From 7b359515f85813a02fb0c6d24630d3be82ce79b2 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 12 Feb 2022 21:14:01 +0900 Subject: [PATCH] Auto Update 2022/02/12 12:14:01 --- 2014/CVE-2014-1767.json | 29 +++++++++++++++ 2016/CVE-2016-0051.json | 8 ++-- 2017/CVE-2017-5645.json | 8 ++-- 2018/CVE-2018-6622.json | 8 ++-- 2019/CVE-2019-0708.json | 2 +- 2019/CVE-2019-1003000.json | 27 ++++++++++++++ 2019/CVE-2019-15514.json | 8 ++-- 2019/CVE-2019-17571.json | 8 ++-- 2019/CVE-2019-20224.json | 8 ++-- 2019/CVE-2019-20933.json | 8 ++-- 2020/CVE-2020-15778.json | 8 ++-- 2020/CVE-2020-2555.json | 8 ++-- 2021/CVE-2021-1585.json | 8 ++-- 2021/CVE-2021-21972.json | 8 ++-- 2021/CVE-2021-26828.json | 8 ++-- 2021/CVE-2021-4034.json | 75 ++++++++++++++++++++++++++------------ 2021/CVE-2021-40444.json | 4 +- 2021/CVE-2021-41773.json | 54 --------------------------- 2021/CVE-2021-44228.json | 57 +++++++++++++++++++++++------ 2022/CVE-2022-20699.json | 8 ++-- 2022/CVE-2022-21661.json | 27 ++++++++++++++ 2022/CVE-2022-21999.json | 12 +++--- 2022/CVE-2022-23305.json | 8 ++-- README.md | 14 ++++++- 24 files changed, 256 insertions(+), 157 deletions(-) create mode 100644 2014/CVE-2014-1767.json diff --git a/2014/CVE-2014-1767.json b/2014/CVE-2014-1767.json new file mode 100644 index 0000000000..293556b7ee --- /dev/null +++ b/2014/CVE-2014-1767.json @@ -0,0 +1,29 @@ +[ + { + "id": 458469806, + "name": "CVE-2014-1767-EXP-PAPER", + "full_name": "ExploitCN\/CVE-2014-1767-EXP-PAPER", + "owner": { + "login": "ExploitCN", + "id": 98264245, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98264245?v=4", + "html_url": "https:\/\/github.com\/ExploitCN" + }, + "html_url": "https:\/\/github.com\/ExploitCN\/CVE-2014-1767-EXP-PAPER", + "description": "CVE-2014-1767在win7_x64平台的EXP和分析文章", + "fork": false, + "created_at": "2022-02-12T08:57:19Z", + "updated_at": "2022-02-12T09:05:38Z", + "pushed_at": "2022-02-12T09:05:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-0051.json b/2016/CVE-2016-0051.json index b558ba6cf0..7289a67c6b 100644 --- a/2016/CVE-2016-0051.json +++ b/2016/CVE-2016-0051.json @@ -13,17 +13,17 @@ "description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)", "fork": false, "created_at": "2016-02-09T21:30:34Z", - "updated_at": "2021-08-12T14:47:47Z", + "updated_at": "2022-02-12T09:14:27Z", "pushed_at": "2016-05-09T17:53:48Z", - "stargazers_count": 328, - "watchers_count": 328, + "stargazers_count": 329, + "watchers_count": 329, "forks_count": 150, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 150, - "watchers": 328, + "watchers": 329, "score": 0 }, { diff --git a/2017/CVE-2017-5645.json b/2017/CVE-2017-5645.json index 3d157dfa7c..2adfeacaae 100644 --- a/2017/CVE-2017-5645.json +++ b/2017/CVE-2017-5645.json @@ -40,10 +40,10 @@ "description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.", "fork": false, "created_at": "2021-12-14T22:27:14Z", - "updated_at": "2022-02-06T12:31:42Z", + "updated_at": "2022-02-12T07:31:06Z", "pushed_at": "2022-01-26T10:07:39Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -69,7 +69,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 17, + "watchers": 18, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6622.json b/2018/CVE-2018-6622.json index 94e8e3a658..88cd558ba7 100644 --- a/2018/CVE-2018-6622.json +++ b/2018/CVE-2018-6622.json @@ -13,10 +13,10 @@ "description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019", "fork": false, "created_at": "2019-02-07T06:45:27Z", - "updated_at": "2022-01-21T07:50:03Z", + "updated_at": "2022-02-12T06:09:59Z", "pushed_at": "2020-11-18T03:01:31Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 78, + "watchers_count": 78, "forks_count": 17, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 79, + "watchers": 78, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 54f7b0f7d5..2fc06c5971 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -99,7 +99,7 @@ "description": "CVE-2019-0708-exploit", "fork": false, "created_at": "2019-05-15T02:24:21Z", - "updated_at": "2022-01-30T01:04:07Z", + "updated_at": "2022-02-12T06:21:52Z", "pushed_at": "2019-05-15T02:26:46Z", "stargazers_count": 119, "watchers_count": 119, diff --git a/2019/CVE-2019-1003000.json b/2019/CVE-2019-1003000.json index 5b1c754b21..77640d34be 100644 --- a/2019/CVE-2019-1003000.json +++ b/2019/CVE-2019-1003000.json @@ -121,5 +121,32 @@ "forks": 2, "watchers": 4, "score": 0 + }, + { + "id": 458501569, + "name": "Jenkins_CVE-2019-1003000", + "full_name": "purple-WL\/Jenkins_CVE-2019-1003000", + "owner": { + "login": "purple-WL", + "id": 63894044, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63894044?v=4", + "html_url": "https:\/\/github.com\/purple-WL" + }, + "html_url": "https:\/\/github.com\/purple-WL\/Jenkins_CVE-2019-1003000", + "description": null, + "fork": false, + "created_at": "2022-02-12T11:26:07Z", + "updated_at": "2022-02-12T11:27:23Z", + "pushed_at": "2022-02-12T11:27:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-15514.json b/2019/CVE-2019-15514.json index f363de29c4..b0f8c4c45c 100644 --- a/2019/CVE-2019-15514.json +++ b/2019/CVE-2019-15514.json @@ -13,10 +13,10 @@ "description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ", "fork": false, "created_at": "2021-12-10T19:03:53Z", - "updated_at": "2022-02-11T21:17:09Z", + "updated_at": "2022-02-12T08:00:55Z", "pushed_at": "2021-12-19T18:18:36Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 11, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17571.json b/2019/CVE-2019-17571.json index 066f235b25..f507faf9e5 100644 --- a/2019/CVE-2019-17571.json +++ b/2019/CVE-2019-17571.json @@ -69,10 +69,10 @@ "description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.", "fork": false, "created_at": "2021-12-14T22:27:14Z", - "updated_at": "2022-02-06T12:31:42Z", + "updated_at": "2022-02-12T07:31:06Z", "pushed_at": "2022-01-26T10:07:39Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -98,7 +98,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 17, + "watchers": 18, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-20224.json b/2019/CVE-2019-20224.json index 783cecd488..8c7cc177a3 100644 --- a/2019/CVE-2019-20224.json +++ b/2019/CVE-2019-20224.json @@ -13,17 +13,17 @@ "description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224", "fork": false, "created_at": "2020-01-10T13:41:28Z", - "updated_at": "2021-12-15T14:38:03Z", + "updated_at": "2022-02-12T11:51:07Z", "pushed_at": "2020-01-10T13:42:12Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 15, + "watchers": 14, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-20933.json b/2019/CVE-2019-20933.json index 153b8b3954..2ded3595e5 100644 --- a/2019/CVE-2019-20933.json +++ b/2019/CVE-2019-20933.json @@ -13,17 +13,17 @@ "description": "InfluxDB CVE-2019-20933 vulnerability exploit", "fork": false, "created_at": "2021-04-28T16:25:31Z", - "updated_at": "2022-02-04T02:08:02Z", + "updated_at": "2022-02-12T12:06:49Z", "pushed_at": "2021-11-12T13:02:41Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 13, - "watchers": 19, + "watchers": 20, "score": 0 }, { diff --git a/2020/CVE-2020-15778.json b/2020/CVE-2020-15778.json index cb6ce1215b..03750e8737 100644 --- a/2020/CVE-2020-15778.json +++ b/2020/CVE-2020-15778.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2020-07-18T05:15:05Z", - "updated_at": "2022-02-02T14:55:24Z", + "updated_at": "2022-02-12T10:23:29Z", "pushed_at": "2021-03-17T11:29:58Z", - "stargazers_count": 107, - "watchers_count": 107, + "stargazers_count": 108, + "watchers_count": 108, "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 19, - "watchers": 107, + "watchers": 108, "score": 0 }, { diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index f4c15ce9c1..29caed2efb 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -67,17 +67,17 @@ "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "fork": false, "created_at": "2020-03-07T18:58:09Z", - "updated_at": "2022-02-12T01:16:12Z", + "updated_at": "2022-02-12T11:54:32Z", "pushed_at": "2020-03-09T05:25:05Z", - "stargazers_count": 154, - "watchers_count": 154, + "stargazers_count": 155, + "watchers_count": 155, "forks_count": 52, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 52, - "watchers": 154, + "watchers": 155, "score": 0 }, { diff --git a/2021/CVE-2021-1585.json b/2021/CVE-2021-1585.json index bf0ffbb864..ff35926fe7 100644 --- a/2021/CVE-2021-1585.json +++ b/2021/CVE-2021-1585.json @@ -13,17 +13,17 @@ "description": "Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE", "fork": false, "created_at": "2022-02-10T21:52:24Z", - "updated_at": "2022-02-11T20:53:21Z", + "updated_at": "2022-02-12T06:34:09Z", "pushed_at": "2022-02-11T17:20:32Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 42636aa60a..f8556b0c11 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -684,10 +684,10 @@ "description": "CVE-2021-21972 – ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)", "fork": false, "created_at": "2021-10-03T23:03:11Z", - "updated_at": "2021-11-09T11:30:14Z", + "updated_at": "2022-02-12T11:51:32Z", "pushed_at": "2021-10-16T13:48:00Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -699,7 +699,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26828.json b/2021/CVE-2021-26828.json index ada59a7dca..d1b03062e4 100644 --- a/2021/CVE-2021-26828.json +++ b/2021/CVE-2021-26828.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-03-31T02:39:02Z", - "updated_at": "2021-12-15T14:41:46Z", + "updated_at": "2022-02-12T11:51:28Z", "pushed_at": "2021-06-11T03:53:22Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 5468425c6e..b721705a65 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -104,17 +104,17 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-02-11T20:24:03Z", + "updated_at": "2022-02-12T11:31:14Z", "pushed_at": "2022-01-30T14:22:23Z", - "stargazers_count": 1251, - "watchers_count": 1251, + "stargazers_count": 1256, + "watchers_count": 1256, "forks_count": 365, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 365, - "watchers": 1251, + "watchers": 1256, "score": 0 }, { @@ -185,11 +185,11 @@ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)", "fork": false, "created_at": "2022-01-26T00:56:36Z", - "updated_at": "2022-02-11T21:39:57Z", + "updated_at": "2022-02-12T10:08:20Z", "pushed_at": "2022-02-12T05:22:58Z", - "stargazers_count": 740, - "watchers_count": 740, - "forks_count": 241, + "stargazers_count": 744, + "watchers_count": 744, + "forks_count": 242, "allow_forking": true, "is_template": false, "topics": [ @@ -198,8 +198,8 @@ "poc" ], "visibility": "public", - "forks": 241, - "watchers": 740, + "forks": 242, + "watchers": 744, "score": 0 }, { @@ -631,10 +631,10 @@ "description": "A python3 and bash PoC for CVE-2021-4034 by Kim Schulz", "fork": false, "created_at": "2022-01-26T08:43:15Z", - "updated_at": "2022-02-10T01:57:40Z", + "updated_at": "2022-02-12T08:24:24Z", "pushed_at": "2022-01-27T10:40:14Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -646,7 +646,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 11, + "watchers": 12, "score": 0 }, { @@ -906,19 +906,19 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2022-02-12T01:46:47Z", + "updated_at": "2022-02-12T08:49:41Z", "pushed_at": "2022-01-27T20:09:24Z", - "stargazers_count": 413, - "watchers_count": 413, - "forks_count": 70, + "stargazers_count": 412, + "watchers_count": 412, + "forks_count": 71, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-4034" ], "visibility": "public", - "forks": 70, - "watchers": 413, + "forks": 71, + "watchers": 412, "score": 0 }, { @@ -2336,17 +2336,17 @@ "description": "Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!", "fork": false, "created_at": "2022-01-28T18:12:54Z", - "updated_at": "2022-02-10T08:02:51Z", + "updated_at": "2022-02-12T09:19:36Z", "pushed_at": "2022-01-28T18:22:53Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 12, + "watchers": 13, "score": 0 }, { @@ -2969,5 +2969,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 458439369, + "name": "CVE-2021-4034", + "full_name": "an0n7os\/CVE-2021-4034", + "owner": { + "login": "an0n7os", + "id": 67602602, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67602602?v=4", + "html_url": "https:\/\/github.com\/an0n7os" + }, + "html_url": "https:\/\/github.com\/an0n7os\/CVE-2021-4034", + "description": null, + "fork": false, + "created_at": "2022-02-12T06:20:49Z", + "updated_at": "2022-02-12T06:26:41Z", + "pushed_at": "2022-02-12T06:26:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 187e2ff653..2ebea8268c 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -17,12 +17,12 @@ "pushed_at": "2021-12-25T18:31:02Z", "stargazers_count": 1363, "watchers_count": 1363, - "forks_count": 448, + "forks_count": 449, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 448, + "forks": 449, "watchers": 1363, "score": 0 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 86b7a91205..d0d6395cc0 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -93,33 +93,6 @@ "watchers": 16, "score": 0 }, - { - "id": 414108838, - "name": "CVE-2021-41773", - "full_name": "blasty\/CVE-2021-41773", - "owner": { - "login": "blasty", - "id": 101374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4", - "html_url": "https:\/\/github.com\/blasty" - }, - "html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773", - "description": "CVE-2021-41773 playground", - "fork": false, - "created_at": "2021-10-06T07:17:05Z", - "updated_at": "2022-02-08T07:55:00Z", - "pushed_at": "2021-10-07T17:56:38Z", - "stargazers_count": 203, - "watchers_count": 203, - "forks_count": 51, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 51, - "watchers": 203, - "score": 0 - }, { "id": 414159388, "name": "CVE-2021-41773", @@ -451,33 +424,6 @@ "watchers": 24, "score": 0 }, - { - "id": 414674481, - "name": "Poc-CVE-2021-41773", - "full_name": "LetouRaphael\/Poc-CVE-2021-41773", - "owner": { - "login": "LetouRaphael", - "id": 48223543, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48223543?v=4", - "html_url": "https:\/\/github.com\/LetouRaphael" - }, - "html_url": "https:\/\/github.com\/LetouRaphael\/Poc-CVE-2021-41773", - "description": null, - "fork": false, - "created_at": "2021-10-07T16:19:45Z", - "updated_at": "2021-10-08T01:15:42Z", - "pushed_at": "2021-10-07T16:48:27Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 414764740, "name": "CVE-2021-41773", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 98e0cee42e..03aa5e4e18 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -905,10 +905,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-02-12T03:02:27Z", + "updated_at": "2022-02-12T08:01:04Z", "pushed_at": "2022-01-22T14:55:02Z", - "stargazers_count": 1230, - "watchers_count": 1230, + "stargazers_count": 1231, + "watchers_count": 1231, "forks_count": 321, "allow_forking": true, "is_template": false, @@ -920,7 +920,7 @@ ], "visibility": "public", "forks": 321, - "watchers": 1230, + "watchers": 1231, "score": 0 }, { @@ -5886,10 +5886,10 @@ "description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.", "fork": false, "created_at": "2021-12-14T22:27:14Z", - "updated_at": "2022-02-06T12:31:42Z", + "updated_at": "2022-02-12T07:31:06Z", "pushed_at": "2022-01-26T10:07:39Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -5915,7 +5915,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 17, + "watchers": 18, "score": 0 }, { @@ -7985,17 +7985,17 @@ "description": "This project will help to test the Log4j CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-17T20:07:12Z", - "updated_at": "2021-12-29T05:29:26Z", + "updated_at": "2022-02-12T08:17:39Z", "pushed_at": "2021-12-22T20:17:36Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0 }, { @@ -10657,5 +10657,38 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 458500087, + "name": "lol4j-white-box", + "full_name": "hotpotcookie\/lol4j-white-box", + "owner": { + "login": "hotpotcookie", + "id": 68333318, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68333318?v=4", + "html_url": "https:\/\/github.com\/hotpotcookie" + }, + "html_url": "https:\/\/github.com\/hotpotcookie\/lol4j-white-box", + "description": "Log4j vulnerability testing environment that based on CVE-2021-44228. This environment provide guidance to build the sample infrastructure and the exploit scripts", + "fork": false, + "created_at": "2022-02-12T11:19:41Z", + "updated_at": "2022-02-12T11:28:29Z", + "pushed_at": "2022-02-12T11:21:32Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [ + "cve-2021-44228", + "ldap-authentication", + "log4j2", + "penetration-testing", + "spring-boot" + ], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-20699.json b/2022/CVE-2022-20699.json index f97e2fb991..cec5dc481e 100644 --- a/2022/CVE-2022-20699.json +++ b/2022/CVE-2022-20699.json @@ -13,17 +13,17 @@ "description": "Cisco Anyconnect VPN unauth RCE (rwx stack)", "fork": false, "created_at": "2022-02-07T15:53:21Z", - "updated_at": "2022-02-12T05:55:28Z", + "updated_at": "2022-02-12T11:45:59Z", "pushed_at": "2022-02-07T15:55:03Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 130, + "watchers_count": 130, "forks_count": 26, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 26, - "watchers": 124, + "watchers": 130, "score": 0 }, { diff --git a/2022/CVE-2022-21661.json b/2022/CVE-2022-21661.json index 25555dd039..2832b1308b 100644 --- a/2022/CVE-2022-21661.json +++ b/2022/CVE-2022-21661.json @@ -25,5 +25,32 @@ "forks": 2, "watchers": 6, "score": 0 + }, + { + "id": 458502807, + "name": "wordpress-CVE-2022-21661", + "full_name": "purple-WL\/wordpress-CVE-2022-21661", + "owner": { + "login": "purple-WL", + "id": 63894044, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63894044?v=4", + "html_url": "https:\/\/github.com\/purple-WL" + }, + "html_url": "https:\/\/github.com\/purple-WL\/wordpress-CVE-2022-21661", + "description": null, + "fork": false, + "created_at": "2022-02-12T11:31:26Z", + "updated_at": "2022-02-12T11:31:26Z", + "pushed_at": "2022-02-12T11:31:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 5ac6239609..20b444358f 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,11 +13,11 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-02-12T06:00:08Z", + "updated_at": "2022-02-12T11:22:47Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 369, - "watchers_count": 369, - "forks_count": 62, + "stargazers_count": 373, + "watchers_count": 373, + "forks_count": 63, "allow_forking": true, "is_template": false, "topics": [ @@ -25,8 +25,8 @@ "cve-2022-22718" ], "visibility": "public", - "forks": 62, - "watchers": 369, + "forks": 63, + "watchers": 373, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23305.json b/2022/CVE-2022-23305.json index 3f65e5e74f..adf43f3c8a 100644 --- a/2022/CVE-2022-23305.json +++ b/2022/CVE-2022-23305.json @@ -13,10 +13,10 @@ "description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.", "fork": false, "created_at": "2021-12-14T22:27:14Z", - "updated_at": "2022-02-06T12:31:42Z", + "updated_at": "2022-02-12T07:31:06Z", "pushed_at": "2022-01-26T10:07:39Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -42,7 +42,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 17, + "watchers": 18, "score": 0 }, { diff --git a/README.md b/README.md index bdd08bc22b..dc02183ffc 100644 --- a/README.md +++ b/README.md @@ -84,6 +84,7 @@ WordPress is a free and open-source content management system written in PHP and - [TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection](https://github.com/TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection) +- [purple-WL/wordpress-CVE-2022-21661](https://github.com/purple-WL/wordpress-CVE-2022-21661) ### CVE-2022-21877 (2022-01-11) @@ -804,6 +805,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility. - [ziadsaleemi/polkit_CVE-2021-4034](https://github.com/ziadsaleemi/polkit_CVE-2021-4034) - [FDlucifer/Pwnkit-go](https://github.com/FDlucifer/Pwnkit-go) - [fireclasher/pwnkit-CVE-2021-4034-](https://github.com/fireclasher/pwnkit-CVE-2021-4034-) +- [an0n7os/CVE-2021-4034](https://github.com/an0n7os/CVE-2021-4034) ### CVE-2021-4043 (2022-02-04) @@ -2908,7 +2910,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773) - [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773) - [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013) -- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773) - [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773) - [mohwahyudi/cve-2021-41773](https://github.com/mohwahyudi/cve-2021-41773) - [1nhann/CVE-2021-41773](https://github.com/1nhann/CVE-2021-41773) @@ -2921,7 +2922,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [ComdeyOverflow/CVE-2021-41773](https://github.com/ComdeyOverflow/CVE-2021-41773) - [shiomiyan/CVE-2021-41773](https://github.com/shiomiyan/CVE-2021-41773) - [justakazh/mass_cve-2021-41773](https://github.com/justakazh/mass_cve-2021-41773) -- [LetouRaphael/Poc-CVE-2021-41773](https://github.com/LetouRaphael/Poc-CVE-2021-41773) - [Sakura-nee/CVE-2021-41773](https://github.com/Sakura-nee/CVE-2021-41773) - [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773) - [0xRar/CVE-2021-41773](https://github.com/0xRar/CVE-2021-41773) @@ -3834,6 +3834,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [0xalwayslucky/log4j-polkit-poc](https://github.com/0xalwayslucky/log4j-polkit-poc) - [y-security/yLog4j](https://github.com/y-security/yLog4j) - [FeryaelJustice/Log4Shell](https://github.com/FeryaelJustice/Log4Shell) +- [hotpotcookie/lol4j-white-box](https://github.com/hotpotcookie/lol4j-white-box) ### CVE-2021-44270 - [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass) @@ -12815,6 +12816,7 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier - [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc) - [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins) - [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION) +- [purple-WL/Jenkins_CVE-2019-1003000](https://github.com/purple-WL/Jenkins_CVE-2019-1003000) ### CVE-2019-1010054 (2019-07-18) @@ -20815,6 +20817,14 @@ Technicolor TC7200 with firmware STD6.01.12 could allow remote attackers to obta - [tihmstar/freePW_tc7200Eploit](https://github.com/tihmstar/freePW_tc7200Eploit) +### CVE-2014-1767 (2014-07-08) + + +Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability." + + +- [ExploitCN/CVE-2014-1767-EXP-PAPER](https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER) + ### CVE-2014-1773 (2014-06-10)