From 76288cd368dae398ba996a3bf7a84b4cfada1b8f Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 21 Mar 2023 15:28:34 +0900 Subject: [PATCH] Auto Update 2023/03/21 06:28:34 --- 2017/CVE-2017-3066.json | 4 +- 2017/CVE-2017-7089.json | 8 +-- 2017/CVE-2017-7494.json | 8 +-- 2018/CVE-2018-11311.json | 8 +-- 2018/CVE-2018-11517.json | 8 +-- 2018/CVE-2018-12031.json | 8 +-- 2018/CVE-2018-6981.json | 8 +-- 2019/CVE-2019-11043.json | 16 +++--- 2019/CVE-2019-12460.json | 8 +-- 2019/CVE-2019-1405.json | 8 +-- 2019/CVE-2019-17558.json | 4 +- 2019/CVE-2019-5893.json | 8 +-- 2020/CVE-2020-0796.json | 16 +++--- 2020/CVE-2020-14882.json | 4 +- 2020/CVE-2020-16898.json | 8 +-- 2020/CVE-2020-1971.json | 29 +++++++++++ 2020/CVE-2020-9992.json | 8 +-- 2021/CVE-2021-22924.json | 2 +- 2021/CVE-2021-22986.json | 8 +-- 2021/CVE-2021-27246.json | 8 +-- 2021/CVE-2021-3156.json | 8 +-- 2021/CVE-2021-3560.json | 29 +++++++++++ 2021/CVE-2021-36260.json | 8 +-- 2021/CVE-2021-37850.json | 36 ------------- 2021/CVE-2021-4034.json | 8 +-- 2021/CVE-2021-42574.json | 2 +- 2021/CVE-2021-44228.json | 10 ++-- 2022/CVE-2022-0847.json | 95 +++++++++++++++++++++++++++++++-- 2022/CVE-2022-1388.json | 62 ++++++++++++++++++++++ 2022/CVE-2022-20124.json | 31 +++++++++++ 2022/CVE-2022-20130.json | 31 +++++++++++ 2022/CVE-2022-20135.json | 31 +++++++++++ 2022/CVE-2022-20142.json | 29 +++++++++++ 2022/CVE-2022-21449.json | 29 +++++++++++ 2022/CVE-2022-21894.json | 4 +- 2022/CVE-2022-22620.json | 8 +-- 2022/CVE-2022-22954.json | 58 +++++++++++++++++++++ 2022/CVE-2022-22963.json | 39 ++++++++++++-- 2022/CVE-2022-22965.json | 37 +++++++++++-- 2022/CVE-2022-24342.json | 39 ++++++++++++++ 2022/CVE-2022-24706.json | 29 +++++++++++ 2022/CVE-2022-24715.json | 8 +-- 2022/CVE-2022-24716.json | 8 +-- 2022/CVE-2022-26134.json | 75 ++++++++++++++++++++++++-- 2022/CVE-2022-26763.json | 31 +++++++++++ 2022/CVE-2022-26766.json | 31 +++++++++++ 2022/CVE-2022-28219.json | 29 +++++++++++ 2022/CVE-2022-29464.json | 58 +++++++++++++++++++++ 2022/CVE-2022-29885.json | 29 +++++++++++ 2022/CVE-2022-30333.json | 29 +++++++++++ 2022/CVE-2022-30594.json | 31 +++++++++++ 2022/CVE-2022-30887.json | 31 +++++++++++ 2022/CVE-2022-30929.json | 31 +++++++++++ 2022/CVE-2022-33679.json | 4 +- 2022/CVE-2022-3602.json | 4 +- 2022/CVE-2022-39197.json | 8 +-- 2022/CVE-2022-40684.json | 8 +-- 2022/CVE-2022-42475.json | 12 ++--- 2022/CVE-2022-44268.json | 12 ++--- 2022/CVE-2022-46169.json | 2 +- 2022/CVE-2022-46689.json | 8 +-- 2023/CVE-2023-0179.json | 16 +++--- 2023/CVE-2023-0286.json | 31 +++++++++++ 2023/CVE-2023-21768.json | 37 +++++++++++-- 2023/CVE-2023-22974.json | 8 +-- 2023/CVE-2023-23397.json | 24 ++++----- 2023/CVE-2023-27326.json | 12 ++--- README.md | 110 ++++++++++++++++++++++++++++++++++++--- 68 files changed, 1258 insertions(+), 231 deletions(-) delete mode 100644 2021/CVE-2021-37850.json create mode 100644 2022/CVE-2022-20124.json create mode 100644 2022/CVE-2022-20130.json create mode 100644 2022/CVE-2022-20135.json create mode 100644 2022/CVE-2022-24342.json create mode 100644 2022/CVE-2022-26763.json create mode 100644 2022/CVE-2022-26766.json create mode 100644 2022/CVE-2022-30594.json create mode 100644 2022/CVE-2022-30887.json create mode 100644 2022/CVE-2022-30929.json create mode 100644 2023/CVE-2023-0286.json diff --git a/2017/CVE-2017-3066.json b/2017/CVE-2017-3066.json index 2e20a2d6be..1e6378ba75 100644 --- a/2017/CVE-2017-3066.json +++ b/2017/CVE-2017-3066.json @@ -18,13 +18,13 @@ "stargazers_count": 86, "watchers_count": 86, "has_discussions": false, - "forks_count": 30, + "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 30, + "forks": 31, "watchers": 86, "score": 0 }, diff --git a/2017/CVE-2017-7089.json b/2017/CVE-2017-7089.json index 4fdc5167e8..cfc2f0a263 100644 --- a/2017/CVE-2017-7089.json +++ b/2017/CVE-2017-7089.json @@ -13,10 +13,10 @@ "description": "Webkit uxss exploit (CVE-2017-7089)", "fork": false, "created_at": "2017-10-03T12:13:43Z", - "updated_at": "2023-02-09T20:48:16Z", + "updated_at": "2023-03-21T03:50:28Z", "pushed_at": "2017-10-03T12:23:43Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 62, + "watchers": 63, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index f3ac0f7eba..bd0142c29d 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -71,10 +71,10 @@ "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)", "fork": false, "created_at": "2017-05-26T00:58:25Z", - "updated_at": "2023-03-16T07:48:53Z", + "updated_at": "2023-03-21T03:07:27Z", "pushed_at": "2022-12-27T20:25:09Z", - "stargazers_count": 335, - "watchers_count": 335, + "stargazers_count": 336, + "watchers_count": 336, "has_discussions": false, "forks_count": 108, "allow_forking": true, @@ -89,7 +89,7 @@ ], "visibility": "public", "forks": 108, - "watchers": 335, + "watchers": 336, "score": 0 }, { diff --git a/2018/CVE-2018-11311.json b/2018/CVE-2018-11311.json index 555775a796..f26982ae7b 100644 --- a/2018/CVE-2018-11311.json +++ b/2018/CVE-2018-11311.json @@ -13,10 +13,10 @@ "description": "CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability", "fork": false, "created_at": "2018-05-19T17:14:49Z", - "updated_at": "2022-11-24T05:18:58Z", + "updated_at": "2023-03-21T04:51:07Z", "pushed_at": "2018-07-02T14:26:13Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 11, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-11517.json b/2018/CVE-2018-11517.json index 6e8a03e347..3c494da487 100644 --- a/2018/CVE-2018-11517.json +++ b/2018/CVE-2018-11517.json @@ -13,10 +13,10 @@ "description": "CVE-2018-11517 | mySCADA myPRO v7.0.46 has another vulnerability to discover all projects in the system.", "fork": false, "created_at": "2018-05-26T15:49:07Z", - "updated_at": "2022-11-24T05:31:10Z", + "updated_at": "2023-03-21T04:51:06Z", "pushed_at": "2018-05-28T21:51:58Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-12031.json b/2018/CVE-2018-12031.json index b382110cd3..f8432ee2ee 100644 --- a/2018/CVE-2018-12031.json +++ b/2018/CVE-2018-12031.json @@ -13,10 +13,10 @@ "description": "CVE-2018-12031 | LFI in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file, it can lead to sensitive information disclosure, denial of service and code execution.", "fork": false, "created_at": "2018-06-06T15:31:29Z", - "updated_at": "2021-03-01T05:17:33Z", + "updated_at": "2023-03-21T04:51:04Z", "pushed_at": "2018-08-29T10:50:56Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6981.json b/2018/CVE-2018-6981.json index 3d8b617f85..64bbcb301c 100644 --- a/2018/CVE-2018-6981.json +++ b/2018/CVE-2018-6981.json @@ -13,10 +13,10 @@ "description": "Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.", "fork": false, "created_at": "2018-11-13T18:47:37Z", - "updated_at": "2022-07-25T15:24:59Z", + "updated_at": "2023-03-21T03:28:32Z", "pushed_at": "2022-06-26T23:32:10Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 12, + "watchers": 11, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 9ed7a62d05..08e10248d5 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -245,10 +245,10 @@ "description": "(PoC) Python version of CVE-2019-11043 exploit by neex", "fork": false, "created_at": "2019-10-28T11:09:06Z", - "updated_at": "2023-01-13T08:04:08Z", + "updated_at": "2023-03-21T04:54:45Z", "pushed_at": "2019-10-29T15:47:02Z", - "stargazers_count": 143, - "watchers_count": 143, + "stargazers_count": 144, + "watchers_count": 144, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -257,7 +257,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 143, + "watchers": 144, "score": 0 }, { @@ -583,10 +583,10 @@ "description": "PHP-FPM Remote Command Execution Exploit", "fork": false, "created_at": "2020-11-18T07:25:37Z", - "updated_at": "2021-11-02T20:02:01Z", + "updated_at": "2023-03-21T04:57:09Z", "pushed_at": "2020-11-20T10:53:26Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -595,7 +595,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2019/CVE-2019-12460.json b/2019/CVE-2019-12460.json index 71406a6d44..c3518f05a0 100644 --- a/2019/CVE-2019-12460.json +++ b/2019/CVE-2019-12460.json @@ -13,10 +13,10 @@ "description": "CVE-2019-12460|Reflected XSS in WebPort-v1.19.1 impacts users who open a maliciously crafted link or third-party web page.", "fork": false, "created_at": "2019-05-23T10:27:49Z", - "updated_at": "2022-11-24T11:10:13Z", + "updated_at": "2023-03-21T04:50:21Z", "pushed_at": "2019-05-30T16:21:16Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json index b3f2e383bc..6a26349dc6 100644 --- a/2019/CVE-2019-1405.json +++ b/2019/CVE-2019-1405.json @@ -13,10 +13,10 @@ "description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322", "fork": false, "created_at": "2019-11-13T16:34:03Z", - "updated_at": "2023-03-16T17:59:45Z", + "updated_at": "2023-03-21T02:43:56Z", "pushed_at": "2019-11-14T14:16:54Z", - "stargazers_count": 322, - "watchers_count": 322, + "stargazers_count": 323, + "watchers_count": 323, "has_discussions": false, "forks_count": 77, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 77, - "watchers": 322, + "watchers": 323, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 8db23ba1df..49b0327422 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -47,7 +47,7 @@ "stargazers_count": 3697, "watchers_count": 3697, "has_discussions": false, - "forks_count": 1065, + "forks_count": 1066, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -73,7 +73,7 @@ "webshell" ], "visibility": "public", - "forks": 1065, + "forks": 1066, "watchers": 3697, "score": 0 }, diff --git a/2019/CVE-2019-5893.json b/2019/CVE-2019-5893.json index 7ea472cb5a..fd405b3ec4 100644 --- a/2019/CVE-2019-5893.json +++ b/2019/CVE-2019-5893.json @@ -13,10 +13,10 @@ "description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.", "fork": false, "created_at": "2019-01-10T14:36:55Z", - "updated_at": "2022-11-24T11:09:36Z", + "updated_at": "2023-03-21T04:50:22Z", "pushed_at": "2019-01-11T07:45:37Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 8fa638b19a..8f2bb1f688 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -100,10 +100,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2023-03-13T16:18:45Z", + "updated_at": "2023-03-21T02:33:58Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 634, - "watchers_count": 634, + "stargazers_count": 633, + "watchers_count": 633, "has_discussions": false, "forks_count": 205, "allow_forking": true, @@ -114,7 +114,7 @@ ], "visibility": "public", "forks": 205, - "watchers": 634, + "watchers": 633, "score": 0 }, { @@ -1369,10 +1369,10 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2023-03-18T08:18:47Z", + "updated_at": "2023-03-21T01:10:02Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 484, - "watchers_count": 484, + "stargazers_count": 485, + "watchers_count": 485, "has_discussions": false, "forks_count": 157, "allow_forking": true, @@ -1387,7 +1387,7 @@ ], "visibility": "public", "forks": 157, - "watchers": 484, + "watchers": 485, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 861f3ce119..b220773a98 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -18,7 +18,7 @@ "stargazers_count": 3697, "watchers_count": 3697, "has_discussions": false, - "forks_count": 1065, + "forks_count": 1066, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,7 +44,7 @@ "webshell" ], "visibility": "public", - "forks": 1065, + "forks": 1066, "watchers": 3697, "score": 0 }, diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index 3ad561ba94..9467932973 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -177,10 +177,10 @@ "description": "Zeek detection for CVE-2020-16898-\"Bad Neighbor\"", "fork": false, "created_at": "2020-10-14T21:25:09Z", - "updated_at": "2020-10-22T21:12:06Z", + "updated_at": "2023-03-21T04:55:12Z", "pushed_at": "2020-10-22T21:12:03Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -189,7 +189,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2020/CVE-2020-1971.json b/2020/CVE-2020-1971.json index bad680ae22..6d236c3b7f 100644 --- a/2020/CVE-2020-1971.json +++ b/2020/CVE-2020-1971.json @@ -34,5 +34,34 @@ "forks": 2, "watchers": 7, "score": 0 + }, + { + "id": 616797867, + "name": "OPENSSL_1.1.11g_G3_CVE-2020-1971", + "full_name": "nidhi7598\/OPENSSL_1.1.11g_G3_CVE-2020-1971", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/OPENSSL_1.1.11g_G3_CVE-2020-1971", + "description": null, + "fork": false, + "created_at": "2023-03-21T05:13:37Z", + "updated_at": "2023-03-21T05:17:36Z", + "pushed_at": "2023-03-21T05:18:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9992.json b/2020/CVE-2020-9992.json index 0462a7d38f..a9074ef112 100644 --- a/2020/CVE-2020-9992.json +++ b/2020/CVE-2020-9992.json @@ -13,10 +13,10 @@ "description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device", "fork": false, "created_at": "2020-09-16T23:35:22Z", - "updated_at": "2023-03-16T02:49:59Z", + "updated_at": "2023-03-21T03:33:44Z", "pushed_at": "2020-09-23T14:52:06Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 63, + "watchers": 62, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22924.json b/2021/CVE-2021-22924.json index 220121ed2e..477f1f48a0 100644 --- a/2021/CVE-2021-22924.json +++ b/2021/CVE-2021-22924.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2022-04-30T03:40:15Z", - "updated_at": "2022-04-30T03:42:14Z", + "updated_at": "2023-03-21T01:13:01Z", "pushed_at": "2022-04-30T03:42:36Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 0c2b1a7d1c..51b1f54b64 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -42,10 +42,10 @@ "description": "cve-2021-22986 f5 rce 漏洞批量检测 poc", "fork": false, "created_at": "2021-03-19T18:50:22Z", - "updated_at": "2022-11-09T18:11:37Z", + "updated_at": "2023-03-21T02:36:10Z", "pushed_at": "2021-03-27T10:02:59Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 26, + "watchers": 27, "score": 0 }, { diff --git a/2021/CVE-2021-27246.json b/2021/CVE-2021-27246.json index e6d0529e52..49a86f96f5 100644 --- a/2021/CVE-2021-27246.json +++ b/2021/CVE-2021-27246.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2021-03-01T16:45:42Z", - "updated_at": "2022-11-30T15:46:39Z", + "updated_at": "2023-03-21T01:38:52Z", "pushed_at": "2021-03-02T07:45:20Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 40, + "watchers": 41, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index e9e85edafc..d7ffd70553 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -455,10 +455,10 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2023-03-13T01:51:21Z", + "updated_at": "2023-03-21T03:20:16Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 861, - "watchers_count": 861, + "stargazers_count": 862, + "watchers_count": 862, "has_discussions": false, "forks_count": 238, "allow_forking": true, @@ -467,7 +467,7 @@ "topics": [], "visibility": "public", "forks": 238, - "watchers": 861, + "watchers": 862, "score": 0 }, { diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 22e2a4c2da..ea1ed5c627 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -269,6 +269,35 @@ "watchers": 1, "score": 0 }, + { + "id": 390233864, + "name": "CVE-2021-3560", + "full_name": "BizarreLove\/CVE-2021-3560", + "owner": { + "login": "BizarreLove", + "id": 41328139, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41328139?v=4", + "html_url": "https:\/\/github.com\/BizarreLove" + }, + "html_url": "https:\/\/github.com\/BizarreLove\/CVE-2021-3560", + "description": "NYCY_homework_&_meeting", + "fork": false, + "created_at": "2021-07-28T06:05:46Z", + "updated_at": "2021-07-29T08:24:46Z", + "pushed_at": "2021-07-29T08:24:43Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0 + }, { "id": 391043530, "name": "CVE-2021-3560", diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 063b697507..065937ce5d 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -42,10 +42,10 @@ "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", - "updated_at": "2023-03-20T06:26:59Z", + "updated_at": "2023-03-21T01:55:27Z", "pushed_at": "2021-10-28T06:37:37Z", - "stargazers_count": 173, - "watchers_count": 173, + "stargazers_count": 174, + "watchers_count": 174, "has_discussions": false, "forks_count": 67, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 67, - "watchers": 173, + "watchers": 174, "score": 0 }, { diff --git a/2021/CVE-2021-37850.json b/2021/CVE-2021-37850.json deleted file mode 100644 index e77c18ccf5..0000000000 --- a/2021/CVE-2021-37850.json +++ /dev/null @@ -1,36 +0,0 @@ -[ - { - "id": 404648473, - "name": "CVE-2021-37850", - "full_name": "p1atdev\/CVE-2021-37850", - "owner": { - "login": "p1atdev", - "id": 60182057, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60182057?v=4", - "html_url": "https:\/\/github.com\/p1atdev" - }, - "html_url": "https:\/\/github.com\/p1atdev\/CVE-2021-37850", - "description": "ESET Endpoint for macOS DoS Vulnerability", - "fork": false, - "created_at": "2021-09-09T08:42:52Z", - "updated_at": "2022-08-17T13:46:40Z", - "pushed_at": "2021-10-05T13:02:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "dos", - "eset", - "exploit" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index f64bc02cb7..070ca59488 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -2064,10 +2064,10 @@ "description": "CVE-2021-4034简单优化,以应对没有安装gcc和make的目标环境", "fork": false, "created_at": "2022-01-28T02:54:38Z", - "updated_at": "2023-01-31T14:34:51Z", + "updated_at": "2023-03-21T02:44:19Z", "pushed_at": "2022-02-09T09:58:59Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -2076,7 +2076,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 65, + "watchers": 66, "score": 0 }, { diff --git a/2021/CVE-2021-42574.json b/2021/CVE-2021-42574.json index ee0ad11c92..5a4b0ac0d7 100644 --- a/2021/CVE-2021-42574.json +++ b/2021/CVE-2021-42574.json @@ -101,7 +101,7 @@ "fork": false, "created_at": "2021-11-06T22:12:35Z", "updated_at": "2023-01-31T19:22:27Z", - "pushed_at": "2023-03-20T06:01:53Z", + "pushed_at": "2023-03-21T05:59:59Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index eb3e21779e..d34236fd6b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1259,10 +1259,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2023-03-20T16:13:53Z", - "pushed_at": "2023-03-20T13:03:28Z", - "stargazers_count": 637, - "watchers_count": 637, + "updated_at": "2023-03-21T03:50:29Z", + "pushed_at": "2023-03-21T03:01:52Z", + "stargazers_count": 640, + "watchers_count": 640, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -1276,7 +1276,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 637, + "watchers": 640, "score": 0 }, { diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 58e4e341df..5a8db36bb2 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1175,10 +1175,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2023-03-20T10:25:12Z", + "updated_at": "2023-03-21T01:47:23Z", "pushed_at": "2022-06-13T19:33:08Z", - "stargazers_count": 382, - "watchers_count": 382, + "stargazers_count": 383, + "watchers_count": 383, "has_discussions": false, "forks_count": 117, "allow_forking": true, @@ -1187,7 +1187,7 @@ "topics": [], "visibility": "public", "forks": 117, - "watchers": 382, + "watchers": 383, "score": 0 }, { @@ -1865,6 +1865,64 @@ "watchers": 4, "score": 0 }, + { + "id": 510629189, + "name": "dirtypipe-ebpf_detection", + "full_name": "airbus-cert\/dirtypipe-ebpf_detection", + "owner": { + "login": "airbus-cert", + "id": 26453405, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4", + "html_url": "https:\/\/github.com\/airbus-cert" + }, + "html_url": "https:\/\/github.com\/airbus-cert\/dirtypipe-ebpf_detection", + "description": "An eBPF detection program for CVE-2022-0847", + "fork": false, + "created_at": "2022-07-05T07:20:59Z", + "updated_at": "2023-01-16T18:05:15Z", + "pushed_at": "2022-07-05T14:25:46Z", + "stargazers_count": 21, + "watchers_count": 21, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 21, + "score": 0 + }, + { + "id": 510867863, + "name": "Dirty-Pipe", + "full_name": "edr1412\/Dirty-Pipe", + "owner": { + "login": "edr1412", + "id": 40953911, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4", + "html_url": "https:\/\/github.com\/edr1412" + }, + "html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe", + "description": "exp of CVE-2022-0847", + "fork": false, + "created_at": "2022-07-05T19:22:50Z", + "updated_at": "2023-01-31T12:51:32Z", + "pushed_at": "2022-07-05T19:23:27Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 3, + "score": 0 + }, { "id": 520138171, "name": "CVE-2022-0847-DirtyPipe-Exploits", @@ -2328,5 +2386,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 614960637, + "name": "CVE-2022-0847", + "full_name": "4bhishek0\/CVE-2022-0847", + "owner": { + "login": "4bhishek0", + "id": 105487073, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105487073?v=4", + "html_url": "https:\/\/github.com\/4bhishek0" + }, + "html_url": "https:\/\/github.com\/4bhishek0\/CVE-2022-0847", + "description": null, + "fork": false, + "created_at": "2023-03-16T17:00:31Z", + "updated_at": "2023-03-21T05:16:23Z", + "pushed_at": "2023-03-16T17:02:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index d1ee79fa28..e7837e6ed5 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -1592,6 +1592,68 @@ "watchers": 3, "score": 0 }, + { + "id": 509548569, + "name": "CVE-2022-1388_refresh", + "full_name": "Luchoane\/CVE-2022-1388_refresh", + "owner": { + "login": "Luchoane", + "id": 40374879, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4", + "html_url": "https:\/\/github.com\/Luchoane" + }, + "html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh", + "description": "PoC for exploiting CVE-2022-1388 on BIG IP F5", + "fork": false, + "created_at": "2022-07-01T18:08:50Z", + "updated_at": "2022-07-07T19:22:09Z", + "pushed_at": "2022-07-01T20:04:27Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 510239425, + "name": "CVE-2022-1388", + "full_name": "jbharucha05\/CVE-2022-1388", + "owner": { + "login": "jbharucha05", + "id": 13020621, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4", + "html_url": "https:\/\/github.com\/jbharucha05" + }, + "html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388", + "description": "CVE-2022-1388, bypassing iControl REST authentication", + "fork": false, + "created_at": "2022-07-04T06:31:56Z", + "updated_at": "2022-07-04T07:08:22Z", + "pushed_at": "2022-07-04T10:37:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2022-1388", + "f5-big-ip-icontrol-rest-rce", + "f5-bigip" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 557286411, "name": "CVE-2022-1388", diff --git a/2022/CVE-2022-20124.json b/2022/CVE-2022-20124.json new file mode 100644 index 0000000000..3c375d25f2 --- /dev/null +++ b/2022/CVE-2022-20124.json @@ -0,0 +1,31 @@ +[ + { + "id": 510660359, + "name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "description": null, + "fork": false, + "created_at": "2022-07-05T08:59:44Z", + "updated_at": "2022-07-05T09:52:45Z", + "pushed_at": "2022-07-05T09:52:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20130.json b/2022/CVE-2022-20130.json new file mode 100644 index 0000000000..64d3262c46 --- /dev/null +++ b/2022/CVE-2022-20130.json @@ -0,0 +1,31 @@ +[ + { + "id": 509461641, + "name": "external_aac_AOSP10_r33_CVE-2022-20130", + "full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130", + "owner": { + "login": "Satheesh575555", + "id": 102573923, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", + "html_url": "https:\/\/github.com\/Satheesh575555" + }, + "html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130", + "description": null, + "fork": false, + "created_at": "2022-07-01T13:16:14Z", + "updated_at": "2022-07-01T13:25:04Z", + "pushed_at": "2022-07-01T13:25:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20135.json b/2022/CVE-2022-20135.json new file mode 100644 index 0000000000..8aa3d25bae --- /dev/null +++ b/2022/CVE-2022-20135.json @@ -0,0 +1,31 @@ +[ + { + "id": 510684846, + "name": "frameworks_base_AOSP10_r33_CVE-2022-20135-", + "full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-", + "description": null, + "fork": false, + "created_at": "2022-07-05T10:15:49Z", + "updated_at": "2022-07-05T10:42:21Z", + "pushed_at": "2022-07-05T10:41:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20142.json b/2022/CVE-2022-20142.json index 656b61c3db..1f2f947b5f 100644 --- a/2022/CVE-2022-20142.json +++ b/2022/CVE-2022-20142.json @@ -1,4 +1,33 @@ [ + { + "id": 510346412, + "name": "frameworks_base_AOSP10_r33_CVE-2022-20142", + "full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142", + "owner": { + "login": "Satheesh575555", + "id": 102573923, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", + "html_url": "https:\/\/github.com\/Satheesh575555" + }, + "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142", + "description": null, + "fork": false, + "created_at": "2022-07-04T12:16:05Z", + "updated_at": "2022-07-04T13:19:53Z", + "pushed_at": "2022-07-04T12:21:52Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 529215266, "name": "frameworks_base_AOSP10_r33_CVE-2022-20142", diff --git a/2022/CVE-2022-21449.json b/2022/CVE-2022-21449.json index a337743144..7133298ec5 100644 --- a/2022/CVE-2022-21449.json +++ b/2022/CVE-2022-21449.json @@ -202,6 +202,35 @@ "watchers": 0, "score": 0 }, + { + "id": 510875629, + "name": "CVE-2022-21449-I2P-TLS-POC", + "full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC", + "owner": { + "login": "PyterSmithDarkGhost", + "id": 106814901, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4", + "html_url": "https:\/\/github.com\/PyterSmithDarkGhost" + }, + "html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC", + "description": null, + "fork": false, + "created_at": "2022-07-05T19:51:39Z", + "updated_at": "2022-09-01T23:29:48Z", + "pushed_at": "2022-07-05T19:52:05Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0 + }, { "id": 519281774, "name": "CVE-2022-21449-showcase", diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index d1ec582dff..4a50e5abd3 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -18,7 +18,7 @@ "stargazers_count": 190, "watchers_count": 190, "has_discussions": false, - "forks_count": 40, + "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,7 +30,7 @@ "windows-boot" ], "visibility": "public", - "forks": 40, + "forks": 41, "watchers": 190, "score": 0 }, diff --git a/2022/CVE-2022-22620.json b/2022/CVE-2022-22620.json index cc50c0061c..e49b96555c 100644 --- a/2022/CVE-2022-22620.json +++ b/2022/CVE-2022-22620.json @@ -42,10 +42,10 @@ "description": "Webkit (Safari) - Exploit", "fork": false, "created_at": "2022-08-04T07:11:39Z", - "updated_at": "2022-12-20T14:21:05Z", + "updated_at": "2023-03-21T03:58:19Z", "pushed_at": "2022-08-09T13:43:27Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index c3d84d00d1..cf4543f47e 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -637,6 +637,64 @@ "watchers": 0, "score": 0 }, + { + "id": 524471767, + "name": "CVE-2022-22954", + "full_name": "amit-pathak009\/CVE-2022-22954", + "owner": { + "login": "amit-pathak009", + "id": 72250138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", + "html_url": "https:\/\/github.com\/amit-pathak009" + }, + "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954", + "description": null, + "fork": false, + "created_at": "2022-08-13T18:00:04Z", + "updated_at": "2022-06-02T01:44:19Z", + "pushed_at": "2022-06-02T01:44:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 524471940, + "name": "CVE-2022-22954-PoC", + "full_name": "amit-pathak009\/CVE-2022-22954-PoC", + "owner": { + "login": "amit-pathak009", + "id": 72250138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", + "html_url": "https:\/\/github.com\/amit-pathak009" + }, + "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC", + "description": null, + "fork": false, + "created_at": "2022-08-13T18:00:39Z", + "updated_at": "2022-06-01T22:41:09Z", + "pushed_at": "2022-06-01T22:41:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 545257457, "name": "VcenterKiller", diff --git a/2022/CVE-2022-22963.json b/2022/CVE-2022-22963.json index bf17ad39c1..b65a3ebb14 100644 --- a/2022/CVE-2022-22963.json +++ b/2022/CVE-2022-22963.json @@ -226,10 +226,10 @@ "description": "Spring Cloud Function Vulnerable Application \/ CVE-2022-22963", "fork": false, "created_at": "2022-03-31T14:32:14Z", - "updated_at": "2023-03-16T13:37:38Z", + "updated_at": "2023-03-21T04:20:29Z", "pushed_at": "2022-04-01T12:51:25Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -238,7 +238,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 14, + "watchers": 15, "score": 0 }, { @@ -557,7 +557,7 @@ "description": "CVE-2022-22963 RCE PoC in python", "fork": false, "created_at": "2023-03-13T13:28:55Z", - "updated_at": "2023-03-15T03:50:03Z", + "updated_at": "2023-03-21T04:42:34Z", "pushed_at": "2023-03-14T15:23:12Z", "stargazers_count": 1, "watchers_count": 1, @@ -600,5 +600,34 @@ "forks": 0, "watchers": 2, "score": 0 + }, + { + "id": 616814586, + "name": "CVE-2022-22963", + "full_name": "Mustafa1986\/CVE-2022-22963", + "owner": { + "login": "Mustafa1986", + "id": 27927358, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4", + "html_url": "https:\/\/github.com\/Mustafa1986" + }, + "html_url": "https:\/\/github.com\/Mustafa1986\/CVE-2022-22963", + "description": null, + "fork": false, + "created_at": "2023-03-21T06:14:35Z", + "updated_at": "2023-03-21T06:16:01Z", + "pushed_at": "2023-03-21T06:15:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 399a835db9..388d925b5d 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -1896,6 +1896,35 @@ "watchers": 71, "score": 0 }, + { + "id": 510562121, + "name": "CVE-2022-22965", + "full_name": "trhacknon\/CVE-2022-22965", + "owner": { + "login": "trhacknon", + "id": 98242014, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", + "html_url": "https:\/\/github.com\/trhacknon" + }, + "html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22965", + "description": null, + "fork": false, + "created_at": "2022-07-05T02:30:29Z", + "updated_at": "2022-09-27T23:19:26Z", + "pushed_at": "2022-07-05T02:32:04Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 4, + "score": 0 + }, { "id": 510569312, "name": "Spring4Shell-CVE-2022-22965", @@ -2055,10 +2084,10 @@ "description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。", "fork": false, "created_at": "2022-12-28T04:50:16Z", - "updated_at": "2023-03-13T16:46:00Z", + "updated_at": "2023-03-21T06:19:31Z", "pushed_at": "2022-12-29T03:32:45Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -2067,7 +2096,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 41, + "watchers": 48, "score": 0 }, { diff --git a/2022/CVE-2022-24342.json b/2022/CVE-2022-24342.json new file mode 100644 index 0000000000..c0114266b3 --- /dev/null +++ b/2022/CVE-2022-24342.json @@ -0,0 +1,39 @@ +[ + { + "id": 509870464, + "name": "CVE-2022-24342", + "full_name": "yuriisanin\/CVE-2022-24342", + "owner": { + "login": "yuriisanin", + "id": 11749007, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4", + "html_url": "https:\/\/github.com\/yuriisanin" + }, + "html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-24342", + "description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication", + "fork": false, + "created_at": "2022-07-02T22:04:29Z", + "updated_at": "2023-02-12T21:01:11Z", + "pushed_at": "2022-07-05T17:31:35Z", + "stargazers_count": 34, + "watchers_count": 34, + "has_discussions": false, + "forks_count": 6, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "csrf", + "cve", + "cve-2022-24342", + "exploit", + "jetbrains", + "teamcity", + "vulnerability" + ], + "visibility": "public", + "forks": 6, + "watchers": 34, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24706.json b/2022/CVE-2022-24706.json index 005bcb96fc..70ddb064e3 100644 --- a/2022/CVE-2022-24706.json +++ b/2022/CVE-2022-24706.json @@ -57,6 +57,35 @@ "watchers": 0, "score": 0 }, + { + "id": 510182546, + "name": "CVE-2022-24706", + "full_name": "superzerosec\/CVE-2022-24706", + "owner": { + "login": "superzerosec", + "id": 57648217, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4", + "html_url": "https:\/\/github.com\/superzerosec" + }, + "html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-24706", + "description": "CVE-2022-24706 POC exploit", + "fork": false, + "created_at": "2022-07-04T02:06:27Z", + "updated_at": "2022-07-04T02:06:27Z", + "pushed_at": "2022-07-04T02:06:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 533101052, "name": "CVE-2022-24706-CouchDB-Exploit", diff --git a/2022/CVE-2022-24715.json b/2022/CVE-2022-24715.json index 55bdc83d5a..9bc89ce826 100644 --- a/2022/CVE-2022-24715.json +++ b/2022/CVE-2022-24715.json @@ -13,10 +13,10 @@ "description": " Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10", "fork": false, "created_at": "2023-03-20T04:31:32Z", - "updated_at": "2023-03-20T19:53:26Z", + "updated_at": "2023-03-21T03:15:54Z", "pushed_at": "2023-03-20T18:07:40Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-24716.json b/2022/CVE-2022-24716.json index fd831fc3c1..2df9e11ad1 100644 --- a/2022/CVE-2022-24716.json +++ b/2022/CVE-2022-24716.json @@ -13,10 +13,10 @@ "description": "Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10", "fork": false, "created_at": "2023-03-19T20:41:46Z", - "updated_at": "2023-03-20T23:34:15Z", + "updated_at": "2023-03-21T05:04:57Z", "pushed_at": "2023-03-20T05:02:21Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 8, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 20ea2a2a7c..0162e5a85f 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2023-03-20T13:28:53Z", + "updated_at": "2023-03-21T06:02:42Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 948, - "watchers_count": 948, + "stargazers_count": 947, + "watchers_count": 947, "has_discussions": true, "forks_count": 165, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 165, - "watchers": 948, + "watchers": 947, "score": 0 }, { @@ -1280,6 +1280,35 @@ "watchers": 0, "score": 0 }, + { + "id": 510402169, + "name": "TryHackMe-Atlassian-CVE-2022-26134", + "full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134", + "owner": { + "login": "r1skkam", + "id": 58542375, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4", + "html_url": "https:\/\/github.com\/r1skkam" + }, + "html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134", + "description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.", + "fork": false, + "created_at": "2022-07-04T15:00:21Z", + "updated_at": "2022-07-19T02:30:51Z", + "pushed_at": "2022-07-04T16:49:41Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 510586350, "name": "CVE-2022-26134", @@ -1314,6 +1343,44 @@ "watchers": 10, "score": 0 }, + { + "id": 510624422, + "name": "CVE-2022-26134", + "full_name": "Debajyoti0-0\/CVE-2022-26134", + "owner": { + "login": "Debajyoti0-0", + "id": 79437050, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4", + "html_url": "https:\/\/github.com\/Debajyoti0-0" + }, + "html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134", + "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).", + "fork": false, + "created_at": "2022-07-05T07:04:50Z", + "updated_at": "2022-07-10T08:52:10Z", + "pushed_at": "2022-07-05T09:40:39Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "atlassian-confluence", + "cve-2022-26134", + "infosec", + "ognl-injection-vulnerability", + "payload", + "python", + "rce", + "unauthenticated" + ], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 + }, { "id": 510946912, "name": "cve-2022-26134", diff --git a/2022/CVE-2022-26763.json b/2022/CVE-2022-26763.json new file mode 100644 index 0000000000..0e6526a6f4 --- /dev/null +++ b/2022/CVE-2022-26763.json @@ -0,0 +1,31 @@ +[ + { + "id": 509675215, + "name": "PCICrash", + "full_name": "zhuowei\/PCICrash", + "owner": { + "login": "zhuowei", + "id": 704768, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4", + "html_url": "https:\/\/github.com\/zhuowei" + }, + "html_url": "https:\/\/github.com\/zhuowei\/PCICrash", + "description": "PCIDriverKit proof-of-concept for CVE-2022-26763", + "fork": false, + "created_at": "2022-07-02T06:15:29Z", + "updated_at": "2022-09-15T17:20:03Z", + "pushed_at": "2022-07-02T06:15:40Z", + "stargazers_count": 36, + "watchers_count": 36, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 36, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26766.json b/2022/CVE-2022-26766.json new file mode 100644 index 0000000000..3d549753a1 --- /dev/null +++ b/2022/CVE-2022-26766.json @@ -0,0 +1,31 @@ +[ + { + "id": 509675427, + "name": "CoreTrustDemo", + "full_name": "zhuowei\/CoreTrustDemo", + "owner": { + "login": "zhuowei", + "id": 704768, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4", + "html_url": "https:\/\/github.com\/zhuowei" + }, + "html_url": "https:\/\/github.com\/zhuowei\/CoreTrustDemo", + "description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1", + "fork": false, + "created_at": "2022-07-02T06:16:33Z", + "updated_at": "2023-02-26T02:08:22Z", + "pushed_at": "2022-07-02T17:14:41Z", + "stargazers_count": 74, + "watchers_count": 74, + "has_discussions": false, + "forks_count": 12, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 12, + "watchers": 74, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28219.json b/2022/CVE-2022-28219.json index f07cb82b26..a408c68aa8 100644 --- a/2022/CVE-2022-28219.json +++ b/2022/CVE-2022-28219.json @@ -28,6 +28,35 @@ "watchers": 38, "score": 0 }, + { + "id": 509605278, + "name": "manageengine-auditad-cve-2022-28219", + "full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219", + "owner": { + "login": "rbowes-r7", + "id": 104588115, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4", + "html_url": "https:\/\/github.com\/rbowes-r7" + }, + "html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219", + "description": null, + "fork": false, + "created_at": "2022-07-01T22:40:46Z", + "updated_at": "2022-07-19T13:50:08Z", + "pushed_at": "2022-07-05T22:13:12Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0 + }, { "id": 518384320, "name": "CVE-2022-28219-Like", diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index e9e8137b49..0b47aef01e 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -554,6 +554,64 @@ "watchers": 4, "score": 0 }, + { + "id": 524474931, + "name": "CVE-2022-29464", + "full_name": "amit-pathak009\/CVE-2022-29464", + "owner": { + "login": "amit-pathak009", + "id": 72250138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", + "html_url": "https:\/\/github.com\/amit-pathak009" + }, + "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464", + "description": null, + "fork": false, + "created_at": "2022-08-13T18:14:43Z", + "updated_at": "2022-05-19T21:24:13Z", + "pushed_at": "2022-05-19T21:24:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 524475053, + "name": "CVE-2022-29464-mass", + "full_name": "amit-pathak009\/CVE-2022-29464-mass", + "owner": { + "login": "amit-pathak009", + "id": 72250138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", + "html_url": "https:\/\/github.com\/amit-pathak009" + }, + "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass", + "description": null, + "fork": false, + "created_at": "2022-08-13T18:15:18Z", + "updated_at": "2023-01-11T06:21:01Z", + "pushed_at": "2022-05-29T19:16:06Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0 + }, { "id": 540011346, "name": "CVE-2022-29464", diff --git a/2022/CVE-2022-29885.json b/2022/CVE-2022-29885.json index 049f063d7e..ecc43149a6 100644 --- a/2022/CVE-2022-29885.json +++ b/2022/CVE-2022-29885.json @@ -27,5 +27,34 @@ "forks": 4, "watchers": 4, "score": 0 + }, + { + "id": 509388193, + "name": "CVE-2022-29885", + "full_name": "iveresk\/CVE-2022-29885", + "owner": { + "login": "iveresk", + "id": 28754633, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", + "html_url": "https:\/\/github.com\/iveresk" + }, + "html_url": "https:\/\/github.com\/iveresk\/CVE-2022-29885", + "description": "Apache Tomcat DoS (CVE-2022-29885) Exploit", + "fork": false, + "created_at": "2022-07-01T09:02:10Z", + "updated_at": "2023-01-24T17:20:21Z", + "pushed_at": "2022-07-05T06:23:18Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-30333.json b/2022/CVE-2022-30333.json index 5477b9db81..b7efd96188 100644 --- a/2022/CVE-2022-30333.json +++ b/2022/CVE-2022-30333.json @@ -1,4 +1,33 @@ [ + { + "id": 510563141, + "name": "CVE-2022-30333-PoC", + "full_name": "TheL1ghtVn\/CVE-2022-30333-PoC", + "owner": { + "login": "TheL1ghtVn", + "id": 89027345, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027345?v=4", + "html_url": "https:\/\/github.com\/TheL1ghtVn" + }, + "html_url": "https:\/\/github.com\/TheL1ghtVn\/CVE-2022-30333-PoC", + "description": null, + "fork": false, + "created_at": "2022-07-05T02:35:12Z", + "updated_at": "2022-11-19T19:17:38Z", + "pushed_at": "2022-07-05T02:58:30Z", + "stargazers_count": 14, + "watchers_count": 14, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 14, + "score": 0 + }, { "id": 514420724, "name": "unrar-cve-2022-30333-poc", diff --git a/2022/CVE-2022-30594.json b/2022/CVE-2022-30594.json new file mode 100644 index 0000000000..dc45e8bbdf --- /dev/null +++ b/2022/CVE-2022-30594.json @@ -0,0 +1,31 @@ +[ + { + "id": 510304709, + "name": "linux-4.19.72_CVE-2022-30594", + "full_name": "nidhi7598\/linux-4.19.72_CVE-2022-30594", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/linux-4.19.72_CVE-2022-30594", + "description": null, + "fork": false, + "created_at": "2022-07-04T10:01:05Z", + "updated_at": "2023-03-08T01:26:26Z", + "pushed_at": "2022-07-04T10:18:57Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30887.json b/2022/CVE-2022-30887.json new file mode 100644 index 0000000000..26fa6ca150 --- /dev/null +++ b/2022/CVE-2022-30887.json @@ -0,0 +1,31 @@ +[ + { + "id": 510479826, + "name": "CVE-2022-30887", + "full_name": "MuallimNaci\/CVE-2022-30887", + "owner": { + "login": "MuallimNaci", + "id": 87265009, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87265009?v=4", + "html_url": "https:\/\/github.com\/MuallimNaci" + }, + "html_url": "https:\/\/github.com\/MuallimNaci\/CVE-2022-30887", + "description": null, + "fork": false, + "created_at": "2022-07-04T19:24:56Z", + "updated_at": "2022-12-08T03:15:35Z", + "pushed_at": "2022-07-04T19:30:52Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30929.json b/2022/CVE-2022-30929.json new file mode 100644 index 0000000000..a39df0b2e4 --- /dev/null +++ b/2022/CVE-2022-30929.json @@ -0,0 +1,31 @@ +[ + { + "id": 511398695, + "name": "CVE-2022-30929", + "full_name": "nanaao\/CVE-2022-30929", + "owner": { + "login": "nanaao", + "id": 77666853, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4", + "html_url": "https:\/\/github.com\/nanaao" + }, + "html_url": "https:\/\/github.com\/nanaao\/CVE-2022-30929", + "description": "CVE-2022-30929 POC", + "fork": false, + "created_at": "2022-07-07T05:44:56Z", + "updated_at": "2023-01-31T12:52:11Z", + "pushed_at": "2022-07-04T06:19:57Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33679.json b/2022/CVE-2022-33679.json index d58e364a63..aa5247976d 100644 --- a/2022/CVE-2022-33679.json +++ b/2022/CVE-2022-33679.json @@ -18,13 +18,13 @@ "stargazers_count": 368, "watchers_count": 368, "has_discussions": false, - "forks_count": 67, + "forks_count": 68, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 67, + "forks": 68, "watchers": 368, "score": 0 }, diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json index 1fbd83bf61..752ab48689 100644 --- a/2022/CVE-2022-3602.json +++ b/2022/CVE-2022-3602.json @@ -18,7 +18,7 @@ "stargazers_count": 531, "watchers_count": 531, "has_discussions": false, - "forks_count": 107, + "forks_count": 108, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,7 +29,7 @@ "spookyssl" ], "visibility": "public", - "forks": 107, + "forks": 108, "watchers": 531, "score": 0 }, diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index 942dc292b2..8c8d12f46e 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -282,10 +282,10 @@ "description": "CobaltStrike <= 4.7.1 RCE", "fork": false, "created_at": "2022-10-14T11:46:01Z", - "updated_at": "2023-03-14T08:24:24Z", + "updated_at": "2023-03-21T01:16:37Z", "pushed_at": "2022-10-25T05:32:54Z", - "stargazers_count": 314, - "watchers_count": 314, + "stargazers_count": 315, + "watchers_count": 315, "has_discussions": false, "forks_count": 80, "allow_forking": true, @@ -294,7 +294,7 @@ "topics": [], "visibility": "public", "forks": 80, - "watchers": 314, + "watchers": 315, "score": 0 }, { diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index dbe1641a55..3e67019617 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -609,10 +609,10 @@ "description": "一键枚举所有用户名以及写入SSH公钥", "fork": false, "created_at": "2023-02-27T18:05:34Z", - "updated_at": "2023-03-01T01:51:12Z", + "updated_at": "2023-03-21T04:01:30Z", "pushed_at": "2023-02-27T18:10:44Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -621,7 +621,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-42475.json b/2022/CVE-2022-42475.json index 843881e1fb..e6125fc984 100644 --- a/2022/CVE-2022-42475.json +++ b/2022/CVE-2022-42475.json @@ -46,19 +46,19 @@ "description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon", "fork": false, "created_at": "2023-02-23T10:04:58Z", - "updated_at": "2023-03-17T16:17:11Z", + "updated_at": "2023-03-21T05:37:33Z", "pushed_at": "2023-03-14T08:41:51Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, - "watchers": 50, + "forks": 17, + "watchers": 54, "score": 0 }, { diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index d9896cf7f4..539528b37c 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -18,13 +18,13 @@ "stargazers_count": 215, "watchers_count": 215, "has_discussions": false, - "forks_count": 31, + "forks_count": 32, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 31, + "forks": 32, "watchers": 215, "score": 0 }, @@ -190,10 +190,10 @@ "description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read", "fork": false, "created_at": "2023-02-05T18:42:27Z", - "updated_at": "2023-03-20T11:50:52Z", + "updated_at": "2023-03-21T06:06:29Z", "pushed_at": "2023-02-05T19:35:03Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -202,7 +202,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 117, + "watchers": 118, "score": 0 }, { diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json index 5b0e42def8..2e3283c240 100644 --- a/2022/CVE-2022-46169.json +++ b/2022/CVE-2022-46169.json @@ -287,7 +287,7 @@ "fork": false, "created_at": "2023-03-20T22:54:18Z", "updated_at": "2023-03-20T23:57:27Z", - "pushed_at": "2023-03-20T23:31:38Z", + "pushed_at": "2023-03-21T04:56:18Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 0c119c4846..ce5136c6db 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -158,10 +158,10 @@ "description": "CVE-2022-46689", "fork": false, "created_at": "2023-01-03T21:46:37Z", - "updated_at": "2023-03-20T05:53:55Z", + "updated_at": "2023-03-21T02:32:37Z", "pushed_at": "2023-01-19T08:04:02Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -170,7 +170,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 53, + "watchers": 54, "score": 0 }, { diff --git a/2023/CVE-2023-0179.json b/2023/CVE-2023-0179.json index d742aa931b..5b74a668e5 100644 --- a/2023/CVE-2023-0179.json +++ b/2023/CVE-2023-0179.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-01-21T01:02:01Z", - "updated_at": "2023-03-20T10:23:36Z", + "updated_at": "2023-03-21T04:41:18Z", "pushed_at": "2023-02-16T13:49:47Z", - "stargazers_count": 138, - "watchers_count": 138, + "stargazers_count": 139, + "watchers_count": 139, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 138, + "watchers": 139, "score": 0 }, { @@ -42,10 +42,10 @@ "description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。", "fork": false, "created_at": "2023-03-16T02:20:52Z", - "updated_at": "2023-03-20T20:14:54Z", + "updated_at": "2023-03-21T03:34:04Z", "pushed_at": "2023-03-16T02:22:28Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 27, + "watchers": 28, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-0286.json b/2023/CVE-2023-0286.json new file mode 100644 index 0000000000..421995d8bf --- /dev/null +++ b/2023/CVE-2023-0286.json @@ -0,0 +1,31 @@ +[ + { + "id": 616793748, + "name": "OPENSSL_1.1.11g_G3_CVE-2023-0286", + "full_name": "nidhi7598\/OPENSSL_1.1.11g_G3_CVE-2023-0286", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/OPENSSL_1.1.11g_G3_CVE-2023-0286", + "description": null, + "fork": false, + "created_at": "2023-03-21T04:57:37Z", + "updated_at": "2023-03-21T05:08:08Z", + "pushed_at": "2023-03-21T05:08:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 69c7bfe6a7..2a5376e266 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,10 +13,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2023-03-20T22:51:34Z", + "updated_at": "2023-03-21T05:51:17Z", "pushed_at": "2023-03-10T08:58:44Z", - "stargazers_count": 315, - "watchers_count": 315, + "stargazers_count": 317, + "watchers_count": 317, "has_discussions": false, "forks_count": 117, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 117, - "watchers": 315, + "watchers": 317, "score": 0 }, { @@ -122,5 +122,34 @@ "forks": 1, "watchers": 11, "score": 0 + }, + { + "id": 616747050, + "name": "Windows_AFD_LPE_CVE-2023-21768", + "full_name": "HKxiaoli\/Windows_AFD_LPE_CVE-2023-21768", + "owner": { + "login": "HKxiaoli", + "id": 65068574, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65068574?v=4", + "html_url": "https:\/\/github.com\/HKxiaoli" + }, + "html_url": "https:\/\/github.com\/HKxiaoli\/Windows_AFD_LPE_CVE-2023-21768", + "description": "Windows 11 System Permission Elevation", + "fork": false, + "created_at": "2023-03-21T01:58:40Z", + "updated_at": "2023-03-21T02:28:18Z", + "pushed_at": "2023-03-21T02:31:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-22974.json b/2023/CVE-2023-22974.json index 6a85588821..32cfc6eb08 100644 --- a/2023/CVE-2023-22974.json +++ b/2023/CVE-2023-22974.json @@ -13,10 +13,10 @@ "description": "OpenEMR < 7.0.0 Arbitrary File Read", "fork": false, "created_at": "2023-02-23T18:14:05Z", - "updated_at": "2023-03-17T15:35:37Z", + "updated_at": "2023-03-21T04:41:20Z", "pushed_at": "2023-02-23T18:15:34Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index b89993580f..f37f12ad3e 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -13,10 +13,10 @@ "description": "Exploit for the CVE-2023-23397", "fork": false, "created_at": "2023-03-15T17:03:38Z", - "updated_at": "2023-03-21T00:18:35Z", + "updated_at": "2023-03-21T03:01:05Z", "pushed_at": "2023-03-15T17:53:53Z", - "stargazers_count": 123, - "watchers_count": 123, + "stargazers_count": 125, + "watchers_count": 125, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 123, + "watchers": 125, "score": 0 }, { @@ -168,10 +168,10 @@ "description": null, "fork": false, "created_at": "2023-03-16T19:43:39Z", - "updated_at": "2023-03-21T00:18:00Z", + "updated_at": "2023-03-21T04:41:50Z", "pushed_at": "2023-03-17T07:47:40Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 215, + "watchers_count": 215, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -180,7 +180,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 212, + "watchers": 215, "score": 0 }, { @@ -371,10 +371,10 @@ "description": "Simple CVE-2023-23397 poc with sending of the payload by email.", "fork": false, "created_at": "2023-03-20T16:31:54Z", - "updated_at": "2023-03-21T00:22:14Z", + "updated_at": "2023-03-21T03:18:05Z", "pushed_at": "2023-03-20T16:55:25Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -383,7 +383,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2023/CVE-2023-27326.json b/2023/CVE-2023-27326.json index 57eb702141..9e96ec1cbb 100644 --- a/2023/CVE-2023-27326.json +++ b/2023/CVE-2023-27326.json @@ -13,19 +13,19 @@ "description": "VM Escape for Parallels Desktop <18.1.1", "fork": false, "created_at": "2023-03-20T11:47:54Z", - "updated_at": "2023-03-20T23:40:35Z", + "updated_at": "2023-03-21T06:26:59Z", "pushed_at": "2023-03-20T12:51:29Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, - "forks_count": 1, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 11, + "forks": 4, + "watchers": 29, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index c19fdfc1fd..29b656785b 100644 --- a/README.md +++ b/README.md @@ -20,6 +20,14 @@ An issue has been discovered in GitLab affecting all versions starting from 13.7 ### CVE-2023-0264 - [twwd/CVE-2023-0264](https://github.com/twwd/CVE-2023-0264) +### CVE-2023-0286 (2023-02-08) + + +There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network. + + +- [nidhi7598/OPENSSL_1.1.11g_G3_CVE-2023-0286](https://github.com/nidhi7598/OPENSSL_1.1.11g_G3_CVE-2023-0286) + ### CVE-2023-0297 (2023-01-13) @@ -158,6 +166,7 @@ Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerabili - [cl4ym0re/cve-2023-21768-compiled](https://github.com/cl4ym0re/cve-2023-21768-compiled) - [SamuelTulach/nullmap](https://github.com/SamuelTulach/nullmap) - [Malwareman007/CVE-2023-21768](https://github.com/Malwareman007/CVE-2023-21768) +- [HKxiaoli/Windows_AFD_LPE_CVE-2023-21768](https://github.com/HKxiaoli/Windows_AFD_LPE_CVE-2023-21768) ### CVE-2023-21839 (2023-01-17) @@ -697,6 +706,8 @@ A flaw was found in the way the "flags" member of the new pipe buffer - [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher) - [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape) - [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits) +- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection) +- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe) - [eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits) - [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847) - [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape) @@ -713,6 +724,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer - [ajith737/Dirty-Pipe-CVE-2022-0847-POCs](https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs) - [mutur4/CVE-2022-0847](https://github.com/mutur4/CVE-2022-0847) - [orsuprasad/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits) +- [4bhishek0/CVE-2022-0847](https://github.com/4bhishek0/CVE-2022-0847) ### CVE-2022-0848 (2022-03-04) @@ -947,6 +959,8 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5. - [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC) - [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388) - [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388) +- [Luchoane/CVE-2022-1388_refresh](https://github.com/Luchoane/CVE-2022-1388_refresh) +- [jbharucha05/CVE-2022-1388](https://github.com/jbharucha05/CVE-2022-1388) - [On-Cyber-War/CVE-2022-1388](https://github.com/On-Cyber-War/CVE-2022-1388) - [OnCyberWar/CVE-2022-1388](https://github.com/OnCyberWar/CVE-2022-1388) - [revanmalang/CVE-2022-1388](https://github.com/revanmalang/CVE-2022-1388) @@ -1337,6 +1351,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther - [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007) - [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007) +### CVE-2022-20124 (2022-06-15) + + +In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036 + + +- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-) + ### CVE-2022-20126 (2022-06-15) @@ -1348,6 +1370,14 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo ### CVE-2022-20128 - [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128) +### CVE-2022-20130 (2022-06-15) + + +In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979 + + +- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130) + ### CVE-2022-20133 (2022-06-15) @@ -1356,6 +1386,14 @@ In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of - [nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133](https://github.com/nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133) +### CVE-2022-20135 (2022-06-15) + + +In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465 + + +- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-) + ### CVE-2022-20138 (2022-06-15) @@ -1372,6 +1410,7 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962 +- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142) - [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142) ### CVE-2022-20186 (2022-06-15) @@ -1562,6 +1601,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o - [thack1/CVE-2022-21449](https://github.com/thack1/CVE-2022-21449) - [Damok82/SignChecker](https://github.com/Damok82/SignChecker) - [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449) +- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC) - [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase) - [davwwwx/CVE-2022-21449](https://github.com/davwwwx/CVE-2022-21449) @@ -2012,6 +2052,8 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution - [badboy-sft/CVE-2022-22954](https://github.com/badboy-sft/CVE-2022-22954) - [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954) - [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954) +- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954) +- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC) - [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller) - [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_) - [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954) @@ -2042,6 +2084,7 @@ In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, w - [charis3306/CVE-2022-22963](https://github.com/charis3306/CVE-2022-22963) - [lemmyz4n3771/CVE-2022-22963-PoC](https://github.com/lemmyz4n3771/CVE-2022-22963-PoC) - [J0ey17/CVE-2022-22963_Reverse-Shell-Exploit](https://github.com/J0ey17/CVE-2022-22963_Reverse-Shell-Exploit) +- [Mustafa1986/CVE-2022-22963](https://github.com/Mustafa1986/CVE-2022-22963) ### CVE-2022-22965 (2022-04-01) @@ -2112,6 +2155,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t - [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965) - [cxzero/CVE-2022-22965-spring4shell](https://github.com/cxzero/CVE-2022-22965-spring4shell) - [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan) +- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965) - [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965) - [iloveflag/Fast-CVE-2022-22965](https://github.com/iloveflag/Fast-CVE-2022-22965) - [ClemExp/CVE-2022-22965-PoC](https://github.com/ClemExp/CVE-2022-22965-PoC) @@ -2497,6 +2541,14 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System - [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181) +### CVE-2022-24342 (2022-02-25) + + +In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible. + + +- [yuriisanin/CVE-2022-24342](https://github.com/yuriisanin/CVE-2022-24342) + ### CVE-2022-24348 (2022-02-04) @@ -2615,6 +2667,7 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d - [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit) - [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-) +- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706) - [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit) ### CVE-2022-24707 (2022-02-23) @@ -3020,7 +3073,9 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134) - [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134) - [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU) +- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134) - [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134) +- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134) - [f4yd4-s3c/cve-2022-26134](https://github.com/f4yd4-s3c/cve-2022-26134) - [coskper-papa/CVE-2022-26134](https://github.com/coskper-papa/CVE-2022-26134) - [p4b3l1t0/confusploit](https://github.com/p4b3l1t0/confusploit) @@ -3146,6 +3201,22 @@ A use after free issue was addressed with improved memory management. This issue - [Dylbin/flow_divert](https://github.com/Dylbin/flow_divert) +### CVE-2022-26763 (2022-05-26) + + +An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges. + + +- [zhuowei/PCICrash](https://github.com/zhuowei/PCICrash) + +### CVE-2022-26766 (2022-05-26) + + +A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation. + + +- [zhuowei/CoreTrustDemo](https://github.com/zhuowei/CoreTrustDemo) + ### CVE-2022-26809 (2022-04-15) @@ -3394,6 +3465,7 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe - [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219) +- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219) - [aeifkz/CVE-2022-28219-Like](https://github.com/aeifkz/CVE-2022-28219-Like) ### CVE-2022-28281 (2022-12-22) @@ -3668,6 +3740,8 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code - [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464) - [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464) - [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464) +- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464) +- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass) - [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464) - [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464) - [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-) @@ -3774,6 +3848,7 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20 - [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885) +- [iveresk/CVE-2022-29885](https://github.com/iveresk/CVE-2022-29885) ### CVE-2022-29932 (2022-05-11) @@ -3953,6 +4028,7 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected. +- [TheL1ghtVn/CVE-2022-30333-PoC](https://github.com/TheL1ghtVn/CVE-2022-30333-PoC) - [rbowes-r7/unrar-cve-2022-30333-poc](https://github.com/rbowes-r7/unrar-cve-2022-30333-poc) - [J0hnbX/CVE-2022-30333](https://github.com/J0hnbX/CVE-2022-30333) - [aslitsecurity/Zimbra-CVE-2022-30333](https://github.com/aslitsecurity/Zimbra-CVE-2022-30333) @@ -4063,6 +4139,14 @@ liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandl - [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks) +### CVE-2022-30594 (2022-05-12) + + +The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. + + +- [nidhi7598/linux-4.19.72_CVE-2022-30594](https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594) + ### CVE-2022-30600 (2022-05-18) @@ -4090,6 +4174,22 @@ Gitea before 1.16.7 does not escape git fetch remote. - [wuhan005/CVE-2022-30781](https://github.com/wuhan005/CVE-2022-30781) +### CVE-2022-30887 (2022-05-20) + + +Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file. + + +- [MuallimNaci/CVE-2022-30887](https://github.com/MuallimNaci/CVE-2022-30887) + +### CVE-2022-30929 (2022-07-06) + + +Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper. + + +- [nanaao/CVE-2022-30929](https://github.com/nanaao/CVE-2022-30929) + ### CVE-2022-31007 (2022-05-31) @@ -7485,6 +7585,7 @@ It was found that polkit could be tricked into bypassing the credential checks f - [Almorabea/Polkit-exploit](https://github.com/Almorabea/Polkit-exploit) - [AssassinUKG/Polkit-CVE-2021-3560](https://github.com/AssassinUKG/Polkit-CVE-2021-3560) - [cpu0x00/CVE-2021-3560](https://github.com/cpu0x00/CVE-2021-3560) +- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560) - [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560) - [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560) - [n3onhacks/CVE-2021-3560](https://github.com/n3onhacks/CVE-2021-3560) @@ -10393,14 +10494,6 @@ A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in - [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833) -### CVE-2021-37850 (2021-11-08) - - -ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot. - - -- [p1atdev/CVE-2021-37850](https://github.com/p1atdev/CVE-2021-37850) - ### CVE-2021-37910 (2021-11-11) @@ -14206,6 +14299,7 @@ The X.509 GeneralName type is a generic type for representing different types of - [MBHudson/CVE-2020-1971](https://github.com/MBHudson/CVE-2020-1971) +- [nidhi7598/OPENSSL_1.1.11g_G3_CVE-2020-1971](https://github.com/nidhi7598/OPENSSL_1.1.11g_G3_CVE-2020-1971) ### CVE-2020-2034 (2020-07-08)