From 5454711100a0ff94b9366453b99051c813d00065 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 13 Nov 2022 03:17:23 +0900 Subject: [PATCH] Auto Update 2022/11/12 18:17:23 --- 2015/CVE-2015-1701.json | 8 ++++---- 2017/CVE-2017-16995.json | 29 +++++++++++++++++++++++++++++ 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-4878.json | 8 ++++---- 2018/CVE-2018-7600.json | 16 ++++++++-------- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-9670.json | 4 ++-- 2020/CVE-2020-0674.json | 8 ++++---- 2020/CVE-2020-14882.json | 8 ++++---- 2020/CVE-2020-1611.json | 12 ++++++------ 2021/CVE-2021-1675.json | 8 ++++---- 2021/CVE-2021-1732.json | 8 ++++---- 2021/CVE-2021-21551.json | 8 ++++---- 2021/CVE-2021-29447.json | 12 ++++++------ 2021/CVE-2021-4034.json | 12 ++++++------ 2021/CVE-2021-41773.json | 4 ++-- 2021/CVE-2021-42013.json | 8 ++++---- 2021/CVE-2021-44142.json | 8 ++++---- 2021/CVE-2021-44228.json | 28 ++++++++++++++-------------- 2022/CVE-2022-0492.json | 4 ++-- 2022/CVE-2022-0778.json | 8 ++++---- 2022/CVE-2022-0847.json | 8 ++++---- 2022/CVE-2022-0995.json | 8 ++++---- 2022/CVE-2022-1015.json | 8 ++++---- 2022/CVE-2022-20699.json | 8 ++++---- 2022/CVE-2022-21449.json | 8 ++++---- 2022/CVE-2022-21907.json | 20 ++++++++++---------- 2022/CVE-2022-21971.json | 8 ++++---- 2022/CVE-2022-22536.json | 8 ++++---- 2022/CVE-2022-22639.json | 8 ++++---- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-22965.json | 32 ++++++++++++++++---------------- 2022/CVE-2022-23222.json | 8 ++++---- 2022/CVE-2022-23648.json | 8 ++++---- 2022/CVE-2022-24734.json | 8 ++++---- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-29072.json | 8 ++++---- 2022/CVE-2022-29464.json | 8 ++++---- 2022/CVE-2022-3699.json | 8 ++++---- 2022/CVE-2022-40471.json | 4 ++-- README.md | 1 + 42 files changed, 220 insertions(+), 190 deletions(-) diff --git a/2015/CVE-2015-1701.json b/2015/CVE-2015-1701.json index 2727af92bf..eef6698e09 100644 --- a/2015/CVE-2015-1701.json +++ b/2015/CVE-2015-1701.json @@ -13,10 +13,10 @@ "description": "Win32k LPE vulnerability used in APT attack", "fork": false, "created_at": "2015-05-12T18:04:48Z", - "updated_at": "2022-10-05T14:33:38Z", + "updated_at": "2022-11-12T14:42:47Z", "pushed_at": "2017-12-18T14:11:29Z", - "stargazers_count": 284, - "watchers_count": 284, + "stargazers_count": 285, + "watchers_count": 285, "has_discussions": false, "forks_count": 189, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 189, - "watchers": 284, + "watchers": 285, "score": 0 }, { diff --git a/2017/CVE-2017-16995.json b/2017/CVE-2017-16995.json index dc3a241389..59322e6391 100644 --- a/2017/CVE-2017-16995.json +++ b/2017/CVE-2017-16995.json @@ -234,5 +234,34 @@ "forks": 0, "watchers": 2, "score": 0 + }, + { + "id": 565183343, + "name": "cve-2017-16995.c", + "full_name": "ivilpez\/cve-2017-16995.c", + "owner": { + "login": "ivilpez", + "id": 118066631, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118066631?v=4", + "html_url": "https:\/\/github.com\/ivilpez" + }, + "html_url": "https:\/\/github.com\/ivilpez\/cve-2017-16995.c", + "description": null, + "fork": false, + "created_at": "2022-11-12T15:47:19Z", + "updated_at": "2022-11-12T16:00:39Z", + "pushed_at": "2022-11-12T16:37:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ed276712fc..5d0a178c66 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -394,10 +394,10 @@ "description": "Weblogic 反序列化漏洞(CVE-2018-2628)", "fork": false, "created_at": "2018-06-05T11:00:40Z", - "updated_at": "2022-11-09T18:00:09Z", + "updated_at": "2022-11-12T15:29:11Z", "pushed_at": "2019-09-30T01:18:02Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -406,7 +406,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 97, + "watchers": 98, "score": 0 }, { diff --git a/2018/CVE-2018-4878.json b/2018/CVE-2018-4878.json index 7f5faeca3b..692c52a043 100644 --- a/2018/CVE-2018-4878.json +++ b/2018/CVE-2018-4878.json @@ -102,10 +102,10 @@ "description": "Aggressor Script to launch IE driveby for CVE-2018-4878", "fork": false, "created_at": "2018-02-10T09:30:18Z", - "updated_at": "2022-10-12T20:05:51Z", + "updated_at": "2022-11-12T14:41:21Z", "pushed_at": "2018-02-10T19:39:10Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -114,7 +114,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 87, + "watchers": 88, "score": 0 }, { diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 8dc0f092f5..e0140c8856 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -42,10 +42,10 @@ "description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002", "fork": false, "created_at": "2018-03-30T14:23:18Z", - "updated_at": "2022-11-09T17:59:34Z", + "updated_at": "2022-11-12T12:58:10Z", "pushed_at": "2019-03-29T11:25:57Z", - "stargazers_count": 342, - "watchers_count": 342, + "stargazers_count": 341, + "watchers_count": 341, "has_discussions": false, "forks_count": 117, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 117, - "watchers": 342, + "watchers": 341, "score": 0 }, { @@ -78,10 +78,10 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2022-11-09T17:59:41Z", + "updated_at": "2022-11-12T12:58:10Z", "pushed_at": "2021-01-08T10:31:22Z", - "stargazers_count": 536, - "watchers_count": 536, + "stargazers_count": 535, + "watchers_count": 535, "has_discussions": false, "forks_count": 172, "allow_forking": true, @@ -100,7 +100,7 @@ ], "visibility": "public", "forks": 172, - "watchers": 536, + "watchers": 535, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 3850cb40db..179787b868 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -3051,10 +3051,10 @@ "description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7", "fork": false, "created_at": "2020-03-15T19:33:53Z", - "updated_at": "2022-10-05T16:32:03Z", + "updated_at": "2022-11-12T14:47:09Z", "pushed_at": "2022-03-28T04:10:20Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 91, + "watchers_count": 91, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -3063,7 +3063,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 90, + "watchers": 91, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index fe53121436..3baf099922 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -42,10 +42,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-11-10T01:35:26Z", + "updated_at": "2022-11-12T16:46:49Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3596, - "watchers_count": 3596, + "stargazers_count": 3597, + "watchers_count": 3597, "has_discussions": false, "forks_count": 1043, "allow_forking": true, @@ -74,7 +74,7 @@ ], "visibility": "public", "forks": 1043, - "watchers": 3596, + "watchers": 3597, "score": 0 }, { diff --git a/2019/CVE-2019-9670.json b/2019/CVE-2019-9670.json index 2ad758c5fd..f43bc0669f 100644 --- a/2019/CVE-2019-9670.json +++ b/2019/CVE-2019-9670.json @@ -18,7 +18,7 @@ "stargazers_count": 21, "watchers_count": 21, "has_discussions": false, - "forks_count": 15, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,7 +29,7 @@ "zimbra" ], "visibility": "public", - "forks": 15, + "forks": 14, "watchers": 21, "score": 0 }, diff --git a/2020/CVE-2020-0674.json b/2020/CVE-2020-0674.json index 19b5789634..206b073623 100644 --- a/2020/CVE-2020-0674.json +++ b/2020/CVE-2020-0674.json @@ -42,10 +42,10 @@ "description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.", "fork": false, "created_at": "2020-05-07T22:02:25Z", - "updated_at": "2022-11-12T11:47:35Z", + "updated_at": "2022-11-12T13:55:53Z", "pushed_at": "2020-05-15T09:03:36Z", - "stargazers_count": 214, - "watchers_count": 214, + "stargazers_count": 216, + "watchers_count": 216, "has_discussions": false, "forks_count": 71, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 71, - "watchers": 214, + "watchers": 216, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index ee23e953f3..cda9442f4e 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-11-10T01:35:26Z", + "updated_at": "2022-11-12T16:46:49Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3596, - "watchers_count": 3596, + "stargazers_count": 3597, + "watchers_count": 3597, "has_discussions": false, "forks_count": 1043, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1043, - "watchers": 3596, + "watchers": 3597, "score": 0 }, { diff --git a/2020/CVE-2020-1611.json b/2020/CVE-2020-1611.json index 3dced57673..3c2441af70 100644 --- a/2020/CVE-2020-1611.json +++ b/2020/CVE-2020-1611.json @@ -13,12 +13,12 @@ "description": "Juniper Junos Space (CVE-2020-1611) (PoC)", "fork": false, "created_at": "2020-01-22T13:45:21Z", - "updated_at": "2022-07-21T16:26:09Z", + "updated_at": "2022-11-12T14:28:32Z", "pushed_at": "2020-01-22T14:01:32Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "vulnerability" ], "visibility": "public", - "forks": 8, - "watchers": 25, + "forks": 9, + "watchers": 26, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index ee69e73151..980662d9b8 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -42,10 +42,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2022-11-11T19:09:22Z", + "updated_at": "2022-11-12T14:47:40Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1628, - "watchers_count": 1628, + "stargazers_count": 1629, + "watchers_count": 1629, "has_discussions": false, "forks_count": 581, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 581, - "watchers": 1628, + "watchers": 1629, "score": 0 }, { diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index bf9b00b733..81c97b8ed9 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,10 +13,10 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2022-11-09T18:11:24Z", + "updated_at": "2022-11-12T12:58:13Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 391, - "watchers_count": 391, + "stargazers_count": 390, + "watchers_count": 390, "has_discussions": false, "forks_count": 120, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 120, - "watchers": 391, + "watchers": 390, "score": 0 }, { diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index 9c8a6eb973..ee94fdcda7 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -173,10 +173,10 @@ "description": "Dell Driver EoP (CVE-2021-21551)", "fork": false, "created_at": "2021-09-03T01:47:03Z", - "updated_at": "2022-10-19T01:55:12Z", + "updated_at": "2022-11-12T14:41:58Z", "pushed_at": "2022-02-24T10:13:45Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -185,7 +185,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 30, + "watchers": 31, "score": 0 }, { diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index 9d5e88c547..c25fb23782 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -13,19 +13,19 @@ "description": "WordPress - Authenticated XXE (CVE-2021-29447)", "fork": false, "created_at": "2021-04-16T20:41:26Z", - "updated_at": "2022-11-09T18:11:56Z", + "updated_at": "2022-11-12T14:06:01Z", "pushed_at": "2021-10-04T01:13:54Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 23, + "forks": 9, + "watchers": 24, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index f535530b83..043037627f 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -77,10 +77,10 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-11-12T10:00:59Z", + "updated_at": "2022-11-12T15:03:24Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1695, - "watchers_count": 1695, + "stargazers_count": 1696, + "watchers_count": 1696, "has_discussions": false, "forks_count": 487, "allow_forking": true, @@ -89,7 +89,7 @@ "topics": [], "visibility": "public", "forks": 487, - "watchers": 1695, + "watchers": 1696, "score": 0 }, { @@ -1268,13 +1268,13 @@ "stargazers_count": 85, "watchers_count": 85, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, + "forks": 30, "watchers": 85, "score": 0 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 89b6de0c4f..165cba8e60 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -1220,13 +1220,13 @@ "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 6, "score": 0 }, diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index 266f08502e..c09af14c75 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -75,10 +75,10 @@ "description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50", "fork": false, "created_at": "2021-10-27T14:29:10Z", - "updated_at": "2022-08-29T22:56:28Z", + "updated_at": "2022-11-12T14:16:14Z", "pushed_at": "2022-08-13T04:48:54Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -87,7 +87,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2021/CVE-2021-44142.json b/2021/CVE-2021-44142.json index d526d856f1..b97c2e7037 100644 --- a/2021/CVE-2021-44142.json +++ b/2021/CVE-2021-44142.json @@ -42,10 +42,10 @@ "description": null, "fork": false, "created_at": "2022-03-29T19:03:38Z", - "updated_at": "2022-11-09T18:15:37Z", + "updated_at": "2022-11-12T13:55:19Z", "pushed_at": "2022-03-29T20:47:13Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index ea354f6452..7be0dc08dd 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -197,7 +197,7 @@ "stargazers_count": 1025, "watchers_count": 1025, "has_discussions": false, - "forks_count": 464, + "forks_count": 465, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -205,7 +205,7 @@ "log4shell" ], "visibility": "public", - "forks": 464, + "forks": 465, "watchers": 1025, "score": 0 }, @@ -291,10 +291,10 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2022-11-11T22:39:54Z", + "updated_at": "2022-11-12T14:39:58Z", "pushed_at": "2022-01-15T16:18:44Z", - "stargazers_count": 859, - "watchers_count": 859, + "stargazers_count": 860, + "watchers_count": 860, "has_discussions": false, "forks_count": 134, "allow_forking": true, @@ -323,7 +323,7 @@ ], "visibility": "public", "forks": 134, - "watchers": 859, + "watchers": 860, "score": 0 }, { @@ -1920,10 +1920,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2022-11-09T18:14:45Z", + "updated_at": "2022-11-12T14:40:59Z", "pushed_at": "2022-04-24T08:56:47Z", - "stargazers_count": 358, - "watchers_count": 358, + "stargazers_count": 359, + "watchers_count": 359, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -1938,7 +1938,7 @@ ], "visibility": "public", "forks": 49, - "watchers": 358, + "watchers": 359, "score": 0 }, { @@ -5466,10 +5466,10 @@ "description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.", "fork": false, "created_at": "2022-01-05T22:25:42Z", - "updated_at": "2022-11-10T17:13:48Z", + "updated_at": "2022-11-12T17:54:05Z", "pushed_at": "2022-01-10T19:26:59Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -5478,7 +5478,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 92, + "watchers": 93, "score": 0 }, { diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json index 0741acaa17..dfd8a34912 100644 --- a/2022/CVE-2022-0492.json +++ b/2022/CVE-2022-0492.json @@ -47,13 +47,13 @@ "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, - "forks_count": 6, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 5, "watchers": 11, "score": 0 }, diff --git a/2022/CVE-2022-0778.json b/2022/CVE-2022-0778.json index d0c1816bb3..782e3f52b4 100644 --- a/2022/CVE-2022-0778.json +++ b/2022/CVE-2022-0778.json @@ -13,10 +13,10 @@ "description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt", "fork": false, "created_at": "2022-03-15T19:06:33Z", - "updated_at": "2022-11-09T18:15:32Z", + "updated_at": "2022-11-12T14:47:25Z", "pushed_at": "2022-04-03T15:07:31Z", - "stargazers_count": 181, - "watchers_count": 181, + "stargazers_count": 182, + "watchers_count": 182, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 181, + "watchers": 182, "score": 0 }, { diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index f65081dcb2..b78c4ef836 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -885,10 +885,10 @@ "description": "Container Excape PoC for CVE-2022-0847 \"DirtyPipe\"", "fork": false, "created_at": "2022-03-09T19:38:44Z", - "updated_at": "2022-09-28T04:39:04Z", + "updated_at": "2022-11-12T14:46:51Z", "pushed_at": "2022-04-20T20:23:36Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 76, + "watchers_count": 76, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -897,7 +897,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 75, + "watchers": 76, "score": 0 }, { diff --git a/2022/CVE-2022-0995.json b/2022/CVE-2022-0995.json index e7a5d7f598..5ad7c93ff0 100644 --- a/2022/CVE-2022-0995.json +++ b/2022/CVE-2022-0995.json @@ -13,10 +13,10 @@ "description": "CVE-2022-0995 exploit", "fork": false, "created_at": "2022-03-26T21:46:09Z", - "updated_at": "2022-11-11T02:25:15Z", + "updated_at": "2022-11-12T14:46:33Z", "pushed_at": "2022-03-27T09:07:01Z", - "stargazers_count": 486, - "watchers_count": 486, + "stargazers_count": 487, + "watchers_count": 487, "has_discussions": false, "forks_count": 71, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 71, - "watchers": 486, + "watchers": 487, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1015.json b/2022/CVE-2022-1015.json index 58c9379d74..16ff257320 100644 --- a/2022/CVE-2022-1015.json +++ b/2022/CVE-2022-1015.json @@ -13,10 +13,10 @@ "description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015", "fork": false, "created_at": "2022-04-02T03:27:11Z", - "updated_at": "2022-11-09T18:15:40Z", + "updated_at": "2022-11-12T14:45:22Z", "pushed_at": "2022-04-03T01:36:45Z", - "stargazers_count": 171, - "watchers_count": 171, + "stargazers_count": 172, + "watchers_count": 172, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 171, + "watchers": 172, "score": 0 }, { diff --git a/2022/CVE-2022-20699.json b/2022/CVE-2022-20699.json index 0a07c38369..78b9b9863d 100644 --- a/2022/CVE-2022-20699.json +++ b/2022/CVE-2022-20699.json @@ -13,10 +13,10 @@ "description": "Cisco Anyconnect VPN unauth RCE (rwx stack)", "fork": false, "created_at": "2022-02-07T15:53:21Z", - "updated_at": "2022-11-09T18:15:16Z", + "updated_at": "2022-11-12T14:47:29Z", "pushed_at": "2022-02-07T15:55:03Z", - "stargazers_count": 236, - "watchers_count": 236, + "stargazers_count": 237, + "watchers_count": 237, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 236, + "watchers": 237, "score": 0 }, { diff --git a/2022/CVE-2022-21449.json b/2022/CVE-2022-21449.json index 0fd8c684d9..a82800cc89 100644 --- a/2022/CVE-2022-21449.json +++ b/2022/CVE-2022-21449.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-04-20T10:23:07Z", - "updated_at": "2022-11-09T18:15:45Z", + "updated_at": "2022-11-12T14:40:10Z", "pushed_at": "2022-04-24T07:07:52Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 39, + "watchers": 40, "score": 0 }, { diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index 3f1b3a6f32..c061162d45 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -149,10 +149,10 @@ "description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers", "fork": false, "created_at": "2022-01-17T15:42:37Z", - "updated_at": "2022-11-09T18:15:06Z", + "updated_at": "2022-11-12T14:47:28Z", "pushed_at": "2022-05-03T10:40:31Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -168,7 +168,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 69, + "watchers": 70, "score": 0 }, { @@ -214,19 +214,19 @@ "description": "A REAL DoS exploit for CVE-2022-21907", "fork": false, "created_at": "2022-04-04T10:53:28Z", - "updated_at": "2022-10-15T13:40:22Z", + "updated_at": "2022-11-12T14:40:33Z", "pushed_at": "2022-04-13T05:48:04Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 125, + "watchers_count": 125, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, - "watchers": 124, + "forks": 30, + "watchers": 125, "score": 0 }, { diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json index 15075c65cf..7d20631011 100644 --- a/2022/CVE-2022-21971.json +++ b/2022/CVE-2022-21971.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"", "fork": false, "created_at": "2022-02-26T20:37:42Z", - "updated_at": "2022-11-09T18:15:26Z", + "updated_at": "2022-11-12T14:47:33Z", "pushed_at": "2022-02-26T20:45:19Z", - "stargazers_count": 282, - "watchers_count": 282, + "stargazers_count": 283, + "watchers_count": 283, "has_discussions": false, "forks_count": 65, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 65, - "watchers": 282, + "watchers": 283, "score": 0 }, { diff --git a/2022/CVE-2022-22536.json b/2022/CVE-2022-22536.json index e4d11f3923..35bc32c2f7 100644 --- a/2022/CVE-2022-22536.json +++ b/2022/CVE-2022-22536.json @@ -42,10 +42,10 @@ "description": null, "fork": false, "created_at": "2022-04-02T16:12:56Z", - "updated_at": "2022-10-18T08:47:06Z", + "updated_at": "2022-11-12T14:41:48Z", "pushed_at": "2022-04-02T16:57:00Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22639.json b/2022/CVE-2022-22639.json index f254c53a8c..0df208829a 100644 --- a/2022/CVE-2022-22639.json +++ b/2022/CVE-2022-22639.json @@ -13,10 +13,10 @@ "description": "CVE-2022-22639: Get a Root Shell on macOS Monterey", "fork": false, "created_at": "2022-03-17T06:16:54Z", - "updated_at": "2022-11-09T18:15:33Z", + "updated_at": "2022-11-12T14:44:17Z", "pushed_at": "2022-04-05T05:11:29Z", - "stargazers_count": 112, - "watchers_count": 112, + "stargazers_count": 113, + "watchers_count": 113, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 112, + "watchers": 113, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 00b1879b66..99da547d97 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -45,10 +45,10 @@ "description": "POC for VMWARE CVE-2022-22954", "fork": false, "created_at": "2022-04-11T13:59:23Z", - "updated_at": "2022-11-09T18:15:42Z", + "updated_at": "2022-11-12T14:40:54Z", "pushed_at": "2022-04-13T06:15:11Z", - "stargazers_count": 279, - "watchers_count": 279, + "stargazers_count": 280, + "watchers_count": 280, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 49, - "watchers": 279, + "watchers": 280, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 5d47435cad..61a965ca3f 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -13,10 +13,10 @@ "description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965", "fork": false, "created_at": "2022-03-30T07:54:45Z", - "updated_at": "2022-11-09T18:15:37Z", + "updated_at": "2022-11-12T14:45:56Z", "pushed_at": "2022-11-09T15:46:06Z", - "stargazers_count": 301, - "watchers_count": 301, + "stargazers_count": 302, + "watchers_count": 302, "has_discussions": false, "forks_count": 102, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 102, - "watchers": 301, + "watchers": 302, "score": 0 }, { @@ -304,10 +304,10 @@ "description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.", "fork": false, "created_at": "2022-03-31T15:01:12Z", - "updated_at": "2022-08-15T05:34:13Z", + "updated_at": "2022-11-12T14:45:21Z", "pushed_at": "2022-04-06T15:00:14Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -316,7 +316,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 40, + "watchers": 41, "score": 0 }, { @@ -397,10 +397,10 @@ "description": "A Safer PoC for CVE-2022-22965 (Spring4Shell)", "fork": false, "created_at": "2022-03-31T16:58:56Z", - "updated_at": "2022-09-07T02:16:29Z", + "updated_at": "2022-11-12T14:45:46Z", "pushed_at": "2022-05-27T12:56:40Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -409,7 +409,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 45, + "watchers": 46, "score": 0 }, { @@ -1376,10 +1376,10 @@ "description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)", "fork": false, "created_at": "2022-04-07T00:08:16Z", - "updated_at": "2022-11-09T18:15:41Z", + "updated_at": "2022-11-12T14:42:32Z", "pushed_at": "2022-04-07T23:00:29Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -1388,7 +1388,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 97, + "watchers": 98, "score": 0 }, { diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json index f22f4415dd..f1ec37f463 100644 --- a/2022/CVE-2022-23222.json +++ b/2022/CVE-2022-23222.json @@ -13,10 +13,10 @@ "description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation", "fork": false, "created_at": "2022-06-07T03:20:23Z", - "updated_at": "2022-11-09T18:15:56Z", + "updated_at": "2022-11-12T12:42:50Z", "pushed_at": "2022-06-07T03:41:13Z", - "stargazers_count": 507, - "watchers_count": 507, + "stargazers_count": 508, + "watchers_count": 508, "has_discussions": false, "forks_count": 89, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 89, - "watchers": 507, + "watchers": 508, "score": 0 }, { diff --git a/2022/CVE-2022-23648.json b/2022/CVE-2022-23648.json index bf0fc490fc..0b525b4edb 100644 --- a/2022/CVE-2022-23648.json +++ b/2022/CVE-2022-23648.json @@ -13,10 +13,10 @@ "description": "POC for CVE-2022-23648", "fork": false, "created_at": "2022-03-25T19:43:59Z", - "updated_at": "2022-11-01T02:35:43Z", + "updated_at": "2022-11-12T14:46:37Z", "pushed_at": "2022-03-29T09:55:15Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 35, + "watchers": 36, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-24734.json b/2022/CVE-2022-24734.json index 7b52eb7f53..684c0ec675 100644 --- a/2022/CVE-2022-24734.json +++ b/2022/CVE-2022-24734.json @@ -13,10 +13,10 @@ "description": "CVE-2022-24734 PoC", "fork": false, "created_at": "2022-05-08T15:20:41Z", - "updated_at": "2022-10-29T19:35:18Z", + "updated_at": "2022-11-12T13:55:16Z", "pushed_at": "2022-05-08T15:23:46Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 50, + "watchers": 51, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index d45ebb73a6..acb4d7c1fe 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -1323,10 +1323,10 @@ "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)", "fork": false, "created_at": "2022-07-05T04:30:42Z", - "updated_at": "2022-10-29T13:44:19Z", + "updated_at": "2022-11-12T16:59:55Z", "pushed_at": "2022-08-21T04:13:32Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -1340,7 +1340,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 9, + "watchers": 8, "score": 0 }, { diff --git a/2022/CVE-2022-29072.json b/2022/CVE-2022-29072.json index 363773f1b5..4da2dd9f13 100644 --- a/2022/CVE-2022-29072.json +++ b/2022/CVE-2022-29072.json @@ -13,10 +13,10 @@ "description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.", "fork": false, "created_at": "2022-04-15T22:59:03Z", - "updated_at": "2022-11-10T05:15:21Z", + "updated_at": "2022-11-12T14:40:16Z", "pushed_at": "2022-04-22T11:26:31Z", - "stargazers_count": 672, - "watchers_count": 672, + "stargazers_count": 673, + "watchers_count": 673, "has_discussions": false, "forks_count": 110, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 110, - "watchers": 672, + "watchers": 673, "score": 0 }, { diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 5e6d617072..eee70801b0 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2022-11-11T03:56:19Z", + "updated_at": "2022-11-12T14:40:03Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 321, - "watchers_count": 321, + "stargazers_count": 322, + "watchers_count": 322, "has_discussions": false, "forks_count": 76, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 76, - "watchers": 321, + "watchers": 322, "score": 0 }, { diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json index 0702435d8a..6d594578c5 100644 --- a/2022/CVE-2022-3699.json +++ b/2022/CVE-2022-3699.json @@ -13,10 +13,10 @@ "description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W", "fork": false, "created_at": "2022-11-09T14:15:30Z", - "updated_at": "2022-11-12T10:13:26Z", + "updated_at": "2022-11-12T12:55:40Z", "pushed_at": "2022-11-09T14:42:56Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 107, + "watchers_count": 107, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 106, + "watchers": 107, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-40471.json b/2022/CVE-2022-40471.json index 295f55efdc..2b3416a29d 100644 --- a/2022/CVE-2022-40471.json +++ b/2022/CVE-2022-40471.json @@ -18,7 +18,7 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -34,7 +34,7 @@ "vulnerability" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 7, "score": 0 } diff --git a/README.md b/README.md index 67b76ebaca..005cba703d 100644 --- a/README.md +++ b/README.md @@ -24054,6 +24054,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4 - [littlebin404/CVE-2017-16995](https://github.com/littlebin404/CVE-2017-16995) - [Lumindu/CVE-2017-16995-Linux-Kernel---BPF-Sign-Extension-Local-Privilege-Escalation-](https://github.com/Lumindu/CVE-2017-16995-Linux-Kernel---BPF-Sign-Extension-Local-Privilege-Escalation-) - [ph4ntonn/CVE-2017-16995](https://github.com/ph4ntonn/CVE-2017-16995) +- [ivilpez/cve-2017-16995.c](https://github.com/ivilpez/cve-2017-16995.c) ### CVE-2017-16997 (2017-12-17)