diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index d4c1c2f4c2..a0c4b476b6 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-08-17T14:50:53Z",
+ "updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1477,
- "watchers_count": 1477,
+ "stargazers_count": 1480,
+ "watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 303,
- "watchers": 1477,
+ "watchers": 1480,
"score": 0
},
{
diff --git a/2015/CVE-2015-3456.json b/2015/CVE-2015-3456.json
index 1ee7dffa54..688017a1fb 100644
--- a/2015/CVE-2015-3456.json
+++ b/2015/CVE-2015-3456.json
@@ -13,18 +13,18 @@
"description": "Experiments related to CVE-2015-3456",
"fork": false,
"created_at": "2015-05-17T20:14:47Z",
- "updated_at": "2020-08-18T07:34:43Z",
+ "updated_at": "2022-08-18T07:17:35Z",
"pushed_at": "2015-05-27T13:58:46Z",
- "stargazers_count": 11,
- "watchers_count": 11,
- "forks_count": 2,
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 11,
+ "forks": 3,
+ "watchers": 12,
"score": 0
},
{
diff --git a/2016/CVE-2016-0051.json b/2016/CVE-2016-0051.json
index 5b26199114..e06e6d6ee1 100644
--- a/2016/CVE-2016-0051.json
+++ b/2016/CVE-2016-0051.json
@@ -13,10 +13,10 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
- "updated_at": "2022-08-12T10:12:07Z",
+ "updated_at": "2022-08-18T09:58:12Z",
"pushed_at": "2016-05-09T17:53:48Z",
- "stargazers_count": 330,
- "watchers_count": 330,
+ "stargazers_count": 329,
+ "watchers_count": 329,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 151,
- "watchers": 330,
+ "watchers": 329,
"score": 0
},
{
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 1ae0da6de7..3709d04d7a 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-08-17T14:50:53Z",
+ "updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1477,
- "watchers_count": 1477,
+ "stargazers_count": 1480,
+ "watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 303,
- "watchers": 1477,
+ "watchers": 1480,
"score": 0
},
{
diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json
index dca4ad0afd..500dbb60de 100644
--- a/2016/CVE-2016-5195.json
+++ b/2016/CVE-2016-5195.json
@@ -69,10 +69,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
- "updated_at": "2022-06-26T22:05:36Z",
+ "updated_at": "2022-08-18T08:28:09Z",
"pushed_at": "2021-02-03T16:03:40Z",
- "stargazers_count": 902,
- "watchers_count": 902,
+ "stargazers_count": 903,
+ "watchers_count": 903,
"forks_count": 410,
"allow_forking": true,
"is_template": false,
@@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 410,
- "watchers": 902,
+ "watchers": 903,
"score": 0
},
{
@@ -419,10 +419,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
- "updated_at": "2022-08-18T02:07:50Z",
+ "updated_at": "2022-08-18T08:30:00Z",
"pushed_at": "2021-04-08T11:35:12Z",
- "stargazers_count": 629,
- "watchers_count": 629,
+ "stargazers_count": 630,
+ "watchers_count": 630,
"forks_count": 400,
"allow_forking": true,
"is_template": false,
@@ -434,7 +434,7 @@
],
"visibility": "public",
"forks": 400,
- "watchers": 629,
+ "watchers": 630,
"score": 0
},
{
diff --git a/2017/CVE-2017-0213.json b/2017/CVE-2017-0213.json
index 48dc763da1..bfb500ac85 100644
--- a/2017/CVE-2017-0213.json
+++ b/2017/CVE-2017-0213.json
@@ -27,6 +27,34 @@
"watchers": 1,
"score": 0
},
+ {
+ "id": 95974378,
+ "name": "CVE-2017-0213",
+ "full_name": "zcgonvh\/CVE-2017-0213",
+ "owner": {
+ "login": "zcgonvh",
+ "id": 25787677,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
+ "html_url": "https:\/\/github.com\/zcgonvh"
+ },
+ "html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
+ "description": "CVE-2017-0213 for command line",
+ "fork": false,
+ "created_at": "2017-07-01T16:07:04Z",
+ "updated_at": "2022-06-16T11:45:53Z",
+ "pushed_at": "2017-07-01T16:19:12Z",
+ "stargazers_count": 59,
+ "watchers_count": 59,
+ "forks_count": 25,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 25,
+ "watchers": 59,
+ "score": 0
+ },
{
"id": 105444160,
"name": "CVE-2017-0213",
diff --git a/2017/CVE-2017-3241.json b/2017/CVE-2017-3241.json
index 349aa795a9..8451549aa1 100644
--- a/2017/CVE-2017-3241.json
+++ b/2017/CVE-2017-3241.json
@@ -1,4 +1,32 @@
[
+ {
+ "id": 96219146,
+ "name": "CVE-2017-3241-POC",
+ "full_name": "xfei3\/CVE-2017-3241-POC",
+ "owner": {
+ "login": "xfei3",
+ "id": 29874084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29874084?v=4",
+ "html_url": "https:\/\/github.com\/xfei3"
+ },
+ "html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC",
+ "description": "POC for java RMI deserialization vulnerability",
+ "fork": false,
+ "created_at": "2017-07-04T13:05:46Z",
+ "updated_at": "2020-03-29T07:05:46Z",
+ "pushed_at": "2017-07-19T23:55:49Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0
+ },
{
"id": 419955901,
"name": "CVE-2017-3241",
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 2cdf14c748..0c1f946c1c 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-08-17T14:50:53Z",
+ "updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1477,
- "watchers_count": 1477,
+ "stargazers_count": 1480,
+ "watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 303,
- "watchers": 1477,
+ "watchers": 1480,
"score": 0
},
{
diff --git a/2017/CVE-2017-4490.json b/2017/CVE-2017-4490.json
index c9c1bd32f9..e5acdc4784 100644
--- a/2017/CVE-2017-4490.json
+++ b/2017/CVE-2017-4490.json
@@ -26,5 +26,33 @@
"forks": 2,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 96573883,
+ "name": "CVE-2017-4490-install-Script-Python-in-Terminal-",
+ "full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
+ "owner": {
+ "login": "homjxi0e",
+ "id": 25440152,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
+ "html_url": "https:\/\/github.com\/homjxi0e"
+ },
+ "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
+ "description": null,
+ "fork": false,
+ "created_at": "2017-07-07T20:21:51Z",
+ "updated_at": "2017-08-23T09:24:55Z",
+ "pushed_at": "2017-07-11T15:36:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-5487.json b/2017/CVE-2017-5487.json
index bcc27b9112..ecb62e7943 100644
--- a/2017/CVE-2017-5487.json
+++ b/2017/CVE-2017-5487.json
@@ -1,4 +1,32 @@
[
+ {
+ "id": 107852472,
+ "name": "wpUsersScan",
+ "full_name": "teambugsbunny\/wpUsersScan",
+ "owner": {
+ "login": "teambugsbunny",
+ "id": 32997799,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32997799?v=4",
+ "html_url": "https:\/\/github.com\/teambugsbunny"
+ },
+ "html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan",
+ "description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
+ "fork": false,
+ "created_at": "2017-10-22T09:22:28Z",
+ "updated_at": "2020-04-06T12:23:41Z",
+ "pushed_at": "2017-06-11T16:47:07Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 1,
+ "score": 0
+ },
{
"id": 121831599,
"name": "wpUsersScan",
diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json
index e1f1f75d4a..3248574d39 100644
--- a/2017/CVE-2017-5638.json
+++ b/2017/CVE-2017-5638.json
@@ -1068,6 +1068,34 @@
"watchers": 15,
"score": 0
},
+ {
+ "id": 98150795,
+ "name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
+ "full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
+ "owner": {
+ "login": "R4v3nBl4ck",
+ "id": 30399308,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30399308?v=4",
+ "html_url": "https:\/\/github.com\/R4v3nBl4ck"
+ },
+ "html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
+ "description": "Exploit created by: R4v3nBl4ck end Pacman",
+ "fork": false,
+ "created_at": "2017-07-24T05:05:28Z",
+ "updated_at": "2020-07-12T14:06:08Z",
+ "pushed_at": "2017-07-24T23:55:01Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0
+ },
{
"id": 100141854,
"name": "CVE-2017-5638",
@@ -1183,6 +1211,34 @@
"watchers": 0,
"score": 0
},
+ {
+ "id": 107489354,
+ "name": "Apache-Struts",
+ "full_name": "c002\/Apache-Struts",
+ "owner": {
+ "login": "c002",
+ "id": 26592580,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26592580?v=4",
+ "html_url": "https:\/\/github.com\/c002"
+ },
+ "html_url": "https:\/\/github.com\/c002\/Apache-Struts",
+ "description": " An exploit for Apache Struts CVE-2017-5638",
+ "fork": false,
+ "created_at": "2017-10-19T02:40:45Z",
+ "updated_at": "2020-05-17T04:32:06Z",
+ "pushed_at": "2017-05-28T14:03:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
{
"id": 108805305,
"name": "Common-Vulnerability-and-Exploit",
diff --git a/2017/CVE-2017-5689.json b/2017/CVE-2017-5689.json
index e3e32acff6..5ad4b21435 100644
--- a/2017/CVE-2017-5689.json
+++ b/2017/CVE-2017-5689.json
@@ -83,6 +83,34 @@
"watchers": 3,
"score": 0
},
+ {
+ "id": 98579784,
+ "name": "amt_auth_bypass_poc",
+ "full_name": "embedi\/amt_auth_bypass_poc",
+ "owner": {
+ "login": "embedi",
+ "id": 24190344,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
+ "html_url": "https:\/\/github.com\/embedi"
+ },
+ "html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
+ "description": "CVE-2017-5689 Proof-of-Concept exploit",
+ "fork": false,
+ "created_at": "2017-07-27T21:06:08Z",
+ "updated_at": "2022-03-06T01:51:18Z",
+ "pushed_at": "2017-07-27T21:08:49Z",
+ "stargazers_count": 53,
+ "watchers_count": 53,
+ "forks_count": 16,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 16,
+ "watchers": 53,
+ "score": 0
+ },
{
"id": 385968702,
"name": "CVE-2017-5689-Checker",
diff --git a/2017/CVE-2017-7047.json b/2017/CVE-2017-7047.json
new file mode 100644
index 0000000000..f89753be3e
--- /dev/null
+++ b/2017/CVE-2017-7047.json
@@ -0,0 +1,58 @@
+[
+ {
+ "id": 99396176,
+ "name": "Triple_Fetch-Kernel-Creds",
+ "full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds",
+ "owner": {
+ "login": "JosephShenton",
+ "id": 12966231,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12966231?v=4",
+ "html_url": "https:\/\/github.com\/JosephShenton"
+ },
+ "html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds",
+ "description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)",
+ "fork": false,
+ "created_at": "2017-08-05T03:23:13Z",
+ "updated_at": "2020-08-25T15:10:04Z",
+ "pushed_at": "2017-08-05T09:21:56Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 4,
+ "score": 0
+ },
+ {
+ "id": 99915573,
+ "name": "Triple_fetch",
+ "full_name": "q1f3\/Triple_fetch",
+ "owner": {
+ "login": "q1f3",
+ "id": 9603950,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9603950?v=4",
+ "html_url": "https:\/\/github.com\/q1f3"
+ },
+ "html_url": "https:\/\/github.com\/q1f3\/Triple_fetch",
+ "description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.",
+ "fork": false,
+ "created_at": "2017-08-10T11:24:47Z",
+ "updated_at": "2020-04-07T05:58:43Z",
+ "pushed_at": "2017-08-03T23:47:30Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 1,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json
index 43b33e74a0..2f1caa05ac 100644
--- a/2017/CVE-2017-7269.json
+++ b/2017/CVE-2017-7269.json
@@ -368,6 +368,34 @@
"watchers": 12,
"score": 0
},
+ {
+ "id": 201442014,
+ "name": "CVE-2017-7269",
+ "full_name": "ThanHuuTuan\/CVE-2017-7269",
+ "owner": {
+ "login": "ThanHuuTuan",
+ "id": 32167814,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
+ "html_url": "https:\/\/github.com\/ThanHuuTuan"
+ },
+ "html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
+ "description": null,
+ "fork": false,
+ "created_at": "2019-08-09T10:01:50Z",
+ "updated_at": "2019-08-09T10:01:53Z",
+ "pushed_at": "2017-04-04T17:20:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
{
"id": 386542444,
"name": "CVE-2017-7269",
diff --git a/2017/CVE-2017-7529.json b/2017/CVE-2017-7529.json
index 8b31860430..c5d0e12793 100644
--- a/2017/CVE-2017-7529.json
+++ b/2017/CVE-2017-7529.json
@@ -1,4 +1,32 @@
[
+ {
+ "id": 97701175,
+ "name": "CVE-2017-7529",
+ "full_name": "liusec\/CVE-2017-7529",
+ "owner": {
+ "login": "liusec",
+ "id": 13982415,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4",
+ "html_url": "https:\/\/github.com\/liusec"
+ },
+ "html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529",
+ "description": null,
+ "fork": false,
+ "created_at": "2017-07-19T09:55:42Z",
+ "updated_at": "2022-05-13T08:51:10Z",
+ "pushed_at": "2017-07-21T06:29:35Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "forks_count": 8,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 8,
+ "watchers": 14,
+ "score": 0
+ },
{
"id": 138050203,
"name": "CVE-2017-7529_PoC",
diff --git a/2017/CVE-2017-9791.json b/2017/CVE-2017-9791.json
index 6d474902ff..fb225b2090 100644
--- a/2017/CVE-2017-9791.json
+++ b/2017/CVE-2017-9791.json
@@ -1,4 +1,60 @@
[
+ {
+ "id": 96536969,
+ "name": "s2-048",
+ "full_name": "IanSmith123\/s2-048",
+ "owner": {
+ "login": "IanSmith123",
+ "id": 19611084,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19611084?v=4",
+ "html_url": "https:\/\/github.com\/IanSmith123"
+ },
+ "html_url": "https:\/\/github.com\/IanSmith123\/s2-048",
+ "description": "Apache struts struts 2 048, CVE-2017-9791.",
+ "fork": false,
+ "created_at": "2017-07-07T12:35:55Z",
+ "updated_at": "2017-07-07T14:05:07Z",
+ "pushed_at": "2017-07-07T17:10:50Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0
+ },
+ {
+ "id": 96565902,
+ "name": "Struts2-048",
+ "full_name": "dragoneeg\/Struts2-048",
+ "owner": {
+ "login": "dragoneeg",
+ "id": 4232461,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4232461?v=4",
+ "html_url": "https:\/\/github.com\/dragoneeg"
+ },
+ "html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048",
+ "description": "CVE-2017-9791",
+ "fork": false,
+ "created_at": "2017-07-07T18:27:31Z",
+ "updated_at": "2022-07-06T23:36:24Z",
+ "pushed_at": "2017-07-08T02:08:36Z",
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "forks_count": 31,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 31,
+ "watchers": 27,
+ "score": 0
+ },
{
"id": 104592299,
"name": "CVE-2017-9791",
diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json
index 0ae32e389f..fb2d20dd2f 100644
--- a/2018/CVE-2018-15473.json
+++ b/2018/CVE-2018-15473.json
@@ -653,7 +653,7 @@
"description": null,
"fork": false,
"created_at": "2021-12-14T15:48:11Z",
- "updated_at": "2022-02-21T04:07:24Z",
+ "updated_at": "2022-08-18T08:33:31Z",
"pushed_at": "2021-12-16T12:28:44Z",
"stargazers_count": 1,
"watchers_count": 1,
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 0d45f82ed9..163ef0e6c6 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-08-17T14:50:53Z",
+ "updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1477,
- "watchers_count": 1477,
+ "stargazers_count": 1480,
+ "watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 303,
- "watchers": 1477,
+ "watchers": 1480,
"score": 0
},
{
diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json
index ad9f529de1..863d11c2cd 100644
--- a/2018/CVE-2018-6242.json
+++ b/2018/CVE-2018-6242.json
@@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
- "updated_at": "2022-08-16T07:56:41Z",
+ "updated_at": "2022-08-18T08:48:14Z",
"pushed_at": "2018-08-30T05:37:03Z",
- "stargazers_count": 456,
- "watchers_count": 456,
+ "stargazers_count": 457,
+ "watchers_count": 457,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 58,
- "watchers": 456,
+ "watchers": 457,
"score": 0
},
{
diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json
index 4baa238af9..d4bbd2ddbc 100644
--- a/2018/CVE-2018-7600.json
+++ b/2018/CVE-2018-7600.json
@@ -76,10 +76,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
- "updated_at": "2022-08-08T04:14:40Z",
+ "updated_at": "2022-08-18T09:10:52Z",
"pushed_at": "2021-01-08T10:31:22Z",
- "stargazers_count": 528,
- "watchers_count": 528,
+ "stargazers_count": 527,
+ "watchers_count": 527,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@@ -97,7 +97,7 @@
],
"visibility": "public",
"forks": 172,
- "watchers": 528,
+ "watchers": 527,
"score": 0
},
{
diff --git a/2018/CVE-2018-8611.json b/2018/CVE-2018-8611.json
index 4686f9fa8f..1f39c2c4b6 100644
--- a/2018/CVE-2018-8611.json
+++ b/2018/CVE-2018-8611.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-04-27T12:00:24Z",
- "updated_at": "2022-04-08T08:51:57Z",
+ "updated_at": "2022-08-18T07:51:33Z",
"pushed_at": "2021-04-30T02:27:52Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 4,
+ "watchers": 5,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-17026.json b/2019/CVE-2019-17026.json
index cccf09fe8c..cd92c1cd38 100644
--- a/2019/CVE-2019-17026.json
+++ b/2019/CVE-2019-17026.json
@@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T13:18:54Z",
- "updated_at": "2022-02-14T08:03:59Z",
+ "updated_at": "2022-08-18T07:51:59Z",
"pushed_at": "2021-02-24T13:19:13Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 3,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index def3d6632f..75bb88b778 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2022-08-17T15:25:12Z",
+ "updated_at": "2022-08-18T08:41:13Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 3489,
- "watchers_count": 3489,
+ "stargazers_count": 3491,
+ "watchers_count": 3491,
"forks_count": 1030,
"allow_forking": true,
"is_template": false,
@@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1030,
- "watchers": 3489,
+ "watchers": 3491,
"score": 0
},
{
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 754a4d183c..650f452566 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -97,10 +97,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
- "updated_at": "2022-08-18T02:22:32Z",
+ "updated_at": "2022-08-18T08:24:29Z",
"pushed_at": "2020-04-26T10:49:25Z",
- "stargazers_count": 827,
- "watchers_count": 827,
+ "stargazers_count": 828,
+ "watchers_count": 828,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 172,
- "watchers": 827,
+ "watchers": 828,
"score": 0
},
{
@@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-08-17T14:50:53Z",
+ "updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1477,
- "watchers_count": 1477,
+ "stargazers_count": 1480,
+ "watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 303,
- "watchers": 1477,
+ "watchers": 1480,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-0022.json b/2020/CVE-2020-0022.json
index 00c7d0ce0d..a95e0a5321 100644
--- a/2020/CVE-2020-0022.json
+++ b/2020/CVE-2020-0022.json
@@ -153,10 +153,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T13:17:41Z",
- "updated_at": "2022-02-14T08:03:59Z",
+ "updated_at": "2022-08-18T07:51:48Z",
"pushed_at": "2021-02-24T13:18:25Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 3,
"score": 0
},
{
diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json
index a0f424c55a..5f58d80606 100644
--- a/2020/CVE-2020-1350.json
+++ b/2020/CVE-2020-1350.json
@@ -117,10 +117,10 @@
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
"fork": false,
"created_at": "2020-07-14T21:55:57Z",
- "updated_at": "2022-03-26T02:54:17Z",
+ "updated_at": "2022-08-18T07:05:31Z",
"pushed_at": "2020-07-19T02:29:33Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@@ -128,7 +128,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 7,
+ "watchers": 8,
"score": 0
},
{
@@ -229,10 +229,10 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
- "updated_at": "2022-07-27T07:12:04Z",
+ "updated_at": "2022-08-18T06:46:01Z",
"pushed_at": "2020-07-17T13:07:29Z",
- "stargazers_count": 231,
- "watchers_count": 231,
+ "stargazers_count": 232,
+ "watchers_count": 232,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
@@ -240,7 +240,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
- "watchers": 231,
+ "watchers": 232,
"score": 0
},
{
diff --git a/2020/CVE-2020-14144.json b/2020/CVE-2020-14144.json
index 5bb5aa0106..384190fff4 100644
--- a/2020/CVE-2020-14144.json
+++ b/2020/CVE-2020-14144.json
@@ -13,10 +13,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
- "updated_at": "2022-07-18T09:34:18Z",
+ "updated_at": "2022-08-18T10:46:37Z",
"pushed_at": "2022-05-03T10:40:14Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 7,
+ "watchers": 9,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 1bb2956658..0fa88a6402 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2022-08-17T15:25:12Z",
+ "updated_at": "2022-08-18T08:41:13Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 3489,
- "watchers_count": 3489,
+ "stargazers_count": 3491,
+ "watchers_count": 3491,
"forks_count": 1030,
"allow_forking": true,
"is_template": false,
@@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1030,
- "watchers": 3489,
+ "watchers": 3491,
"score": 0
},
{
diff --git a/2020/CVE-2020-15802.json b/2020/CVE-2020-15802.json
index 5e647dd3df..608ad224a5 100644
--- a/2020/CVE-2020-15802.json
+++ b/2020/CVE-2020-15802.json
@@ -13,10 +13,10 @@
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
- "updated_at": "2022-08-17T19:22:33Z",
+ "updated_at": "2022-08-18T07:54:33Z",
"pushed_at": "2022-08-17T19:20:34Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 859e8e33d7..9712ed2dd3 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-08-17T14:50:53Z",
+ "updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1477,
- "watchers_count": 1477,
+ "stargazers_count": 1480,
+ "watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 303,
- "watchers": 1477,
+ "watchers": 1480,
"score": 0
},
{
diff --git a/2020/CVE-2020-9715.json b/2020/CVE-2020-9715.json
index 1888507edd..67cd1994a6 100644
--- a/2020/CVE-2020-9715.json
+++ b/2020/CVE-2020-9715.json
@@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-01-10T08:23:05Z",
- "updated_at": "2022-07-31T07:40:38Z",
+ "updated_at": "2022-08-18T07:34:20Z",
"pushed_at": "2022-01-26T07:12:05Z",
"stargazers_count": 2,
"watchers_count": 2,
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index 9f0cfadc08..cec38d35d4 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
- "updated_at": "2022-08-18T06:11:39Z",
+ "updated_at": "2022-08-18T10:23:50Z",
"pushed_at": "2021-07-20T15:28:13Z",
- "stargazers_count": 1595,
- "watchers_count": 1595,
+ "stargazers_count": 1596,
+ "watchers_count": 1596,
"forks_count": 573,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 573,
- "watchers": 1595,
+ "watchers": 1596,
"score": 0
},
{
diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json
index 78edb0f7a7..e665e07fd5 100644
--- a/2021/CVE-2021-22005.json
+++ b/2021/CVE-2021-22005.json
@@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
- "updated_at": "2022-08-10T03:05:38Z",
+ "updated_at": "2022-08-18T08:53:01Z",
"pushed_at": "2021-12-22T10:32:37Z",
- "stargazers_count": 123,
- "watchers_count": 123,
+ "stargazers_count": 124,
+ "watchers_count": 124,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
- "watchers": 123,
+ "watchers": 124,
"score": 0
},
{
diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json
index eda93a70cf..3f2ddb0df2 100644
--- a/2021/CVE-2021-22204.json
+++ b/2021/CVE-2021-22204.json
@@ -17,7 +17,7 @@
"pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 69,
"watchers_count": 69,
- "forks_count": 27,
+ "forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -26,7 +26,7 @@
"exiftool"
],
"visibility": "public",
- "forks": 27,
+ "forks": 26,
"watchers": 69,
"score": 0
},
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index 71514645ee..77a6cb2e60 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -17,13 +17,13 @@
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 179,
"watchers_count": 179,
- "forks_count": 44,
+ "forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 44,
+ "forks": 45,
"watchers": 179,
"score": 0
},
diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json
index 00e942fe0c..7af98aec71 100644
--- a/2021/CVE-2021-31166.json
+++ b/2021/CVE-2021-31166.json
@@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
- "updated_at": "2022-08-17T16:50:59Z",
+ "updated_at": "2022-08-18T07:40:08Z",
"pushed_at": "2021-06-12T08:27:09Z",
- "stargazers_count": 816,
- "watchers_count": 816,
+ "stargazers_count": 817,
+ "watchers_count": 817,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 137,
- "watchers": 816,
+ "watchers": 817,
"score": 0
},
{
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index cce1405fa7..87225e368f 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -163,7 +163,7 @@
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 899,
"watchers_count": 899,
- "forks_count": 293,
+ "forks_count": 294,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -173,7 +173,7 @@
"poc"
],
"visibility": "public",
- "forks": 293,
+ "forks": 294,
"watchers": 899,
"score": 0
},
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
index 3ee12d8787..59f9187ea9 100644
--- a/2021/CVE-2021-40449.json
+++ b/2021/CVE-2021-40449.json
@@ -41,18 +41,18 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
- "updated_at": "2022-08-17T01:16:25Z",
+ "updated_at": "2022-08-18T09:46:29Z",
"pushed_at": "2022-03-05T18:34:25Z",
- "stargazers_count": 45,
- "watchers_count": 45,
- "forks_count": 25,
+ "stargazers_count": 46,
+ "watchers_count": 46,
+ "forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 25,
- "watchers": 45,
+ "forks": 26,
+ "watchers": 46,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index f98ea3f9f7..3f3b3c679a 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -254,7 +254,7 @@
"pushed_at": "2022-08-02T13:18:24Z",
"stargazers_count": 1001,
"watchers_count": 1001,
- "forks_count": 447,
+ "forks_count": 448,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -262,7 +262,7 @@
"log4shell"
],
"visibility": "public",
- "forks": 447,
+ "forks": 448,
"watchers": 1001,
"score": 0
},
@@ -7218,7 +7218,7 @@
"fork": false,
"created_at": "2022-01-03T04:36:41Z",
"updated_at": "2022-01-09T19:59:25Z",
- "pushed_at": "2022-08-11T15:52:24Z",
+ "pushed_at": "2022-08-18T09:43:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@@ -8506,34 +8506,6 @@
"watchers": 0,
"score": 0
},
- {
- "id": 515332940,
- "name": "Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
- "full_name": "tharindudh\/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
- "owner": {
- "login": "tharindudh",
- "id": 71964544,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4",
- "html_url": "https:\/\/github.com\/tharindudh"
- },
- "html_url": "https:\/\/github.com\/tharindudh\/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
- "description": "Remote Code Execution attacks are one of the most frequent methods employed by cybercriminals to compromise susceptible computers. In the previous year, a serious zero-day vulnerability was identified in Log4j, a java program used by developers for debugging and application modification loggings. This is also a significant vulnerability that affects the so-called Ghidra reverse engineering tool.",
- "fork": false,
- "created_at": "2022-07-18T20:33:10Z",
- "updated_at": "2022-07-18T20:33:10Z",
- "pushed_at": "2022-07-18T20:33:11Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 515475941,
"name": "CVE-2021-44228-Mass-RCE-Log4j",
@@ -8654,5 +8626,33 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 526103436,
+ "name": "tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
+ "full_name": "tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
+ "owner": {
+ "login": "tharindudh",
+ "id": 71964544,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4",
+ "html_url": "https:\/\/github.com\/tharindudh"
+ },
+ "html_url": "https:\/\/github.com\/tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-18T07:27:32Z",
+ "updated_at": "2022-08-18T07:27:32Z",
+ "pushed_at": "2022-08-18T07:30:16Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-1015.json b/2022/CVE-2022-1015.json
index 56c4406321..30fda90ee1 100644
--- a/2022/CVE-2022-1015.json
+++ b/2022/CVE-2022-1015.json
@@ -17,13 +17,13 @@
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 164,
"watchers_count": 164,
- "forks_count": 33,
+ "forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 33,
+ "forks": 34,
"watchers": 164,
"score": 0
},
diff --git a/2022/CVE-2022-20224.json b/2022/CVE-2022-20224.json
index ed7688c4ee..fe813b200d 100644
--- a/2022/CVE-2022-20224.json
+++ b/2022/CVE-2022-20224.json
@@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2022-08-18T06:04:41Z",
- "updated_at": "2022-08-18T06:04:41Z",
- "pushed_at": "2022-08-18T06:04:42Z",
+ "updated_at": "2022-08-18T06:22:42Z",
+ "pushed_at": "2022-08-18T06:24:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2022/CVE-2022-20229.json b/2022/CVE-2022-20229.json
new file mode 100644
index 0000000000..a90c391bec
--- /dev/null
+++ b/2022/CVE-2022-20229.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 526095462,
+ "name": "system_bt_AOSP10_r33_CVE-2022-20229",
+ "full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
+ "owner": {
+ "login": "ShaikUsaf",
+ "id": 100413972,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
+ "html_url": "https:\/\/github.com\/ShaikUsaf"
+ },
+ "html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-18T07:02:43Z",
+ "updated_at": "2022-08-18T07:06:27Z",
+ "pushed_at": "2022-08-18T07:07:40Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20361.json b/2022/CVE-2022-20361.json
index 5e647dd3df..608ad224a5 100644
--- a/2022/CVE-2022-20361.json
+++ b/2022/CVE-2022-20361.json
@@ -13,10 +13,10 @@
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
- "updated_at": "2022-08-17T19:22:33Z",
+ "updated_at": "2022-08-18T07:54:33Z",
"pushed_at": "2022-08-17T19:20:34Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 66f43485a6..f655f02c43 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -911,10 +911,10 @@
"description": "CVE-2022-22947_POC_EXP",
"fork": false,
"created_at": "2022-03-17T09:12:51Z",
- "updated_at": "2022-08-15T15:42:13Z",
+ "updated_at": "2022-08-18T06:37:41Z",
"pushed_at": "2022-03-17T09:58:23Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@@ -922,7 +922,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 11,
+ "watchers": 12,
"score": 0
},
{
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index 6f5d1860f8..8eab88d683 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
- "updated_at": "2022-08-15T15:42:16Z",
+ "updated_at": "2022-08-18T08:01:03Z",
"pushed_at": "2022-07-14T14:55:24Z",
- "stargazers_count": 293,
- "watchers_count": 293,
+ "stargazers_count": 294,
+ "watchers_count": 294,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
@@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 95,
- "watchers": 293,
+ "watchers": 294,
"score": 0
},
{
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index 7fe3bf0b6d..622a0f0acf 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
- "updated_at": "2022-08-18T03:03:39Z",
+ "updated_at": "2022-08-18T06:47:31Z",
"pushed_at": "2022-08-15T07:00:18Z",
- "stargazers_count": 666,
- "watchers_count": 666,
+ "stargazers_count": 667,
+ "watchers_count": 667,
"forks_count": 126,
"allow_forking": true,
"is_template": false,
@@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 126,
- "watchers": 666,
+ "watchers": 667,
"score": 0
},
{
diff --git a/2022/CVE-2022-26923.json b/2022/CVE-2022-26923.json
index 6d5cb58878..669d306754 100644
--- a/2022/CVE-2022-26923.json
+++ b/2022/CVE-2022-26923.json
@@ -69,10 +69,10 @@
"description": "A powershell poc to load and automatically run Certify and Rubeus from memory.",
"fork": false,
"created_at": "2022-08-17T21:13:49Z",
- "updated_at": "2022-08-18T02:22:03Z",
+ "updated_at": "2022-08-18T06:58:11Z",
"pushed_at": "2022-08-17T21:25:20Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-27255.json b/2022/CVE-2022-27255.json
index c72bf7d33b..c7e03d238b 100644
--- a/2022/CVE-2022-27255.json
+++ b/2022/CVE-2022-27255.json
@@ -13,18 +13,18 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
- "updated_at": "2022-08-18T04:32:58Z",
+ "updated_at": "2022-08-18T11:18:45Z",
"pushed_at": "2022-08-17T02:33:15Z",
- "stargazers_count": 69,
- "watchers_count": 69,
- "forks_count": 15,
+ "stargazers_count": 79,
+ "watchers_count": 79,
+ "forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 15,
- "watchers": 69,
+ "forks": 17,
+ "watchers": 79,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json
index 7d684e8bc0..94636546ae 100644
--- a/2022/CVE-2022-27925.json
+++ b/2022/CVE-2022-27925.json
@@ -13,10 +13,10 @@
"description": "Zimbra RCE simple poc",
"fork": false,
"created_at": "2022-08-12T18:35:52Z",
- "updated_at": "2022-08-18T06:20:27Z",
+ "updated_at": "2022-08-18T11:35:42Z",
"pushed_at": "2022-08-13T18:54:58Z",
- "stargazers_count": 40,
- "watchers_count": 40,
+ "stargazers_count": 43,
+ "watchers_count": 43,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
- "watchers": 40,
+ "watchers": 43,
"score": 0
},
{
@@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-14T22:22:55Z",
- "updated_at": "2022-08-18T05:17:39Z",
+ "updated_at": "2022-08-18T10:00:03Z",
"pushed_at": "2022-08-14T22:25:03Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 7,
+ "watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 6,
+ "watchers": 7,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-29221.json b/2022/CVE-2022-29221.json
index 8b1c9b64cb..24529197d1 100644
--- a/2022/CVE-2022-29221.json
+++ b/2022/CVE-2022-29221.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-29221 Proof of Concept Code",
"fork": false,
"created_at": "2022-05-25T06:02:23Z",
- "updated_at": "2022-08-01T17:34:13Z",
+ "updated_at": "2022-08-18T10:35:01Z",
"pushed_at": "2022-05-25T07:11:59Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 10,
+ "watchers": 11,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index 40951a5236..ea7e5fc886 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
- "updated_at": "2022-08-15T15:42:26Z",
+ "updated_at": "2022-08-18T07:34:31Z",
"pushed_at": "2022-06-05T21:06:13Z",
- "stargazers_count": 133,
- "watchers_count": 133,
+ "stargazers_count": 134,
+ "watchers_count": 134,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
@@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 54,
- "watchers": 133,
+ "watchers": 134,
"score": 0
},
{
@@ -49,10 +49,10 @@
"description": "CVE-2022-30190 Follina POC",
"fork": false,
"created_at": "2022-05-31T06:45:25Z",
- "updated_at": "2022-07-25T16:12:48Z",
+ "updated_at": "2022-08-18T06:59:30Z",
"pushed_at": "2022-05-31T09:35:37Z",
- "stargazers_count": 91,
- "watchers_count": 91,
+ "stargazers_count": 92,
+ "watchers_count": 92,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
- "watchers": 91,
+ "watchers": 92,
"score": 0
},
{
diff --git a/2022/CVE-2022-30333.json b/2022/CVE-2022-30333.json
index d99e6c1f27..63e3ea3968 100644
--- a/2022/CVE-2022-30333.json
+++ b/2022/CVE-2022-30333.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-05T02:35:12Z",
- "updated_at": "2022-08-15T15:42:33Z",
+ "updated_at": "2022-08-18T07:47:02Z",
"pushed_at": "2022-07-05T02:58:30Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 13,
+ "watchers_count": 13,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 12,
+ "watchers": 13,
"score": 0
},
{
diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json
index 1c1195b5c4..0ae794e280 100644
--- a/2022/CVE-2022-34918.json
+++ b/2022/CVE-2022-34918.json
@@ -153,10 +153,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
- "updated_at": "2022-08-18T03:13:11Z",
+ "updated_at": "2022-08-18T07:11:58Z",
"pushed_at": "2022-08-13T08:14:07Z",
- "stargazers_count": 144,
- "watchers_count": 144,
+ "stargazers_count": 145,
+ "watchers_count": 145,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
- "watchers": 144,
+ "watchers": 145,
"score": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 501d254751..0adc56059d 100644
--- a/README.md
+++ b/README.md
@@ -618,6 +618,14 @@ In AT_SKIP_REST of bta_hf_client_at.cc, there is a possible out of bounds read d
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224)
+### CVE-2022-20229 (2022-07-13)
+
+
+In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184
+
+
+- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229)
+
### CVE-2022-20361 (2022-08-09)
@@ -7389,11 +7397,11 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [jaehnri/CVE-2021-44228](https://github.com/jaehnri/CVE-2021-44228)
- [ra890927/Log4Shell-CVE-2121-44228-Demo](https://github.com/ra890927/Log4Shell-CVE-2121-44228-Demo)
- [bughuntar/log4j-scan](https://github.com/bughuntar/log4j-scan)
-- [tharindudh/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228](https://github.com/tharindudh/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228)
- [cybersecurityresearcher/CVE-2021-44228-Mass-RCE-Log4j](https://github.com/cybersecurityresearcher/CVE-2021-44228-Mass-RCE-Log4j)
- [vidrez/Ethical-Hacking-Report-Log4j](https://github.com/vidrez/Ethical-Hacking-Report-Log4j)
- [vino-theva/CVE-2021-44228](https://github.com/vino-theva/CVE-2021-44228)
- [nemesi-ita/autoL4s](https://github.com/nemesi-ita/autoL4s)
+- [tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228](https://github.com/tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228)
### CVE-2021-44229
- [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229)
@@ -20804,6 +20812,7 @@ Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1,
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
+- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)
@@ -21083,6 +21092,7 @@ An attacker who is able to send and receive messages to an authoritative DNS ser
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
+- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC)
- [scopion/CVE-2017-3241](https://github.com/scopion/CVE-2017-3241)
### CVE-2017-3248 (2017-01-27)
@@ -21135,6 +21145,7 @@ A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code i
### CVE-2017-4490
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
+- [homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-](https://github.com/homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-)
### CVE-2017-4878
- [brianwrf/CVE-2017-4878-Samples](https://github.com/brianwrf/CVE-2017-4878-Samples)
@@ -21205,6 +21216,7 @@ An attack can use a blob URL and script to spoof an arbitrary addressbar URL pre
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
+- [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan)
- [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan)
- [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487)
- [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit)
@@ -21262,10 +21274,12 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
- [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638)
- [sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
- [sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638)
+- [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-)
- [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638)
- [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
- [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser)
- [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638)
+- [c002/Apache-Struts](https://github.com/c002/Apache-Struts)
- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit)
- [pr0x1ma-byte/cybersecurity-struts2](https://github.com/pr0x1ma-byte/cybersecurity-struts2)
- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638)
@@ -21315,6 +21329,7 @@ An unprivileged network attacker could gain system privileges to provisioned Int
- [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689)
- [robhax/amthoneypot](https://github.com/robhax/amthoneypot)
- [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass)
+- [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc)
- [TheWay-hue/CVE-2017-5689-Checker](https://github.com/TheWay-hue/CVE-2017-5689-Checker)
### CVE-2017-5693 (2018-07-31)
@@ -21493,6 +21508,15 @@ A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.
- [ansjdnakjdnajkd/CVE-2017-7038](https://github.com/ansjdnakjdnajkd/CVE-2017-7038)
+### CVE-2017-7047 (2017-07-20)
+
+
+An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxpc" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
+
+
+- [JosephShenton/Triple_Fetch-Kernel-Creds](https://github.com/JosephShenton/Triple_Fetch-Kernel-Creds)
+- [q1f3/Triple_fetch](https://github.com/q1f3/Triple_fetch)
+
### CVE-2017-7089 (2017-10-22)
@@ -21554,6 +21578,7 @@ Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in In
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
+- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
- [k4u5h41/CVE-2017-7269](https://github.com/k4u5h41/CVE-2017-7269)
### CVE-2017-7374 (2017-03-31)
@@ -21622,6 +21647,7 @@ A deserialization flaw was discovered in the jackson-databind, versions before 2
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
+- [liusec/CVE-2017-7529](https://github.com/liusec/CVE-2017-7529)
- [en0f/CVE-2017-7529_PoC](https://github.com/en0f/CVE-2017-7529_PoC)
- [cved-sources/cve-2017-7529](https://github.com/cved-sources/cve-2017-7529)
- [MaxSecurity/CVE-2017-7529-POC](https://github.com/MaxSecurity/CVE-2017-7529-POC)
@@ -22019,6 +22045,8 @@ OCaml compiler allows attackers to have unspecified impact via unknown vectors,
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
+- [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048)
+- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048)
- [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791)
### CVE-2017-9798 (2017-09-18)