From 6f526bf7ad293c1284a352143eda41940a98a6db Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 11 Apr 2023 21:32:12 +0900 Subject: [PATCH] Auto Update 2023/04/11 12:32:12 --- 2016/CVE-2016-0638.json | 8 ++++---- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-8174.json | 4 ++-- 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-18370.json | 31 +++++++++++++++++++++++++++++++ 2019/CVE-2019-2618.json | 8 ++++---- 2019/CVE-2019-8943.json | 4 ++-- 2020/CVE-2020-0609.json | 4 ++-- 2020/CVE-2020-13933.json | 8 ++++---- 2020/CVE-2020-14882.json | 37 +++++++++++++++++++++++++++++++++---- 2020/CVE-2020-15368.json | 8 ++++---- 2020/CVE-2020-1938.json | 8 ++++---- 2020/CVE-2020-2551.json | 8 ++++---- 2020/CVE-2020-9496.json | 8 ++++---- 2021/CVE-2021-22204.json | 16 ++++++++-------- 2021/CVE-2021-22205.json | 8 ++++---- 2021/CVE-2021-3560.json | 4 ++-- 2021/CVE-2021-42278.json | 16 ++++++++-------- 2021/CVE-2021-44228.json | 4 ++-- 2022/CVE-2022-2185.json | 2 +- 2022/CVE-2022-21894.json | 8 ++++---- 2022/CVE-2022-21907.json | 8 ++++---- 2022/CVE-2022-22965.json | 16 ++++++++-------- 2022/CVE-2022-27666.json | 8 ++++---- 2022/CVE-2022-27925.json | 8 ++++---- 2022/CVE-2022-39197.json | 8 ++++---- 2022/CVE-2022-44268.json | 4 ++-- 2022/CVE-2022-46169.json | 12 ++++++------ 2023/CVE-2023-0179.json | 12 ++++++------ 2023/CVE-2023-21608.json | 8 ++++---- 2023/CVE-2023-23397.json | 4 ++-- 2023/CVE-2023-23638.json | 8 ++++---- 2023/CVE-2023-24055.json | 8 ++++---- 2023/CVE-2023-26852.json | 31 +++++++++++++++++++++++++++++++ 2023/CVE-2023-26976.json | 31 +++++++++++++++++++++++++++++++ 2023/CVE-2023-27703.json | 2 +- 2023/CVE-2023-27704.json | 31 +++++++++++++++++++++++++++++++ 2023/CVE-2023-28434.json | 8 ++++---- 2023/CVE-2023-29017.json | 12 ++++++------ 2023/CVE-2023-30459.json | 14 +++++++------- README.md | 23 +++++++++++++++++++++++ 42 files changed, 325 insertions(+), 149 deletions(-) create mode 100644 2019/CVE-2019-18370.json create mode 100644 2023/CVE-2023-26852.json create mode 100644 2023/CVE-2023-26976.json create mode 100644 2023/CVE-2023-27704.json diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 296b59ece9..d6e835d5ac 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-10T21:46:09Z", + "updated_at": "2023-04-11T11:49:01Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1662, - "watchers_count": 1662, + "stargazers_count": 1663, + "watchers_count": 1663, "has_discussions": false, "forks_count": 324, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 324, - "watchers": 1662, + "watchers": 1663, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index c819285810..927a68e58f 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-10T21:46:09Z", + "updated_at": "2023-04-11T11:49:01Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1662, - "watchers_count": 1662, + "stargazers_count": 1663, + "watchers_count": 1663, "has_discussions": false, "forks_count": 324, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 324, - "watchers": 1662, + "watchers": 1663, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 05b114a9f2..16e9a48436 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,10 +568,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-10T21:46:09Z", + "updated_at": "2023-04-11T11:49:01Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1662, - "watchers_count": 1662, + "stargazers_count": 1663, + "watchers_count": 1663, "has_discussions": false, "forks_count": 324, "allow_forking": true, @@ -601,7 +601,7 @@ ], "visibility": "public", "forks": 324, - "watchers": 1662, + "watchers": 1663, "score": 0 }, { diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json index 67d0e169a3..b1289d661d 100644 --- a/2018/CVE-2018-8174.json +++ b/2018/CVE-2018-8174.json @@ -47,13 +47,13 @@ "stargazers_count": 137, "watchers_count": 137, "has_discussions": false, - "forks_count": 70, + "forks_count": 71, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 70, + "forks": 71, "watchers": 137, "score": 0 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index c32c0ee42d..43e1ff0b35 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -42,10 +42,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-04-09T03:40:06Z", + "updated_at": "2023-04-11T11:52:45Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3716, - "watchers_count": 3716, + "stargazers_count": 3717, + "watchers_count": 3717, "has_discussions": false, "forks_count": 1072, "allow_forking": true, @@ -74,7 +74,7 @@ ], "visibility": "public", "forks": 1072, - "watchers": 3716, + "watchers": 3717, "score": 0 }, { diff --git a/2019/CVE-2019-18370.json b/2019/CVE-2019-18370.json new file mode 100644 index 0000000000..a848ca03fe --- /dev/null +++ b/2019/CVE-2019-18370.json @@ -0,0 +1,31 @@ +[ + { + "id": 626379744, + "name": "CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis", + "full_name": "FzBacon\/CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis", + "owner": { + "login": "FzBacon", + "id": 48304150, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48304150?v=4", + "html_url": "https:\/\/github.com\/FzBacon" + }, + "html_url": "https:\/\/github.com\/FzBacon\/CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis", + "description": null, + "fork": false, + "created_at": "2023-04-11T10:58:30Z", + "updated_at": "2023-04-11T10:58:30Z", + "pushed_at": "2023-04-11T11:01:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 3f583a55d7..9d4627496e 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -187,10 +187,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-10T21:46:09Z", + "updated_at": "2023-04-11T11:49:01Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1662, - "watchers_count": 1662, + "stargazers_count": 1663, + "watchers_count": 1663, "has_discussions": false, "forks_count": 324, "allow_forking": true, @@ -220,7 +220,7 @@ ], "visibility": "public", "forks": 324, - "watchers": 1662, + "watchers": 1663, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-8943.json b/2019/CVE-2019-8943.json index f97ec24a3e..b124b1fb1f 100644 --- a/2019/CVE-2019-8943.json +++ b/2019/CVE-2019-8943.json @@ -47,13 +47,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index 7ebc91bd39..f628200617 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -47,7 +47,7 @@ "stargazers_count": 254, "watchers_count": 254, "has_discussions": false, - "forks_count": 80, + "forks_count": 81, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -56,7 +56,7 @@ "cve-2020-0610" ], "visibility": "public", - "forks": 80, + "forks": 81, "watchers": 254, "score": 0 }, diff --git a/2020/CVE-2020-13933.json b/2020/CVE-2020-13933.json index 069e0248ec..20aaa8ecc4 100644 --- a/2020/CVE-2020-13933.json +++ b/2020/CVE-2020-13933.json @@ -13,10 +13,10 @@ "description": "CVE-2020-13933 靶场: shiro 认证绕过漏洞", "fork": false, "created_at": "2020-09-09T10:20:25Z", - "updated_at": "2023-01-24T11:26:49Z", + "updated_at": "2023-04-11T06:45:19Z", "pushed_at": "2023-04-09T02:44:24Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 12, + "watchers": 13, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 4edc1fec4f..77f0528caf 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-04-09T03:40:06Z", + "updated_at": "2023-04-11T11:52:45Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3716, - "watchers_count": 3716, + "stargazers_count": 3717, + "watchers_count": 3717, "has_discussions": false, "forks_count": 1072, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1072, - "watchers": 3716, + "watchers": 3717, "score": 0 }, { @@ -859,5 +859,34 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 626325185, + "name": "CVE-2020-14882", + "full_name": "nik0nz7\/CVE-2020-14882", + "owner": { + "login": "nik0nz7", + "id": 130441760, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130441760?v=4", + "html_url": "https:\/\/github.com\/nik0nz7" + }, + "html_url": "https:\/\/github.com\/nik0nz7\/CVE-2020-14882", + "description": null, + "fork": false, + "created_at": "2023-04-11T08:38:47Z", + "updated_at": "2023-04-11T08:39:22Z", + "pushed_at": "2023-04-11T08:39:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index ae6baa0a51..19c0b899fd 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -13,10 +13,10 @@ "description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"", "fork": false, "created_at": "2021-06-29T04:38:24Z", - "updated_at": "2023-04-09T21:51:01Z", + "updated_at": "2023-04-11T07:56:04Z", "pushed_at": "2022-04-14T03:17:44Z", - "stargazers_count": 366, - "watchers_count": 366, + "stargazers_count": 367, + "watchers_count": 367, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 43, - "watchers": 366, + "watchers": 367, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 52d88ae938..a44149bdb9 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -889,10 +889,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2023-04-07T07:32:16Z", + "updated_at": "2023-04-11T12:15:24Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -901,7 +901,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 54, + "watchers": 55, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 45762ec2db..99d9cffcf4 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-04-10T21:46:09Z", + "updated_at": "2023-04-11T11:49:01Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1662, - "watchers_count": 1662, + "stargazers_count": 1663, + "watchers_count": 1663, "has_discussions": false, "forks_count": 324, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 324, - "watchers": 1662, + "watchers": 1663, "score": 0 }, { diff --git a/2020/CVE-2020-9496.json b/2020/CVE-2020-9496.json index 1fa8438fb2..014ba78dc8 100644 --- a/2020/CVE-2020-9496.json +++ b/2020/CVE-2020-9496.json @@ -216,10 +216,10 @@ "description": "ApacheOfBiz 17.12.01 - Unauthorized Remote Code Executión ", "fork": false, "created_at": "2022-08-15T18:15:11Z", - "updated_at": "2022-08-18T04:53:14Z", + "updated_at": "2023-04-11T10:38:18Z", "pushed_at": "2022-08-20T18:07:16Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -228,7 +228,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index b3aeb65211..aa8a57bb6d 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -13,10 +13,10 @@ "description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool", "fork": false, "created_at": "2021-05-11T18:45:07Z", - "updated_at": "2023-04-01T19:29:56Z", + "updated_at": "2023-04-11T11:18:17Z", "pushed_at": "2021-05-20T21:42:43Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 77, + "watchers_count": 77, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 31, - "watchers": 75, + "watchers": 77, "score": 0 }, { @@ -132,10 +132,10 @@ "description": null, "fork": false, "created_at": "2021-08-02T18:56:16Z", - "updated_at": "2023-03-02T14:46:34Z", + "updated_at": "2023-04-11T10:54:01Z", "pushed_at": "2021-10-26T16:51:48Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -144,7 +144,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 26, + "watchers": 27, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index b0137f8bc2..188eba9f5e 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -452,10 +452,10 @@ "description": "GitLab CE\/EE Preauth RCE using ExifTool", "fork": false, "created_at": "2021-11-11T04:34:07Z", - "updated_at": "2023-04-05T08:53:18Z", + "updated_at": "2023-04-11T11:56:53Z", "pushed_at": "2022-01-16T15:54:14Z", - "stargazers_count": 168, - "watchers_count": 168, + "stargazers_count": 169, + "watchers_count": 169, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -471,7 +471,7 @@ ], "visibility": "public", "forks": 35, - "watchers": 168, + "watchers": 169, "score": 0 }, { diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 97186ea268..747995b0e6 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -143,13 +143,13 @@ "stargazers_count": 85, "watchers_count": 85, "has_discussions": false, - "forks_count": 56, + "forks_count": 55, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 56, + "forks": 55, "watchers": 85, "score": 0 }, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 7357d4db14..627334fb35 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2023-04-07T01:24:42Z", + "updated_at": "2023-04-11T09:38:15Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 890, - "watchers_count": 890, + "stargazers_count": 891, + "watchers_count": 891, "has_discussions": false, "forks_count": 185, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 185, - "watchers": 890, + "watchers": 891, "score": 0 }, { @@ -47,10 +47,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2023-04-10T18:19:35Z", + "updated_at": "2023-04-11T10:46:49Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 561, - "watchers_count": 561, + "stargazers_count": 562, + "watchers_count": 562, "has_discussions": false, "forks_count": 101, "allow_forking": true, @@ -59,7 +59,7 @@ "topics": [], "visibility": "public", "forks": 101, - "watchers": 561, + "watchers": 562, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 247efdc806..e94ce59ec5 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -3652,13 +3652,13 @@ "stargazers_count": 3224, "watchers_count": 3224, "has_discussions": true, - "forks_count": 747, + "forks_count": 746, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 747, + "forks": 746, "watchers": 3224, "score": 0 }, diff --git a/2022/CVE-2022-2185.json b/2022/CVE-2022-2185.json index 0eee7ffc37..43f07331f0 100644 --- a/2022/CVE-2022-2185.json +++ b/2022/CVE-2022-2185.json @@ -42,7 +42,7 @@ "description": "wo ee cve-2022-2185 gitlab authenticated rce", "fork": false, "created_at": "2022-07-29T11:14:03Z", - "updated_at": "2023-04-11T01:55:22Z", + "updated_at": "2023-04-11T10:30:40Z", "pushed_at": "2022-07-29T11:28:59Z", "stargazers_count": 71, "watchers_count": 71, diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index 1a2f2c25ed..372b7a4881 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -13,10 +13,10 @@ "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "fork": false, "created_at": "2022-08-09T15:53:48Z", - "updated_at": "2023-04-09T01:36:21Z", + "updated_at": "2023-04-11T08:16:34Z", "pushed_at": "2023-03-02T19:43:36Z", - "stargazers_count": 198, - "watchers_count": 198, + "stargazers_count": 199, + "watchers_count": 199, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 43, - "watchers": 198, + "watchers": 199, "score": 0 }, { diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index 04f822c58a..6cda04fcee 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -337,10 +337,10 @@ "description": "POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.", "fork": false, "created_at": "2022-10-29T18:25:26Z", - "updated_at": "2023-02-10T09:21:10Z", + "updated_at": "2023-04-11T11:25:15Z", "pushed_at": "2022-12-09T13:44:00Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -360,7 +360,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index e1ecc14481..c05e570624 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -13,10 +13,10 @@ "description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965", "fork": false, "created_at": "2022-03-30T07:54:45Z", - "updated_at": "2023-04-05T21:08:53Z", + "updated_at": "2023-04-11T10:58:38Z", "pushed_at": "2022-11-09T15:46:06Z", - "stargazers_count": 322, - "watchers_count": 322, + "stargazers_count": 323, + "watchers_count": 323, "has_discussions": false, "forks_count": 104, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 104, - "watchers": 322, + "watchers": 323, "score": 0 }, { @@ -1434,10 +1434,10 @@ "description": "CVE-2022-22965 pocsuite3 POC", "fork": false, "created_at": "2022-04-07T02:30:26Z", - "updated_at": "2022-08-17T13:34:38Z", + "updated_at": "2023-04-11T11:56:18Z", "pushed_at": "2022-04-07T02:31:28Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1446,7 +1446,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0 }, { diff --git a/2022/CVE-2022-27666.json b/2022/CVE-2022-27666.json index 34ee517bdd..066aebc65c 100644 --- a/2022/CVE-2022-27666.json +++ b/2022/CVE-2022-27666.json @@ -42,10 +42,10 @@ "description": "There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how to use these code bases please check my blog.", "fork": false, "created_at": "2023-04-11T00:12:33Z", - "updated_at": "2023-04-11T00:27:27Z", + "updated_at": "2023-04-11T11:56:57Z", "pushed_at": "2023-04-11T00:27:37Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json index 4496298117..00e2a2375f 100644 --- a/2022/CVE-2022-27925.json +++ b/2022/CVE-2022-27925.json @@ -134,10 +134,10 @@ "description": "Zimbra CVE-2022-27925 PoC", "fork": false, "created_at": "2022-08-20T15:58:29Z", - "updated_at": "2023-04-05T02:31:28Z", + "updated_at": "2023-04-11T10:35:34Z", "pushed_at": "2022-08-27T20:30:21Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -152,7 +152,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 33, + "watchers": 34, "score": 0 }, { diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index 8760e1d529..ec4d2789f1 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -311,10 +311,10 @@ "description": "CobaltStrike <= 4.7.1 RCE", "fork": false, "created_at": "2022-10-14T11:46:01Z", - "updated_at": "2023-03-28T11:57:53Z", + "updated_at": "2023-04-11T10:29:19Z", "pushed_at": "2022-10-25T05:32:54Z", - "stargazers_count": 315, - "watchers_count": 315, + "stargazers_count": 316, + "watchers_count": 316, "has_discussions": false, "forks_count": 81, "allow_forking": true, @@ -323,7 +323,7 @@ "topics": [], "visibility": "public", "forks": 81, - "watchers": 315, + "watchers": 316, "score": 0 }, { diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index ddc655e05d..edd486c3b0 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -195,13 +195,13 @@ "stargazers_count": 140, "watchers_count": 140, "has_discussions": false, - "forks_count": 21, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 21, + "forks": 22, "watchers": 140, "score": 0 }, diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json index 984a14f525..e8db082dfd 100644 --- a/2022/CVE-2022-46169.json +++ b/2022/CVE-2022-46169.json @@ -402,19 +402,19 @@ "description": "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0", "fork": false, "created_at": "2023-04-07T23:40:53Z", - "updated_at": "2023-04-07T23:44:02Z", + "updated_at": "2023-04-11T08:16:52Z", "pushed_at": "2023-04-09T11:02:59Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-0179.json b/2023/CVE-2023-0179.json index 1c9f44628f..76941ff085 100644 --- a/2023/CVE-2023-0179.json +++ b/2023/CVE-2023-0179.json @@ -42,19 +42,19 @@ "description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。", "fork": false, "created_at": "2023-03-16T02:20:52Z", - "updated_at": "2023-04-11T06:28:06Z", + "updated_at": "2023-04-11T11:34:28Z", "pushed_at": "2023-03-16T02:22:28Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 84, + "watchers_count": 84, "has_discussions": false, - "forks_count": 8, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 63, + "forks": 14, + "watchers": 84, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21608.json b/2023/CVE-2023-21608.json index f9d5fef440..cd7da32881 100644 --- a/2023/CVE-2023-21608.json +++ b/2023/CVE-2023-21608.json @@ -13,10 +13,10 @@ "description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit", "fork": false, "created_at": "2023-01-30T12:57:48Z", - "updated_at": "2023-04-10T19:33:25Z", + "updated_at": "2023-04-11T07:28:28Z", "pushed_at": "2023-02-27T04:51:20Z", - "stargazers_count": 190, - "watchers_count": 190, + "stargazers_count": 191, + "watchers_count": 191, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -35,7 +35,7 @@ ], "visibility": "public", "forks": 43, - "watchers": 190, + "watchers": 191, "score": 0 }, { diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index effb563136..04ed578ab7 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -173,13 +173,13 @@ "stargazers_count": 284, "watchers_count": 284, "has_discussions": false, - "forks_count": 51, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 51, + "forks": 52, "watchers": 284, "score": 0 }, diff --git a/2023/CVE-2023-23638.json b/2023/CVE-2023-23638.json index 7013dbd63a..911d85444b 100644 --- a/2023/CVE-2023-23638.json +++ b/2023/CVE-2023-23638.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-03-22T11:23:44Z", - "updated_at": "2023-04-03T09:58:19Z", + "updated_at": "2023-04-11T09:14:22Z", "pushed_at": "2023-04-03T10:10:42Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 12, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-24055.json b/2023/CVE-2023-24055.json index 4182aebb55..a6907cd5ad 100644 --- a/2023/CVE-2023-24055.json +++ b/2023/CVE-2023-24055.json @@ -42,10 +42,10 @@ "description": "CVE-2023-24055 PoC (KeePass 2.5x)", "fork": false, "created_at": "2023-01-25T03:21:42Z", - "updated_at": "2023-04-06T09:28:16Z", + "updated_at": "2023-04-11T09:30:39Z", "pushed_at": "2023-02-10T08:03:59Z", - "stargazers_count": 243, - "watchers_count": 243, + "stargazers_count": 244, + "watchers_count": 244, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 243, + "watchers": 244, "score": 0 }, { diff --git a/2023/CVE-2023-26852.json b/2023/CVE-2023-26852.json new file mode 100644 index 0000000000..4598eccf30 --- /dev/null +++ b/2023/CVE-2023-26852.json @@ -0,0 +1,31 @@ +[ + { + "id": 626287396, + "name": "CVE-2023-26852-Textpattern-v4.8.8-and-", + "full_name": "leekenghwa\/CVE-2023-26852-Textpattern-v4.8.8-and-", + "owner": { + "login": "leekenghwa", + "id": 45155253, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45155253?v=4", + "html_url": "https:\/\/github.com\/leekenghwa" + }, + "html_url": "https:\/\/github.com\/leekenghwa\/CVE-2023-26852-Textpattern-v4.8.8-and-", + "description": "Textpattern v4.8.8 and Below are vulnerable to Unrestricted File Upload Leading to Remote Code Execution", + "fork": false, + "created_at": "2023-04-11T07:00:04Z", + "updated_at": "2023-04-11T07:00:04Z", + "pushed_at": "2023-04-11T08:51:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-26976.json b/2023/CVE-2023-26976.json new file mode 100644 index 0000000000..54eab24d4d --- /dev/null +++ b/2023/CVE-2023-26976.json @@ -0,0 +1,31 @@ +[ + { + "id": 626381488, + "name": "CVE-2023-26976_tenda_AC6_stack_overflow", + "full_name": "FzBacon\/CVE-2023-26976_tenda_AC6_stack_overflow", + "owner": { + "login": "FzBacon", + "id": 48304150, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48304150?v=4", + "html_url": "https:\/\/github.com\/FzBacon" + }, + "html_url": "https:\/\/github.com\/FzBacon\/CVE-2023-26976_tenda_AC6_stack_overflow", + "description": null, + "fork": false, + "created_at": "2023-04-11T11:02:48Z", + "updated_at": "2023-04-11T11:05:12Z", + "pushed_at": "2023-04-11T11:05:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-27703.json b/2023/CVE-2023-27703.json index f143977959..69d1093e66 100644 --- a/2023/CVE-2023-27703.json +++ b/2023/CVE-2023-27703.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-04-11T06:24:04Z", "updated_at": "2023-04-11T06:24:04Z", - "pushed_at": "2023-04-11T06:29:30Z", + "pushed_at": "2023-04-11T06:39:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-27704.json b/2023/CVE-2023-27704.json new file mode 100644 index 0000000000..6f7d30c04b --- /dev/null +++ b/2023/CVE-2023-27704.json @@ -0,0 +1,31 @@ +[ + { + "id": 626280876, + "name": "CVE-2023-27704", + "full_name": "happy0717\/CVE-2023-27704", + "owner": { + "login": "happy0717", + "id": 36958703, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36958703?v=4", + "html_url": "https:\/\/github.com\/happy0717" + }, + "html_url": "https:\/\/github.com\/happy0717\/CVE-2023-27704", + "description": "CVE-2023-27704 Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS)", + "fork": false, + "created_at": "2023-04-11T06:41:58Z", + "updated_at": "2023-04-11T06:41:58Z", + "pushed_at": "2023-04-11T06:46:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-28434.json b/2023/CVE-2023-28434.json index d6df1fd36b..c9ff9fc256 100644 --- a/2023/CVE-2023-28434.json +++ b/2023/CVE-2023-28434.json @@ -13,10 +13,10 @@ "description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE", "fork": false, "created_at": "2023-03-27T08:53:04Z", - "updated_at": "2023-04-10T18:43:46Z", + "updated_at": "2023-04-11T07:22:25Z", "pushed_at": "2023-04-04T05:26:59Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 177, + "watchers_count": 177, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 25, - "watchers": 176, + "watchers": 177, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-29017.json b/2023/CVE-2023-29017.json index d5aba7c6e1..80e7b7ec49 100644 --- a/2023/CVE-2023-29017.json +++ b/2023/CVE-2023-29017.json @@ -13,19 +13,19 @@ "description": "Clone from gist", "fork": false, "created_at": "2023-04-07T18:26:25Z", - "updated_at": "2023-04-08T19:00:03Z", + "updated_at": "2023-04-11T08:15:46Z", "pushed_at": "2023-04-07T18:26:38Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 1, "score": 0 }, { diff --git a/2023/CVE-2023-30459.json b/2023/CVE-2023-30459.json index 32c0a7e00a..aa41d613b9 100644 --- a/2023/CVE-2023-30459.json +++ b/2023/CVE-2023-30459.json @@ -1,6 +1,6 @@ [ { - "id": 625925446, + "id": 626384673, "name": "CVE-2023-30459", "full_name": "Toxich4\/CVE-2023-30459", "owner": { @@ -12,11 +12,11 @@ "html_url": "https:\/\/github.com\/Toxich4\/CVE-2023-30459", "description": "CVE-2023-30459", "fork": false, - "created_at": "2023-04-10T12:18:41Z", - "updated_at": "2023-04-10T12:18:41Z", - "pushed_at": "2023-04-10T12:18:41Z", - "stargazers_count": 0, - "watchers_count": 0, + "created_at": "2023-04-11T11:11:29Z", + "updated_at": "2023-04-11T11:23:24Z", + "pushed_at": "2023-04-11T11:17:29Z", + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index fe00767508..f6c644a37d 100644 --- a/README.md +++ b/README.md @@ -596,6 +596,9 @@ ZCBS Zijper Collectie Beheer Systeem (ZCBS), Zijper Publication Management Syste - [bigzooooz/CVE-2023-26692](https://github.com/bigzooooz/CVE-2023-26692) +### CVE-2023-26852 +- [leekenghwa/CVE-2023-26852-Textpattern-v4.8.8-and-](https://github.com/leekenghwa/CVE-2023-26852-Textpattern-v4.8.8-and-) + ### CVE-2023-26866 (2023-04-04) @@ -604,6 +607,14 @@ GreenPacket OH736's WR-1200 Indoor Unit, OT-235 with firmware versions M-IDU-1.6 - [lionelmusonza/CVE-2023-26866](https://github.com/lionelmusonza/CVE-2023-26866) +### CVE-2023-26976 (2023-04-03) + + +Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function. + + +- [FzBacon/CVE-2023-26976_tenda_AC6_stack_overflow](https://github.com/FzBacon/CVE-2023-26976_tenda_AC6_stack_overflow) + ### CVE-2023-26982 (2023-03-29) @@ -663,6 +674,9 @@ ReadtoMyShoe, a web app that lets users upload articles and listen to them later ### CVE-2023-27703 - [happy0717/CVE-2023-27703](https://github.com/happy0717/CVE-2023-27703) +### CVE-2023-27704 +- [happy0717/CVE-2023-27704](https://github.com/happy0717/CVE-2023-27704) + ### CVE-2023-27842 (2023-03-21) @@ -17267,6 +17281,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [N0Coriander/CVE-2020-14882-14883](https://github.com/N0Coriander/CVE-2020-14882-14883) - [Manor99/CVE-2020-14882-](https://github.com/Manor99/CVE-2020-14882-) - [Serendipity-Lucky/CVE-2020-14882_ALL](https://github.com/Serendipity-Lucky/CVE-2020-14882_ALL) +- [nik0nz7/CVE-2020-14882](https://github.com/nik0nz7/CVE-2020-14882) ### CVE-2020-14883 (2020-10-21) @@ -22800,6 +22815,14 @@ An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 - [M-ensimag/CVE-2019-18276](https://github.com/M-ensimag/CVE-2019-18276) - [SABI-Ensimag/CVE-2019-18276](https://github.com/SABI-Ensimag/CVE-2019-18276) +### CVE-2019-18370 (2019-10-23) + + +An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The backup file is in tar.gz format. After uploading, the application uses the tar zxf command to decompress, so one can control the contents of the files in the decompressed directory. In addition, the application's sh script for testing upload and download speeds reads a URL list from /tmp/speedtest_urls.xml, and there is a command injection vulnerability, as demonstrated by api/xqnetdetect/netspeed. + + +- [FzBacon/CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis](https://github.com/FzBacon/CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis) + ### CVE-2019-18371 (2019-10-23)