24d0 100644 --- a/2019/CVE-2019-12725.json +++ b/2019/CVE-2019-12725.json @@ -41,10 +41,10 @@ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "fork": false, "created_at": "2021-05-22T05:06:33Z", - "updated_at": "2022-07-18T15:34:26Z", + "updated_at": "2022-07-19T04:36:35Z", "pushed_at": "2021-11-21T10:34:06Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 91, + "watchers_count": 91, "forks_count": 27, "allow_forking": true, "is_template": false, @@ -56,7 +56,7 @@ ], "visibility": "public", "forks": 27, - "watchers": 87, + "watchers": 91, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 2a9c5128c9..6f2822117b 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -41,10 +41,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-07-18T20:15:59Z", + "updated_at": "2022-07-19T00:44:35Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3433, - "watchers_count": 3433, + "stargazers_count": 3434, + "watchers_count": 3434, "forks_count": 1020, "allow_forking": true, "is_template": false, @@ -72,7 +72,7 @@ ], "visibility": "public", "forks": 1020, - "watchers": 3433, + "watchers": 3434, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index a2571f5bd0..da0b6a44db 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-07-18T20:15:59Z", + "updated_at": "2022-07-19T00:44:35Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3433, - "watchers_count": 3433, + "stargazers_count": 3434, + "watchers_count": 3434, "forks_count": 1020, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 1020, - "watchers": 3433, + "watchers": 3434, "score": 0 }, { diff --git a/2020/CVE-2020-15148.json b/2020/CVE-2020-15148.json index 9d4a27a549..d99883abaf 100644 --- a/2020/CVE-2020-15148.json +++ b/2020/CVE-2020-15148.json @@ -13,10 +13,10 @@ "description": "几条关于CVE-2020-15148(yii2反序列化)的绕过", "fork": false, "created_at": "2020-09-21T03:55:55Z", - "updated_at": "2022-07-14T02:55:45Z", + "updated_at": "2022-07-19T02:03:54Z", "pushed_at": "2020-09-21T04:04:39Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 76, + "watchers_count": 76, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 75, + "watchers": 76, "score": 0 }, { diff --git a/2020/CVE-2020-15778.json b/2020/CVE-2020-15778.json index e398aee54a..2ece3a88c7 100644 --- a/2020/CVE-2020-15778.json +++ b/2020/CVE-2020-15778.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2020-07-18T05:15:05Z", - "updated_at": "2022-07-18T17:14:25Z", + "updated_at": "2022-07-19T02:27:34Z", "pushed_at": "2021-03-17T11:29:58Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 119, + "watchers_count": 119, "forks_count": 22, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 118, + "watchers": 119, "score": 0 }, { diff --git a/2020/CVE-2020-27976.json b/2020/CVE-2020-27976.json index 07f423e369..131b70c7a1 100644 --- a/2020/CVE-2020-27976.json +++ b/2020/CVE-2020-27976.json @@ -13,10 +13,10 @@ "description": "osCommerce Phoenix CE <=1.0.5.4 Authenticated RCE", "fork": false, "created_at": "2020-10-30T13:59:23Z", - "updated_at": "2021-12-15T14:40:42Z", + "updated_at": "2022-07-19T06:10:42Z", "pushed_at": "2020-10-30T14:18:06Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 7009586581..be98ef728d 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -73,13 +73,13 @@ "pushed_at": "2020-04-16T08:38:42Z", "stargazers_count": 260, "watchers_count": 260, - "forks_count": 64, + "forks_count": 65, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 64, + "forks": 65, "watchers": 260, "score": 0 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index bdc9e71116..bd027dd9a0 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -86,11 +86,11 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2022-07-15T07:40:01Z", + "updated_at": "2022-07-19T05:05:27Z", "pushed_at": "2021-12-30T12:26:11Z", - "stargazers_count": 384, - "watchers_count": 384, - "forks_count": 136, + "stargazers_count": 385, + "watchers_count": 385, + "forks_count": 137, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -98,8 +98,8 @@ "cve-2021-21972" ], "visibility": "public", - "forks": 136, - "watchers": 384, + "forks": 137, + "watchers": 385, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index e14343ae65..8024174337 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -73,7 +73,7 @@ "pushed_at": "2022-01-16T15:54:14Z", "stargazers_count": 148, "watchers_count": 148, - "forks_count": 30, + "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -86,7 +86,7 @@ "security" ], "visibility": "public", - "forks": 30, + "forks": 31, "watchers": 148, "score": 0 }, diff --git a/2021/CVE-2021-23132.json b/2021/CVE-2021-23132.json index 8479e9406c..e860b29f28 100644 --- a/2021/CVE-2021-23132.json +++ b/2021/CVE-2021-23132.json @@ -13,10 +13,10 @@ "description": "com_media allowed paths that are not intended for image uploads to RCE", "fork": false, "created_at": "2021-03-03T02:13:57Z", - "updated_at": "2022-07-17T15:28:38Z", + "updated_at": "2022-07-19T02:29:50Z", "pushed_at": "2021-03-03T03:52:10Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 29, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 66, + "watchers": 67, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-25094.json b/2021/CVE-2021-25094.json index f60c8181fb..c7ab33dd03 100644 --- a/2021/CVE-2021-25094.json +++ b/2021/CVE-2021-25094.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-01-03T21:19:42Z", - "updated_at": "2022-07-14T19:03:50Z", + "updated_at": "2022-07-19T04:10:26Z", "pushed_at": "2022-05-24T07:48:39Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 1a0fd0a1df..96efd192e8 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -1092,13 +1092,13 @@ "pushed_at": "2021-11-16T04:00:14Z", "stargazers_count": 134, "watchers_count": 134, - "forks_count": 28, + "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 28, + "forks": 29, "watchers": 134, "score": 0 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 0ec633858d..c6d5bf8256 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -920,10 +920,10 @@ "description": "CVE-2021-3156非交互式执行命令", "fork": false, "created_at": "2021-02-09T19:25:18Z", - "updated_at": "2022-07-13T03:17:12Z", + "updated_at": "2022-07-19T06:07:07Z", "pushed_at": "2021-02-09T19:31:33Z", - "stargazers_count": 180, - "watchers_count": 180, + "stargazers_count": 181, + "watchers_count": 181, "forks_count": 39, "allow_forking": true, "is_template": false, @@ -931,7 +931,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 180, + "watchers": 181, "score": 0 }, { diff --git a/2021/CVE-2021-36749.json b/2021/CVE-2021-36749.json index 5ec1142894..09da2b419e 100644 --- a/2021/CVE-2021-36749.json +++ b/2021/CVE-2021-36749.json @@ -13,10 +13,10 @@ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "fork": false, "created_at": "2021-05-22T05:06:33Z", - "updated_at": "2022-07-18T15:34:26Z", + "updated_at": "2022-07-19T04:36:35Z", "pushed_at": "2021-11-21T10:34:06Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 91, + "watchers_count": 91, "forks_count": 27, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 27, - "watchers": 87, + "watchers": 91, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 415a1a1e69..4c4b4f00d8 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -312,10 +312,10 @@ "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", - "updated_at": "2022-06-14T05:21:44Z", + "updated_at": "2022-07-19T06:07:31Z", "pushed_at": "2022-03-12T21:30:58Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "forks_count": 18, "allow_forking": true, "is_template": false, @@ -332,7 +332,7 @@ ], "visibility": "public", "forks": 18, - "watchers": 51, + "watchers": 52, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 62b355dae7..d5f790dcbf 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -2015,18 +2015,18 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-07-18T03:29:17Z", + "updated_at": "2022-07-19T01:13:36Z", "pushed_at": "2022-05-17T13:25:17Z", - "stargazers_count": 2965, - "watchers_count": 2965, - "forks_count": 719, + "stargazers_count": 2967, + "watchers_count": 2967, + "forks_count": 720, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 719, - "watchers": 2965, + "forks": 720, + "watchers": 2967, "score": 0 }, { @@ -8878,7 +8878,7 @@ "fork": false, "created_at": "2022-02-12T11:19:41Z", "updated_at": "2022-07-13T00:54:21Z", - "pushed_at": "2022-07-17T16:42:19Z", + "pushed_at": "2022-07-19T04:23:05Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json index 6135e7c05b..577a1c4df1 100644 --- a/2022/CVE-2022-0543.json +++ b/2022/CVE-2022-0543.json @@ -45,13 +45,13 @@ "pushed_at": "2022-07-07T07:37:10Z", "stargazers_count": 14, "watchers_count": 14, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 14, "score": 0 } diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index 5ef095a0da..4af52bcc64 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -145,10 +145,10 @@ "description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers", "fork": false, "created_at": "2022-01-17T15:42:37Z", - "updated_at": "2022-07-01T07:53:11Z", + "updated_at": "2022-07-19T03:16:03Z", "pushed_at": "2022-05-03T10:40:31Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "forks_count": 13, "allow_forking": true, "is_template": false, @@ -163,7 +163,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 67, + "watchers": 68, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index b67dff0591..82e71c8951 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -1791,10 +1791,10 @@ "description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977", "fork": false, "created_at": "2022-06-19T13:16:55Z", - "updated_at": "2022-07-15T07:53:52Z", + "updated_at": "2022-07-19T01:01:47Z", "pushed_at": "2022-06-27T02:34:05Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -1802,7 +1802,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 36, + "watchers": 37, "score": 0 }, { diff --git a/2022/CVE-2022-24112.json b/2022/CVE-2022-24112.json index 2a3a86663c..05bfb7a44e 100644 --- a/2022/CVE-2022-24112.json +++ b/2022/CVE-2022-24112.json @@ -13,10 +13,10 @@ "description": "CVE-2022-24112:Apache APISIX apisix\/batch-requests RCE", "fork": false, "created_at": "2022-02-22T14:09:49Z", - "updated_at": "2022-07-12T07:10:42Z", + "updated_at": "2022-07-19T02:49:20Z", "pushed_at": "2022-02-22T15:42:39Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 42, + "watchers": 43, "score": 0 }, { diff --git a/2022/CVE-2022-25943.json b/2022/CVE-2022-25943.json index 9cb013309b..35d73152a8 100644 --- a/2022/CVE-2022-25943.json +++ b/2022/CVE-2022-25943.json @@ -41,10 +41,10 @@ "description": "CVE-2022-25943", "fork": false, "created_at": "2022-04-22T08:30:55Z", - "updated_at": "2022-06-28T03:23:14Z", + "updated_at": "2022-07-19T03:33:12Z", "pushed_at": "2022-04-22T08:57:57Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index f84e3573eb..71ea49d949 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,11 +13,11 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-07-18T23:54:58Z", + "updated_at": "2022-07-19T06:02:42Z", "pushed_at": "2022-07-18T16:35:18Z", - "stargazers_count": 334, - "watchers_count": 334, - "forks_count": 68, + "stargazers_count": 365, + "watchers_count": 365, + "forks_count": 71, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -43,8 +43,8 @@ "gui" ], "visibility": "public", - "forks": 68, - "watchers": 334, + "forks": 71, + "watchers": 365, "score": 0 }, { @@ -1293,10 +1293,10 @@ "description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.", "fork": false, "created_at": "2022-07-04T15:00:21Z", - "updated_at": "2022-07-04T15:00:21Z", + "updated_at": "2022-07-19T02:30:51Z", "pushed_at": "2022-07-04T16:49:41Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -1304,7 +1304,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2022/CVE-2022-27666.json b/2022/CVE-2022-27666.json index 4b7370b355..8c7c3528d9 100644 --- a/2022/CVE-2022-27666.json +++ b/2022/CVE-2022-27666.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-27666", "fork": false, "created_at": "2022-03-23T22:54:28Z", - "updated_at": "2022-07-18T02:45:47Z", + "updated_at": "2022-07-19T05:38:28Z", "pushed_at": "2022-03-28T18:21:00Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "forks_count": 35, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 169, + "watchers": 170, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index c9d426ba63..8dfacc88ca 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -772,10 +772,10 @@ "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。", "fork": false, "created_at": "2022-06-02T12:33:18Z", - "updated_at": "2022-07-18T10:27:59Z", + "updated_at": "2022-07-19T02:38:56Z", "pushed_at": "2022-06-06T07:19:53Z", - "stargazers_count": 310, - "watchers_count": 310, + "stargazers_count": 311, + "watchers_count": 311, "forks_count": 45, "allow_forking": true, "is_template": false, @@ -783,7 +783,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 310, + "watchers": 311, "score": 0 }, { diff --git a/2022/CVE-2022-33891.json b/2022/CVE-2022-33891.json index 59c9d217b0..0c2103bb1b 100644 --- a/2022/CVE-2022-33891.json +++ b/2022/CVE-2022-33891.json @@ -13,10 +13,10 @@ "description": "cve-2022-33891-poc", "fork": false, "created_at": "2022-07-18T16:16:51Z", - "updated_at": "2022-07-18T16:28:57Z", + "updated_at": "2022-07-19T01:59:28Z", "pushed_at": "2022-07-18T16:28:37Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-35899.json b/2022/CVE-2022-35899.json new file mode 100644 index 0000000000..7370a73a5d --- /dev/null +++ b/2022/CVE-2022-35899.json @@ -0,0 +1,30 @@ +[ + { + "id": 515210387, + "name": "CVE-2022-35899", + "full_name": "AngeloPioAmirante\/CVE-2022-35899", + "owner": { + "login": "AngeloPioAmirante", + "id": 38589929, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38589929?v=4", + "html_url": "https:\/\/github.com\/AngeloPioAmirante" + }, + "html_url": "https:\/\/github.com\/AngeloPioAmirante\/CVE-2022-35899", + "description": "Unquoted Service Path Asus GameSdk", + "fork": false, + "created_at": "2022-07-18T14:06:58Z", + "updated_at": "2022-07-19T05:58:13Z", + "pushed_at": "2022-07-19T05:56:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index d47dca2bc3..00e981aaba 100644 --- a/README.md +++ b/README.md @@ -2811,6 +2811,9 @@ H3C SSL VPN through 2022-07-10 allows wnm/login/login.json svpnlang cookie XSS. - [safe3s/CVE-2022-35416](https://github.com/safe3s/CVE-2022-35416) +### CVE-2022-35899 +- [AngeloPioAmirante/CVE-2022-35899](https://github.com/AngeloPioAmirante/CVE-2022-35899) + ## 2021 ### CVE-2021-0302 (2021-02-10)