diff --git a/2009/CVE-2009-2698.json b/2009/CVE-2009-2698.json index f9895ccb94..ae0c7035bf 100644 --- a/2009/CVE-2009-2698.json +++ b/2009/CVE-2009-2698.json @@ -13,10 +13,10 @@ "description": "CVE-2009-2698 compiled for CentOS 4.8", "fork": false, "created_at": "2018-02-16T16:17:24Z", - "updated_at": "2022-09-04T15:03:50Z", + "updated_at": "2022-09-20T14:30:01Z", "pushed_at": "2018-02-16T16:30:00Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index eff7450bba..5aad1f27db 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -213,13 +213,13 @@ "pushed_at": "2016-01-22T00:42:35Z", "stargazers_count": 317, "watchers_count": 317, - "forks_count": 83, + "forks_count": 84, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 83, + "forks": 84, "watchers": 317, "score": 0 }, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index efd588fe59..fd142fd0b2 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -41,11 +41,11 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-19T12:49:56Z", + "updated_at": "2022-09-20T17:39:05Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1508, - "watchers_count": 1508, - "forks_count": 309, + "stargazers_count": 1510, + "watchers_count": 1510, + "forks_count": 310, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -72,8 +72,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 309, - "watchers": 1508, + "forks": 310, + "watchers": 1510, "score": 0 }, { diff --git a/2015/CVE-2015-7547.json b/2015/CVE-2015-7547.json index 4c72b48250..190c3e854b 100644 --- a/2015/CVE-2015-7547.json +++ b/2015/CVE-2015-7547.json @@ -17,13 +17,13 @@ "pushed_at": "2016-02-20T07:57:58Z", "stargazers_count": 549, "watchers_count": 549, - "forks_count": 178, + "forks_count": 179, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 178, + "forks": 179, "watchers": 549, "score": 0 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 7ae95a3dbe..13e18e068b 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,11 +13,11 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-19T12:49:56Z", + "updated_at": "2022-09-20T17:39:05Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1508, - "watchers_count": 1508, - "forks_count": 309, + "stargazers_count": 1510, + "watchers_count": 1510, + "forks_count": 310, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,8 +44,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 309, - "watchers": 1508, + "forks": 310, + "watchers": 1510, "score": 0 }, { diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index fb01aba6ae..45ccfe8ac3 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -185,13 +185,13 @@ "pushed_at": "2022-09-16T12:53:46Z", "stargazers_count": 121, "watchers_count": 121, - "forks_count": 39, + "forks_count": 40, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 39, + "forks": 40, "watchers": 121, "score": 0 }, diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index 7798f460bd..318b6f454a 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -17,13 +17,13 @@ "pushed_at": "2017-10-11T07:43:50Z", "stargazers_count": 373, "watchers_count": 373, - "forks_count": 137, + "forks_count": 138, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 137, + "forks": 138, "watchers": 373, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index cd7edf2a3f..02dd2f3821 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -41,11 +41,11 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-19T12:49:56Z", + "updated_at": "2022-09-20T17:39:05Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1508, - "watchers_count": 1508, - "forks_count": 309, + "stargazers_count": 1510, + "watchers_count": 1510, + "forks_count": 310, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -72,8 +72,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 309, - "watchers": 1508, + "forks": 310, + "watchers": 1510, "score": 0 }, { diff --git a/2017/CVE-2017-5124.json b/2017/CVE-2017-5124.json index 24311ce529..7a95783cfb 100644 --- a/2017/CVE-2017-5124.json +++ b/2017/CVE-2017-5124.json @@ -17,13 +17,13 @@ "pushed_at": "2017-11-14T10:26:28Z", "stargazers_count": 159, "watchers_count": 159, - "forks_count": 35, + "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 35, + "forks": 36, "watchers": 159, "score": 0 } diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index a8b65cfa5c..a176b9dc59 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -393,7 +393,7 @@ "pushed_at": "2018-05-21T18:33:26Z", "stargazers_count": 409, "watchers_count": 409, - "forks_count": 149, + "forks_count": 150, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -405,7 +405,7 @@ "struts-pwn" ], "visibility": "public", - "forks": 149, + "forks": 150, "watchers": 409, "score": 0 }, diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index 4b664cf22e..a3ef30a191 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -157,13 +157,13 @@ "pushed_at": "2022-07-20T09:37:27Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2018/CVE-2018-0886.json b/2018/CVE-2018-0886.json index 29cd908ef8..e7bedcd659 100644 --- a/2018/CVE-2018-0886.json +++ b/2018/CVE-2018-0886.json @@ -13,7 +13,7 @@ "description": "A code demonstrating CVE-2018-0886", "fork": false, "created_at": "2018-04-02T12:52:07Z", - "updated_at": "2022-09-01T08:49:11Z", + "updated_at": "2022-09-20T14:04:46Z", "pushed_at": "2020-08-14T16:33:44Z", "stargazers_count": 253, "watchers_count": 253, diff --git a/2018/CVE-2018-10562.json b/2018/CVE-2018-10562.json index b2c97fe721..8c31908f55 100644 --- a/2018/CVE-2018-10562.json +++ b/2018/CVE-2018-10562.json @@ -17,13 +17,13 @@ "pushed_at": "2018-05-10T15:08:43Z", "stargazers_count": 213, "watchers_count": 213, - "forks_count": 70, + "forks_count": 71, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 70, + "forks": 71, "watchers": 213, "score": 0 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 2b1fe274bd..1cc3193d64 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -549,11 +549,11 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-19T12:49:56Z", + "updated_at": "2022-09-20T17:39:05Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1508, - "watchers_count": 1508, - "forks_count": 309, + "stargazers_count": 1510, + "watchers_count": 1510, + "forks_count": 310, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -580,8 +580,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 309, - "watchers": 1508, + "forks": 310, + "watchers": 1510, "score": 0 }, { diff --git a/2019/CVE-2019-12725.json b/2019/CVE-2019-12725.json index 6ad51dc56c..5208f31fd7 100644 --- a/2019/CVE-2019-12725.json +++ b/2019/CVE-2019-12725.json @@ -41,10 +41,10 @@ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "fork": false, "created_at": "2021-05-22T05:06:33Z", - "updated_at": "2022-09-16T15:29:24Z", + "updated_at": "2022-09-20T13:12:06Z", "pushed_at": "2021-11-21T10:34:06Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "forks_count": 28, "allow_forking": true, "is_template": false, @@ -56,7 +56,7 @@ ], "visibility": "public", "forks": 28, - "watchers": 109, + "watchers": 110, "score": 0 }, { diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index a936968652..ff08aa0fb2 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -13,10 +13,10 @@ "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", "fork": false, "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2022-08-13T14:27:54Z", + "updated_at": "2022-09-20T16:23:17Z", "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 159, - "watchers_count": 159, + "stargazers_count": 160, + "watchers_count": 160, "forks_count": 51, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 51, - "watchers": 159, + "watchers": 160, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index a5c917be53..f0de247fbb 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -41,10 +41,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-09-20T08:19:37Z", + "updated_at": "2022-09-20T14:17:29Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3545, - "watchers_count": 3545, + "stargazers_count": 3547, + "watchers_count": 3547, "forks_count": 1040, "allow_forking": true, "is_template": false, @@ -72,7 +72,7 @@ ], "visibility": "public", "forks": 1040, - "watchers": 3545, + "watchers": 3547, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 6f80e0af6c..01a4edec94 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -181,11 +181,11 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-19T12:49:56Z", + "updated_at": "2022-09-20T17:39:05Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1508, - "watchers_count": 1508, - "forks_count": 309, + "stargazers_count": 1510, + "watchers_count": 1510, + "forks_count": 310, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -212,8 +212,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 309, - "watchers": 1508, + "forks": 310, + "watchers": 1510, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index b0617313de..e91ee63698 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -377,10 +377,10 @@ "description": "WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit ", "fork": false, "created_at": "2019-08-23T01:42:57Z", - "updated_at": "2022-08-27T13:33:01Z", + "updated_at": "2022-09-20T13:29:24Z", "pushed_at": "2019-09-26T05:46:14Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -388,7 +388,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 41, + "watchers": 42, "score": 0 }, { diff --git a/2019/CVE-2019-6225.json b/2019/CVE-2019-6225.json index dd6f97df70..b0efd969de 100644 --- a/2019/CVE-2019-6225.json +++ b/2019/CVE-2019-6225.json @@ -13,10 +13,10 @@ "description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)", "fork": false, "created_at": "2019-01-31T01:03:43Z", - "updated_at": "2022-07-10T07:00:23Z", + "updated_at": "2022-09-20T14:26:24Z", "pushed_at": "2019-01-31T00:53:03Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 73, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 73, - "watchers": 13, + "watchers": 14, "score": 0 }, { diff --git a/2019/CVE-2019-9193.json b/2019/CVE-2019-9193.json index 4a33e4d72f..84b05a60c6 100644 --- a/2019/CVE-2019-9193.json +++ b/2019/CVE-2019-9193.json @@ -1,19 +1,19 @@ [ { "id": 239892391, - "name": "CVE-2019-9193", - "full_name": "wkjung0624\/CVE-2019-9193", + "name": "cve-2019-9193", + "full_name": "wkjung0624\/cve-2019-9193", "owner": { "login": "wkjung0624", "id": 35141349, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35141349?v=4", "html_url": "https:\/\/github.com\/wkjung0624" }, - "html_url": "https:\/\/github.com\/wkjung0624\/CVE-2019-9193", + "html_url": "https:\/\/github.com\/wkjung0624\/cve-2019-9193", "description": "PostgreSQL Remote Code Executuon", "fork": false, "created_at": "2020-02-12T00:17:58Z", - "updated_at": "2022-06-30T09:14:20Z", + "updated_at": "2022-09-20T14:37:22Z", "pushed_at": "2021-04-16T05:57:37Z", "stargazers_count": 4, "watchers_count": 4, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index ff857bf681..c820a7bdff 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-09-20T08:19:37Z", + "updated_at": "2022-09-20T14:17:29Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3545, - "watchers_count": 3545, + "stargazers_count": 3547, + "watchers_count": 3547, "forks_count": 1040, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 1040, - "watchers": 3545, + "watchers": 3547, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 28a0f05aeb..5ff1a5cb2b 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,11 +13,11 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-19T12:49:56Z", + "updated_at": "2022-09-20T17:39:05Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1508, - "watchers_count": 1508, - "forks_count": 309, + "stargazers_count": 1510, + "watchers_count": 1510, + "forks_count": 310, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,8 +44,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 309, - "watchers": 1508, + "forks": 310, + "watchers": 1510, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index c42f0d703b..f460a36df7 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -120,19 +120,19 @@ }, { "id": 449440480, - "name": "cve-2021-22205-hash-harvester", - "full_name": "GitLab-Red-Team\/cve-2021-22205-hash-harvester", + "name": "cve-hash-harvester", + "full_name": "GitLab-Red-Team\/cve-hash-harvester", "owner": { "login": "GitLab-Red-Team", "id": 97901232, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97901232?v=4", "html_url": "https:\/\/github.com\/GitLab-Red-Team" }, - "html_url": "https:\/\/github.com\/GitLab-Red-Team\/cve-2021-22205-hash-harvester", - "description": "Finds an identifiable hash value for each version of GitLab vulnerable to CVE-2021-22205 (https:\/\/gitlab.com\/gitlab-org\/cves\/-\/blob\/master\/2021\/CVE-2021-22205.json) for use in fingerprinting.", + "html_url": "https:\/\/github.com\/GitLab-Red-Team\/cve-hash-harvester", + "description": "Finds an identifiable hash value for each version of GitLab vulnerable to a specific CVE by the related semantic reversion range (example: https:\/\/gitlab.com\/gitlab-org\/cves\/-\/blob\/master\/2021\/CVE-2021-22205.json) for use in passive fingerprinting.", "fork": false, "created_at": "2022-01-18T20:40:55Z", - "updated_at": "2022-09-09T21:09:41Z", + "updated_at": "2022-09-20T15:23:45Z", "pushed_at": "2022-09-19T20:58:16Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 8f696c8f9a..1de7a2dc90 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -159,7 +159,7 @@ "pushed_at": "2021-04-03T12:56:37Z", "stargazers_count": 84, "watchers_count": 84, - "forks_count": 31, + "forks_count": 32, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -168,7 +168,7 @@ "f5-bigip" ], "visibility": "public", - "forks": 31, + "forks": 32, "watchers": 84, "score": 0 }, diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json index baf3e8bc38..dc67a8ef20 100644 --- a/2021/CVE-2021-30955.json +++ b/2021/CVE-2021-30955.json @@ -97,10 +97,10 @@ "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955", "fork": false, "created_at": "2022-03-01T12:41:03Z", - "updated_at": "2022-09-19T22:13:08Z", + "updated_at": "2022-09-20T16:32:26Z", "pushed_at": "2022-03-01T16:11:31Z", - "stargazers_count": 247, - "watchers_count": 247, + "stargazers_count": 248, + "watchers_count": 248, "forks_count": 44, "allow_forking": true, "is_template": false, @@ -108,7 +108,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 247, + "watchers": 248, "score": 0 }, { diff --git a/2021/CVE-2021-36749.json b/2021/CVE-2021-36749.json index 7aab33b5d4..62e2415fd3 100644 --- a/2021/CVE-2021-36749.json +++ b/2021/CVE-2021-36749.json @@ -13,10 +13,10 @@ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "fork": false, "created_at": "2021-05-22T05:06:33Z", - "updated_at": "2022-09-16T15:29:24Z", + "updated_at": "2022-09-20T13:12:06Z", "pushed_at": "2021-11-21T10:34:06Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "forks_count": 28, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 28, - "watchers": 109, + "watchers": 110, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index aae3a5bae2..e5dc87f057 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -3241,10 +3241,10 @@ "description": "CVE-2021-4034 centos8可用版本", "fork": false, "created_at": "2022-02-15T02:34:48Z", - "updated_at": "2022-09-15T09:34:13Z", + "updated_at": "2022-09-20T15:40:54Z", "pushed_at": "2022-02-15T02:39:28Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -3252,7 +3252,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 14, + "watchers": 15, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 1c06e2c504..e9a235e0e3 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -2261,10 +2261,10 @@ "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)", "fork": false, "created_at": "2021-12-14T10:04:42Z", - "updated_at": "2022-08-22T16:18:07Z", + "updated_at": "2022-09-20T12:46:02Z", "pushed_at": "2022-01-27T16:08:20Z", - "stargazers_count": 429, - "watchers_count": 429, + "stargazers_count": 428, + "watchers_count": 428, "forks_count": 93, "allow_forking": true, "is_template": false, @@ -2281,7 +2281,7 @@ ], "visibility": "public", "forks": 93, - "watchers": 429, + "watchers": 428, "score": 0 }, { diff --git a/2022/CVE-2022-20128.json b/2022/CVE-2022-20128.json index ae28aafd71..ec6e65cae7 100644 --- a/2022/CVE-2022-20128.json +++ b/2022/CVE-2022-20128.json @@ -13,10 +13,10 @@ "description": "Android Debug Bridge (adb) was vulnerable to directory traversal attacks that could have been mounted by rogue\/compromised adb daemons during an adb pull operation.", "fork": false, "created_at": "2022-09-09T12:40:21Z", - "updated_at": "2022-09-14T13:24:10Z", + "updated_at": "2022-09-20T17:51:03Z", "pushed_at": "2022-09-09T12:42:19Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-20841.json b/2022/CVE-2022-20841.json new file mode 100644 index 0000000000..12ce4bd83b --- /dev/null +++ b/2022/CVE-2022-20841.json @@ -0,0 +1,73 @@ +[ + { + "id": 539002221, + "name": "CVE-2022-20841", + "full_name": "Expl0desploit\/CVE-2022-20841", + "owner": { + "login": "Expl0desploit", + "id": 106817899, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106817899?v=4", + "html_url": "https:\/\/github.com\/Expl0desploit" + }, + "html_url": "https:\/\/github.com\/Expl0desploit\/CVE-2022-20841", + "description": "Cisco Small Business RCE [included mass exploiter and scanner]", + "fork": false, + "created_at": "2022-09-20T13:26:04Z", + "updated_at": "2022-09-20T13:30:01Z", + "pushed_at": "2022-09-20T13:28:35Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "botnet", + "bots", + "cisco", + "cve-2022-20841", + "device", + "exploit", + "hack", + "iot", + "mirai", + "new", + "payload", + "qbot", + "rce", + "remote" + ], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 539043674, + "name": "CVE-2022-20841-RCE", + "full_name": "Zerf0X\/CVE-2022-20841-RCE", + "owner": { + "login": "Zerf0X", + "id": 114003953, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114003953?v=4", + "html_url": "https:\/\/github.com\/Zerf0X" + }, + "html_url": "https:\/\/github.com\/Zerf0X\/CVE-2022-20841-RCE", + "description": "Cisco RV series unauthenticated RCE laoder + mass scanner", + "fork": false, + "created_at": "2022-09-20T14:51:26Z", + "updated_at": "2022-09-20T14:56:26Z", + "pushed_at": "2022-09-20T15:00:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json index 8a4c0c2f28..b2a6044a1e 100644 --- a/2022/CVE-2022-2588.json +++ b/2022/CVE-2022-2588.json @@ -13,18 +13,18 @@ "description": "exploit for CVE-2022-2588", "fork": false, "created_at": "2022-08-11T06:01:24Z", - "updated_at": "2022-09-20T12:14:21Z", + "updated_at": "2022-09-20T17:30:15Z", "pushed_at": "2022-09-19T23:05:56Z", - "stargazers_count": 127, - "watchers_count": 127, - "forks_count": 8, + "stargazers_count": 143, + "watchers_count": 143, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 127, + "forks": 9, + "watchers": 143, "score": 0 }, { @@ -125,10 +125,10 @@ "description": "A PoC for CVE-2022-2588 that triggers a WARNING", "fork": false, "created_at": "2022-09-18T21:35:19Z", - "updated_at": "2022-09-19T13:10:06Z", + "updated_at": "2022-09-20T17:04:00Z", "pushed_at": "2022-09-18T21:38:47Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 148265da14..28cdf58e41 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-09-20T06:04:19Z", + "updated_at": "2022-09-20T13:46:06Z", "pushed_at": "2022-08-29T12:54:56Z", - "stargazers_count": 770, - "watchers_count": 770, + "stargazers_count": 771, + "watchers_count": 771, "forks_count": 139, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 139, - "watchers": 770, + "watchers": 771, "score": 0 }, { diff --git a/2022/CVE-2022-26726.json b/2022/CVE-2022-26726.json index 8da75b8972..feec9dabda 100644 --- a/2022/CVE-2022-26726.json +++ b/2022/CVE-2022-26726.json @@ -13,10 +13,10 @@ "description": "TCC Bypass", "fork": false, "created_at": "2021-12-22T05:03:29Z", - "updated_at": "2022-05-28T01:40:45Z", + "updated_at": "2022-09-20T16:33:48Z", "pushed_at": "2022-05-21T06:56:58Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index f919eda5ad..1886e1953d 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -339,7 +339,7 @@ "pushed_at": "2022-08-08T15:31:54Z", "stargazers_count": 11, "watchers_count": 11, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -353,7 +353,7 @@ "wso2rce" ], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 11, "score": 0 }, diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 44c35260d5..0326d71655 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -1894,10 +1894,10 @@ "description": "Detection and Remediation of the Follina MSDT Vulnerability (CVE-2022-30190)", "fork": false, "created_at": "2022-07-21T06:49:44Z", - "updated_at": "2022-07-21T09:49:23Z", + "updated_at": "2022-09-20T14:40:32Z", "pushed_at": "2022-07-22T15:00:30Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -1905,7 +1905,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 2, "score": 0 }, { diff --git a/2022/CVE-2022-30592.json b/2022/CVE-2022-30592.json index 325b535413..f1f5168fbc 100644 --- a/2022/CVE-2022-30592.json +++ b/2022/CVE-2022-30592.json @@ -13,11 +13,11 @@ "description": "HTTP3-attacks (CVE-2022-30592)", "fork": false, "created_at": "2022-08-06T09:57:43Z", - "updated_at": "2022-09-13T21:22:04Z", + "updated_at": "2022-09-20T14:50:36Z", "pushed_at": "2022-09-02T21:05:44Z", - "stargazers_count": 47, - "watchers_count": 47, - "forks_count": 8, + "stargazers_count": 49, + "watchers_count": 49, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,8 +28,8 @@ "vulnerabilities" ], "visibility": "public", - "forks": 8, - "watchers": 47, + "forks": 9, + "watchers": 49, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-32883.json b/2022/CVE-2022-32883.json index d28a06af3f..e3fd4ede2d 100644 --- a/2022/CVE-2022-32883.json +++ b/2022/CVE-2022-32883.json @@ -13,10 +13,10 @@ "description": "Turning Your Computer Into a GPS Tracker With Apple Maps", "fork": false, "created_at": "2022-09-18T15:51:52Z", - "updated_at": "2022-09-20T02:56:48Z", + "updated_at": "2022-09-20T13:34:18Z", "pushed_at": "2022-09-18T16:57:45Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 12, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json index 3a112636ca..e75961332d 100644 --- a/2022/CVE-2022-36804.json +++ b/2022/CVE-2022-36804.json @@ -79,13 +79,13 @@ "pushed_at": "2022-09-07T12:09:19Z", "stargazers_count": 16, "watchers_count": 16, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 5, "watchers": 16, "score": 0 }, @@ -191,13 +191,13 @@ "pushed_at": "2022-09-19T13:49:27Z", "stargazers_count": 6, "watchers_count": 6, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 6, "score": 0 }, diff --git a/2022/CVE-2022-37059.json b/2022/CVE-2022-37059.json new file mode 100644 index 0000000000..39178fa930 --- /dev/null +++ b/2022/CVE-2022-37059.json @@ -0,0 +1,30 @@ +[ + { + "id": 538957451, + "name": "Security-Research", + "full_name": "RashidKhanPathan\/Security-Research", + "owner": { + "login": "RashidKhanPathan", + "id": 65374016, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65374016?v=4", + "html_url": "https:\/\/github.com\/RashidKhanPathan" + }, + "html_url": "https:\/\/github.com\/RashidKhanPathan\/Security-Research", + "description": "CVE-2022-37059 Cross Site Scripting (XSS) in Admin Panel of Subrion CMS 4.2.1", + "fork": false, + "created_at": "2022-09-20T11:38:47Z", + "updated_at": "2022-09-20T14:57:11Z", + "pushed_at": "2022-09-20T14:48:40Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37706.json b/2022/CVE-2022-37706.json index ed11280b99..ff75ae5ba3 100644 --- a/2022/CVE-2022-37706.json +++ b/2022/CVE-2022-37706.json @@ -13,10 +13,10 @@ "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "fork": false, "created_at": "2022-09-12T19:22:44Z", - "updated_at": "2022-09-20T06:52:51Z", + "updated_at": "2022-09-20T17:53:06Z", "pushed_at": "2022-09-19T19:41:34Z", - "stargazers_count": 152, - "watchers_count": 152, + "stargazers_count": 156, + "watchers_count": 156, "forks_count": 16, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 152, + "watchers": 156, "score": 0 }, { diff --git a/2022/CVE-2022-38553.json b/2022/CVE-2022-38553.json new file mode 100644 index 0000000000..5911f8f719 --- /dev/null +++ b/2022/CVE-2022-38553.json @@ -0,0 +1,30 @@ +[ + { + "id": 539043879, + "name": "CVE-2022-38553", + "full_name": "4websecurity\/CVE-2022-38553", + "owner": { + "login": "4websecurity", + "id": 114004967, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114004967?v=4", + "html_url": "https:\/\/github.com\/4websecurity" + }, + "html_url": "https:\/\/github.com\/4websecurity\/CVE-2022-38553", + "description": "CROSS SITE SCRIPTING (XSS) ON \"ACADEMY LEARNING MANAGEMENT SYSTEM\" - PROOF OF CONCEPT (POC) CVE-2022-38553", + "fork": false, + "created_at": "2022-09-20T14:51:52Z", + "updated_at": "2022-09-20T14:51:52Z", + "pushed_at": "2022-09-20T15:41:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index 9148549de9..644eaf091b 100644 --- a/README.md +++ b/README.md @@ -755,6 +755,15 @@ A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM - [jbaines-r7/theway](https://github.com/jbaines-r7/theway) +### CVE-2022-20841 (2022-08-10) + + +Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. + + +- [Expl0desploit/CVE-2022-20841](https://github.com/Expl0desploit/CVE-2022-20841) +- [Zerf0X/CVE-2022-20841-RCE](https://github.com/Zerf0X/CVE-2022-20841-RCE) + ### CVE-2022-20866 (2022-08-10) @@ -3579,6 +3588,14 @@ Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality tha - [GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925](https://github.com/GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925) - [aels/CVE-2022-37042](https://github.com/aels/CVE-2022-37042) +### CVE-2022-37059 (2022-08-29) + + +Cross Site Scripting (XSS) in Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via Login Field + + +- [RashidKhanPathan/Security-Research](https://github.com/RashidKhanPathan/Security-Research) + ### CVE-2022-37153 (2022-08-24) @@ -3614,10 +3631,20 @@ JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the - [AgainstTheLight/CVE-2022-37203](https://github.com/AgainstTheLight/CVE-2022-37203) -### CVE-2022-37204 +### CVE-2022-37204 (2022-09-20) + + +Final CMS 5.1.0 is vulnerable to SQL Injection. + + - [AgainstTheLight/CVE-2022-37204](https://github.com/AgainstTheLight/CVE-2022-37204) -### CVE-2022-37205 +### CVE-2022-37205 (-) + + +JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection. + + - [AgainstTheLight/CVE-2022-37205](https://github.com/AgainstTheLight/CVE-2022-37205) ### CVE-2022-37206 @@ -3663,6 +3690,9 @@ In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUI ### CVE-2022-38217 - [SupremacyTeam/evilReveal](https://github.com/SupremacyTeam/evilReveal) +### CVE-2022-38553 +- [4websecurity/CVE-2022-38553](https://github.com/4websecurity/CVE-2022-38553) + ### CVE-2022-38766 - [AUTOCRYPT-IVS-VnV/CVE-2022-38766](https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766) @@ -5310,7 +5340,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro - [c0okB/CVE-2021-22205](https://github.com/c0okB/CVE-2021-22205) - [inspiringz/CVE-2021-22205](https://github.com/inspiringz/CVE-2021-22205) - [w0x68y/Gitlab-CVE-2021-22205](https://github.com/w0x68y/Gitlab-CVE-2021-22205) -- [GitLab-Red-Team/cve-2021-22205-hash-harvester](https://github.com/GitLab-Red-Team/cve-2021-22205-hash-harvester) +- [GitLab-Red-Team/cve-hash-harvester](https://github.com/GitLab-Red-Team/cve-hash-harvester) - [honypot/CVE-2021-22205](https://github.com/honypot/CVE-2021-22205) - [momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-](https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-) - [keven1z/CVE-2021-22205](https://github.com/keven1z/CVE-2021-22205) @@ -15414,7 +15444,7 @@ SQL injection vulnerability in the J2Store plugin 3.x before 3.3.7 for Joomla! a ** DISPUTED ** In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’. -- [wkjung0624/CVE-2019-9193](https://github.com/wkjung0624/CVE-2019-9193) +- [wkjung0624/cve-2019-9193](https://github.com/wkjung0624/cve-2019-9193) - [b4keSn4ke/CVE-2019-9193](https://github.com/b4keSn4ke/CVE-2019-9193) ### CVE-2019-9194 (2019-02-26)