From 6b11d4b3cd82263664e509d14630ba68ef3a1075 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 30 Oct 2022 03:17:29 +0900 Subject: [PATCH] Auto Update 2022/10/29 18:17:29 --- 2015/CVE-2015-7547.json | 28 ++++++++++++++++++++++++++++ 2017/CVE-2017-9248.json | 6 +++--- 2018/CVE-2018-15139.json | 8 ++++---- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-10560.json | 2 +- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-16898.json | 8 ++++---- 2020/CVE-2020-7200.json | 8 ++++---- 2021/CVE-2021-21551.json | 4 ++-- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-41073.json | 8 ++++---- 2021/CVE-2021-44228.json | 24 ++++++++++++------------ 2022/CVE-2022-20699.json | 8 ++++---- 2022/CVE-2022-22947.json | 16 ++++++++-------- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-2588.json | 8 ++++---- 2022/CVE-2022-26134.json | 40 ++++++++++++++++++++-------------------- 2022/CVE-2022-27925.json | 8 ++++---- 2022/CVE-2022-2992.json | 12 ++++++------ 2022/CVE-2022-33891.json | 8 ++++---- 2022/CVE-2022-34718.json | 8 ++++---- 2022/CVE-2022-36804.json | 16 ++++++++-------- 2022/CVE-2022-39197.json | 4 ++-- 2022/CVE-2022-41852.json | 8 ++++---- 2022/CVE-2022-42889.json | 12 ++++++------ README.md | 1 + 26 files changed, 153 insertions(+), 124 deletions(-) diff --git a/2015/CVE-2015-7547.json b/2015/CVE-2015-7547.json index 44de4fac49..68d96b3cde 100644 --- a/2015/CVE-2015-7547.json +++ b/2015/CVE-2015-7547.json @@ -251,6 +251,34 @@ "watchers": 0, "score": 0 }, + { + "id": 217326730, + "name": "CVE-2015-7547-Research", + "full_name": "Stick-U235\/CVE-2015-7547-Research", + "owner": { + "login": "Stick-U235", + "id": 28267481, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28267481?v=4", + "html_url": "https:\/\/github.com\/Stick-U235" + }, + "html_url": "https:\/\/github.com\/Stick-U235\/CVE-2015-7547-Research", + "description": "CVE-2015-7547 initial research.", + "fork": false, + "created_at": "2019-10-24T15:02:23Z", + "updated_at": "2022-10-29T15:16:19Z", + "pushed_at": "2022-10-29T15:15:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 263361814, "name": "Glibc-Vulnerability-Exploit-CVE-2015-7547", diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index 886c213bc3..87bcd62309 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -154,10 +154,10 @@ "fork": false, "created_at": "2022-10-04T21:09:27Z", "updated_at": "2022-10-29T01:32:35Z", - "pushed_at": "2022-10-29T02:01:31Z", + "pushed_at": "2022-10-29T17:51:51Z", "stargazers_count": 30, "watchers_count": 30, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -168,7 +168,7 @@ "vulnerability" ], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 30, "score": 0 } diff --git a/2018/CVE-2018-15139.json b/2018/CVE-2018-15139.json index 5e6126986c..739b5cccbe 100644 --- a/2018/CVE-2018-15139.json +++ b/2018/CVE-2018-15139.json @@ -13,10 +13,10 @@ "description": "OpenEMR < 5.0.1.4 - (Authenticated) File upload - Remote command execution", "fork": false, "created_at": "2021-07-05T16:03:38Z", - "updated_at": "2021-10-17T04:32:56Z", + "updated_at": "2022-10-29T17:15:50Z", "pushed_at": "2021-07-08T19:10:46Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -35,7 +35,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 95782ad805..f46baeb495 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -125,10 +125,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2022-10-25T18:46:58Z", + "updated_at": "2022-10-29T16:56:48Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 626, - "watchers_count": 626, + "stargazers_count": 627, + "watchers_count": 627, "forks_count": 203, "allow_forking": true, "is_template": false, @@ -138,7 +138,7 @@ ], "visibility": "public", "forks": 203, - "watchers": 626, + "watchers": 627, "score": 0 }, { diff --git a/2020/CVE-2020-10560.json b/2020/CVE-2020-10560.json index 3e889c9268..8725fed5cf 100644 --- a/2020/CVE-2020-10560.json +++ b/2020/CVE-2020-10560.json @@ -42,7 +42,7 @@ "fork": false, "created_at": "2020-03-28T22:09:39Z", "updated_at": "2022-07-23T01:32:06Z", - "pushed_at": "2022-10-18T18:32:20Z", + "pushed_at": "2022-10-29T16:58:02Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 4, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 34c524b868..c7f502b947 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -97,10 +97,10 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2022-10-24T22:53:26Z", + "updated_at": "2022-10-29T16:31:48Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 960, - "watchers_count": 960, + "stargazers_count": 961, + "watchers_count": 961, "forks_count": 270, "allow_forking": true, "is_template": false, @@ -108,7 +108,7 @@ "topics": [], "visibility": "public", "forks": 270, - "watchers": 960, + "watchers": 961, "score": 0 }, { diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index 129d83534f..af5a837060 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -368,10 +368,10 @@ "description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC", "fork": false, "created_at": "2020-10-20T05:24:47Z", - "updated_at": "2021-10-10T21:13:40Z", + "updated_at": "2022-10-29T17:15:48Z", "pushed_at": "2020-10-28T11:21:00Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -379,7 +379,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 4, "score": 0 }, { diff --git a/2020/CVE-2020-7200.json b/2020/CVE-2020-7200.json index 447e6003f8..1718e774a6 100644 --- a/2020/CVE-2020-7200.json +++ b/2020/CVE-2020-7200.json @@ -13,10 +13,10 @@ "description": "CVE-2020-7200: HPE Systems Insight Manager (SIM) RCE PoC", "fork": false, "created_at": "2021-01-14T21:05:29Z", - "updated_at": "2021-11-27T06:35:11Z", + "updated_at": "2022-10-29T17:15:49Z", "pushed_at": "2021-01-17T20:30:38Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index 77499a7850..46a7888464 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -101,7 +101,7 @@ "pushed_at": "2021-11-16T17:34:11Z", "stargazers_count": 29, "watchers_count": 29, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -122,7 +122,7 @@ "windows" ], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 29, "score": 0 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 6b5847f7c0..671583f084 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -769,10 +769,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2022-10-29T07:47:24Z", + "updated_at": "2022-10-29T17:05:05Z", "pushed_at": "2022-10-28T14:26:56Z", - "stargazers_count": 563, - "watchers_count": 563, + "stargazers_count": 564, + "watchers_count": 564, "forks_count": 60, "allow_forking": true, "is_template": false, @@ -787,7 +787,7 @@ ], "visibility": "public", "forks": 60, - "watchers": 563, + "watchers": 564, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41073.json b/2021/CVE-2021-41073.json index 31c2976a32..fdd6541a6e 100644 --- a/2021/CVE-2021-41073.json +++ b/2021/CVE-2021-41073.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-03-02T19:07:37Z", - "updated_at": "2022-10-18T22:56:15Z", + "updated_at": "2022-10-29T17:33:42Z", "pushed_at": "2022-03-08T15:37:34Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 84, + "watchers_count": 84, "forks_count": 17, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 83, + "watchers": 84, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index d1179acb70..bbcdcc2928 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -13,10 +13,10 @@ "description": "Apache Log4j 远程代码执行", "fork": false, "created_at": "2021-12-09T15:27:38Z", - "updated_at": "2022-10-25T16:41:01Z", + "updated_at": "2022-10-29T15:08:28Z", "pushed_at": "2022-07-25T20:41:30Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "forks_count": 20, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 37, + "watchers": 38, "score": 0 }, { @@ -390,10 +390,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-10-27T07:09:26Z", + "updated_at": "2022-10-29T17:07:31Z", "pushed_at": "2022-09-21T07:49:03Z", - "stargazers_count": 1486, - "watchers_count": 1486, + "stargazers_count": 1487, + "watchers_count": 1487, "forks_count": 420, "allow_forking": true, "is_template": false, @@ -406,7 +406,7 @@ ], "visibility": "public", "forks": 420, - "watchers": 1486, + "watchers": 1487, "score": 0 }, { @@ -1325,10 +1325,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-10-29T06:46:28Z", + "updated_at": "2022-10-29T15:20:09Z", "pushed_at": "2022-10-20T15:37:44Z", - "stargazers_count": 3086, - "watchers_count": 3086, + "stargazers_count": 3087, + "watchers_count": 3087, "forks_count": 731, "allow_forking": true, "is_template": false, @@ -1336,7 +1336,7 @@ "topics": [], "visibility": "public", "forks": 731, - "watchers": 3086, + "watchers": 3087, "score": 0 }, { diff --git a/2022/CVE-2022-20699.json b/2022/CVE-2022-20699.json index 01d82950c6..8b85809387 100644 --- a/2022/CVE-2022-20699.json +++ b/2022/CVE-2022-20699.json @@ -41,10 +41,10 @@ "description": null, "fork": false, "created_at": "2022-02-14T06:23:06Z", - "updated_at": "2022-02-16T21:53:09Z", + "updated_at": "2022-10-29T15:58:17Z", "pushed_at": "2022-02-14T06:23:14Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 39aa78a3a6..685ecf8b81 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -13,10 +13,10 @@ "description": "CVE-2022-22947", "fork": false, "created_at": "2022-03-02T11:58:55Z", - "updated_at": "2022-10-20T02:18:03Z", + "updated_at": "2022-10-29T13:45:07Z", "pushed_at": "2022-03-03T14:03:30Z", - "stargazers_count": 190, - "watchers_count": 190, + "stargazers_count": 191, + "watchers_count": 191, "forks_count": 60, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 60, - "watchers": 190, + "watchers": 191, "score": 0 }, { @@ -1538,10 +1538,10 @@ "description": "Spring Cloud Gateway远程代码执行", "fork": false, "created_at": "2022-10-29T03:28:55Z", - "updated_at": "2022-10-29T09:26:17Z", + "updated_at": "2022-10-29T16:45:01Z", "pushed_at": "2022-10-29T04:34:21Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -1549,7 +1549,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index cd38fbb666..041c819ba3 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -688,10 +688,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2022-10-29T07:47:24Z", + "updated_at": "2022-10-29T17:05:05Z", "pushed_at": "2022-10-28T14:26:56Z", - "stargazers_count": 563, - "watchers_count": 563, + "stargazers_count": 564, + "watchers_count": 564, "forks_count": 60, "allow_forking": true, "is_template": false, @@ -706,7 +706,7 @@ ], "visibility": "public", "forks": 60, - "watchers": 563, + "watchers": 564, "score": 0 }, { diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json index f1e18599c8..f562cb288b 100644 --- a/2022/CVE-2022-2588.json +++ b/2022/CVE-2022-2588.json @@ -13,10 +13,10 @@ "description": "exploit for CVE-2022-2588", "fork": false, "created_at": "2022-08-11T06:01:24Z", - "updated_at": "2022-10-28T17:55:39Z", + "updated_at": "2022-10-29T14:18:33Z", "pushed_at": "2022-10-27T16:35:08Z", - "stargazers_count": 362, - "watchers_count": 362, + "stargazers_count": 363, + "watchers_count": 363, "forks_count": 47, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 362, + "watchers": 363, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 09cde0145a..f0ea402812 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-10-29T06:02:45Z", + "updated_at": "2022-10-29T13:39:01Z", "pushed_at": "2022-09-29T05:09:10Z", - "stargazers_count": 841, - "watchers_count": 841, + "stargazers_count": 842, + "watchers_count": 842, "forks_count": 147, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 147, - "watchers": 841, + "watchers": 842, "score": 0 }, { @@ -311,10 +311,10 @@ "description": "[CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass.", "fork": false, "created_at": "2022-06-04T11:16:28Z", - "updated_at": "2022-10-26T03:36:45Z", + "updated_at": "2022-10-29T13:42:12Z", "pushed_at": "2022-06-18T09:27:31Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -327,7 +327,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 27, + "watchers": 28, "score": 0 }, { @@ -1111,10 +1111,10 @@ "description": "「💥」CVE-2022-26134 - Confluence Pre-Auth RCE", "fork": false, "created_at": "2022-06-19T13:50:22Z", - "updated_at": "2022-09-21T22:06:43Z", + "updated_at": "2022-10-29T13:43:31Z", "pushed_at": "2022-06-19T14:08:28Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -1131,7 +1131,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 10, + "watchers": 11, "score": 0 }, { @@ -1281,10 +1281,10 @@ "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)", "fork": false, "created_at": "2022-07-05T04:30:42Z", - "updated_at": "2022-09-10T14:31:50Z", + "updated_at": "2022-10-29T13:44:19Z", "pushed_at": "2022-08-21T04:13:32Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -1297,7 +1297,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0 }, { @@ -1491,10 +1491,10 @@ "description": "远程攻击者在Confluence未经身份验证的情况下,可构造OGNL表达式进行注入,实现在Confluence Server或Data Center上执行任意代码,在现有脚本上修改了poc,方便getshell。", "fork": false, "created_at": "2022-07-23T14:38:11Z", - "updated_at": "2022-08-05T06:45:59Z", + "updated_at": "2022-10-29T13:45:18Z", "pushed_at": "2022-07-25T05:51:13Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -1505,7 +1505,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0 }, { diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json index ad28f16510..f386b4b136 100644 --- a/2022/CVE-2022-27925.json +++ b/2022/CVE-2022-27925.json @@ -276,10 +276,10 @@ "description": "A loader for zimbra 2022 rce (cve-2022-27925)", "fork": false, "created_at": "2022-10-01T10:33:55Z", - "updated_at": "2022-10-17T15:17:27Z", + "updated_at": "2022-10-29T12:31:31Z", "pushed_at": "2022-10-25T14:20:58Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -293,7 +293,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2022/CVE-2022-2992.json b/2022/CVE-2022-2992.json index 732180d4c7..0b3c4a2919 100644 --- a/2022/CVE-2022-2992.json +++ b/2022/CVE-2022-2992.json @@ -13,18 +13,18 @@ "description": "Authenticated Remote Command Execution in Gitlab via GitHub import", "fork": false, "created_at": "2022-10-08T11:42:49Z", - "updated_at": "2022-10-26T08:38:23Z", + "updated_at": "2022-10-29T15:38:07Z", "pushed_at": "2022-10-09T03:54:53Z", - "stargazers_count": 178, - "watchers_count": 178, - "forks_count": 28, + "stargazers_count": 179, + "watchers_count": 179, + "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 28, - "watchers": 178, + "forks": 29, + "watchers": 179, "score": 0 }, { diff --git a/2022/CVE-2022-33891.json b/2022/CVE-2022-33891.json index 9cd1cdb9fd..825a9d0878 100644 --- a/2022/CVE-2022-33891.json +++ b/2022/CVE-2022-33891.json @@ -43,10 +43,10 @@ "description": "Apache Spark Shell Command Injection Vulnerability", "fork": false, "created_at": "2022-07-19T18:52:12Z", - "updated_at": "2022-10-25T03:58:40Z", + "updated_at": "2022-10-29T13:28:26Z", "pushed_at": "2022-09-07T18:12:27Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 73, + "watchers_count": 73, "forks_count": 15, "allow_forking": true, "is_template": false, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 74, + "watchers": 73, "score": 0 }, { diff --git a/2022/CVE-2022-34718.json b/2022/CVE-2022-34718.json index a25b31ed2d..f3c9bd6a24 100644 --- a/2022/CVE-2022-34718.json +++ b/2022/CVE-2022-34718.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-10-03T11:39:25Z", - "updated_at": "2022-10-29T09:50:45Z", + "updated_at": "2022-10-29T14:06:01Z", "pushed_at": "2022-10-10T08:57:29Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 12, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 27, + "watchers": 28, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json index b949fb961c..63f3b5014d 100644 --- a/2022/CVE-2022-36804.json +++ b/2022/CVE-2022-36804.json @@ -252,10 +252,10 @@ "description": "You can find a python script to exploit the vulnerability on Bitbucket related CVE-2022-36804.", "fork": false, "created_at": "2022-09-24T05:04:30Z", - "updated_at": "2022-10-25T02:28:57Z", + "updated_at": "2022-10-29T14:46:02Z", "pushed_at": "2022-10-25T02:39:33Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -263,7 +263,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -313,10 +313,10 @@ "description": "A loader for bitbucket 2022 rce (cve-2022-36804)", "fork": false, "created_at": "2022-09-26T08:35:31Z", - "updated_at": "2022-10-25T10:33:34Z", + "updated_at": "2022-10-29T12:31:30Z", "pushed_at": "2022-10-01T13:03:43Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -331,7 +331,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 12, + "watchers": 13, "score": 0 }, { diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index 48456a21c0..5784d79785 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -277,13 +277,13 @@ "pushed_at": "2022-10-25T05:32:54Z", "stargazers_count": 263, "watchers_count": 263, - "forks_count": 66, + "forks_count": 67, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 66, + "forks": 67, "watchers": 263, "score": 0 }, diff --git a/2022/CVE-2022-41852.json b/2022/CVE-2022-41852.json index 9da3433ab9..a151f5eb8e 100644 --- a/2022/CVE-2022-41852.json +++ b/2022/CVE-2022-41852.json @@ -13,10 +13,10 @@ "description": "CVE-2022-41852 Proof of Concept (unofficial)", "fork": false, "created_at": "2022-10-14T12:09:19Z", - "updated_at": "2022-10-29T05:40:45Z", + "updated_at": "2022-10-29T14:41:06Z", "pushed_at": "2022-10-20T08:01:38Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "forks_count": 12, "allow_forking": true, "is_template": false, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 54, + "watchers": 55, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index 426e0d6a08..c28aa03bf2 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -232,7 +232,7 @@ "pushed_at": "2022-10-28T15:47:35Z", "stargazers_count": 27, "watchers_count": 27, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -250,7 +250,7 @@ "security-tools" ], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 27, "score": 0 }, @@ -272,13 +272,13 @@ "pushed_at": "2022-10-20T12:51:08Z", "stargazers_count": 36, "watchers_count": 36, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 36, "score": 0 }, @@ -362,13 +362,13 @@ "pushed_at": "2022-10-20T20:03:36Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 5, "score": 0 }, diff --git a/README.md b/README.md index 33a49c8743..5d1e9dfb67 100644 --- a/README.md +++ b/README.md @@ -26287,6 +26287,7 @@ Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functio - [eSentire/cve-2015-7547-public](https://github.com/eSentire/cve-2015-7547-public) - [bluebluelan/CVE-2015-7547-proj-master](https://github.com/bluebluelan/CVE-2015-7547-proj-master) - [miracle03/CVE-2015-7547-master](https://github.com/miracle03/CVE-2015-7547-master) +- [Stick-U235/CVE-2015-7547-Research](https://github.com/Stick-U235/CVE-2015-7547-Research) - [Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547](https://github.com/Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547) ### CVE-2015-7755 (2015-12-19)