diff --git a/2016/CVE-2016-1000027.json b/2016/CVE-2016-1000027.json index 3a1a30275d..1282600807 100644 --- a/2016/CVE-2016-1000027.json +++ b/2016/CVE-2016-1000027.json @@ -17,7 +17,7 @@ "pushed_at": "2021-03-05T21:52:06Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -33,7 +33,7 @@ "vulnerable-server" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 409bcabc19..e42b342640 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -67,7 +67,7 @@ "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android", "fork": false, "created_at": "2016-10-21T11:19:21Z", - "updated_at": "2022-03-10T02:59:56Z", + "updated_at": "2022-03-11T10:15:39Z", "pushed_at": "2021-02-03T16:03:40Z", "stargazers_count": 897, "watchers_count": 897, @@ -1065,17 +1065,17 @@ "description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”", "fork": false, "created_at": "2022-03-07T18:36:50Z", - "updated_at": "2022-03-11T04:35:59Z", + "updated_at": "2022-03-11T11:47:04Z", "pushed_at": "2022-03-09T08:40:29Z", - "stargazers_count": 116, - "watchers_count": 116, - "forks_count": 36, + "stargazers_count": 123, + "watchers_count": 123, + "forks_count": 37, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 36, - "watchers": 116, + "forks": 37, + "watchers": 123, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index f64ed99ea5..8bc9414320 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -429,17 +429,17 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-03-11T05:48:10Z", + "updated_at": "2022-03-11T11:08:22Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 320, - "watchers_count": 320, + "stargazers_count": 321, + "watchers_count": 321, "forks_count": 109, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 109, - "watchers": 320, + "watchers": 321, "score": 0 }, { diff --git a/2018/CVE-2018-1263.json b/2018/CVE-2018-1263.json new file mode 100644 index 0000000000..754b9a70c5 --- /dev/null +++ b/2018/CVE-2018-1263.json @@ -0,0 +1,29 @@ +[ + { + "id": 468735837, + "name": "CVE-2018-1263-Demo", + "full_name": "sakib570\/CVE-2018-1263-Demo", + "owner": { + "login": "sakib570", + "id": 6813201, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6813201?v=4", + "html_url": "https:\/\/github.com\/sakib570" + }, + "html_url": "https:\/\/github.com\/sakib570\/CVE-2018-1263-Demo", + "description": null, + "fork": false, + "created_at": "2022-03-11T12:07:16Z", + "updated_at": "2022-03-11T12:07:16Z", + "pushed_at": "2022-03-11T12:07:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-3191.json b/2018/CVE-2018-3191.json index 4ef044a1d1..8a2c257ec7 100644 --- a/2018/CVE-2018-3191.json +++ b/2018/CVE-2018-3191.json @@ -44,12 +44,12 @@ "pushed_at": "2018-10-26T17:54:54Z", "stargazers_count": 105, "watchers_count": 105, - "forks_count": 50, + "forks_count": 51, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 50, + "forks": 51, "watchers": 105, "score": 0 }, diff --git a/2018/CVE-2018-7750.json b/2018/CVE-2018-7750.json index 518028288e..da0f5b3485 100644 --- a/2018/CVE-2018-7750.json +++ b/2018/CVE-2018-7750.json @@ -17,7 +17,7 @@ "pushed_at": "2018-11-06T10:10:31Z", "stargazers_count": 18, "watchers_count": 18, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [ @@ -26,7 +26,7 @@ "poc" ], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 18, "score": 0 } diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 0a776e2ce7..062c64037c 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -40,10 +40,10 @@ "description": "CVE-2018-8120 Windows LPE exploit", "fork": false, "created_at": "2018-05-19T02:43:15Z", - "updated_at": "2022-02-13T00:28:55Z", + "updated_at": "2022-03-11T06:35:26Z", "pushed_at": "2018-05-30T13:09:54Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 474, + "watchers_count": 474, "forks_count": 205, "allow_forking": true, "is_template": false, @@ -54,7 +54,7 @@ ], "visibility": "public", "forks": 205, - "watchers": 473, + "watchers": 474, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 80b5bd4d71..44df3b6537 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2022-03-05T16:43:16Z", + "updated_at": "2022-03-11T06:50:16Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1701, - "watchers_count": 1701, + "stargazers_count": 1702, + "watchers_count": 1702, "forks_count": 255, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 255, - "watchers": 1701, + "watchers": 1702, "score": 0 }, { diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 3f909efe1e..03c15d0119 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,17 +13,17 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-03-11T05:48:10Z", + "updated_at": "2022-03-11T11:08:22Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 320, - "watchers_count": 320, + "stargazers_count": 321, + "watchers_count": 321, "forks_count": 109, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 109, - "watchers": 320, + "watchers": 321, "score": 0 }, { diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index db71761450..d601c5c70b 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -17,12 +17,12 @@ "pushed_at": "2020-09-11T07:38:22Z", "stargazers_count": 609, "watchers_count": 609, - "forks_count": 158, + "forks_count": 159, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 158, + "forks": 159, "watchers": 609, "score": 0 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 55b741825d..7c192eaf66 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1366,17 +1366,17 @@ "description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)", "fork": false, "created_at": "2020-04-22T09:09:02Z", - "updated_at": "2021-11-19T02:08:12Z", + "updated_at": "2022-03-11T09:59:14Z", "pushed_at": "2020-06-05T16:21:55Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, - "watchers": 12, + "watchers": 11, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 06933999b6..941295b5e9 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -121,10 +121,10 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2022-03-07T07:55:18Z", + "updated_at": "2022-03-11T07:37:57Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 302, - "watchers_count": 302, + "stargazers_count": 303, + "watchers_count": 303, "forks_count": 53, "allow_forking": true, "is_template": false, @@ -138,7 +138,7 @@ ], "visibility": "public", "forks": 53, - "watchers": 302, + "watchers": 303, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 657e0a5f79..04aa2efd56 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -303,17 +303,17 @@ "description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。", "fork": false, "created_at": "2020-11-03T10:49:35Z", - "updated_at": "2022-02-27T11:07:58Z", + "updated_at": "2022-03-11T08:39:16Z", "pushed_at": "2020-12-01T05:08:41Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 107, + "watchers_count": 107, "forks_count": 28, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 28, - "watchers": 106, + "watchers": 107, "score": 0 }, { diff --git a/2020/CVE-2020-36188.json b/2020/CVE-2020-36188.json index 823eb7db10..ed4a41f8c7 100644 --- a/2020/CVE-2020-36188.json +++ b/2020/CVE-2020-36188.json @@ -13,10 +13,10 @@ "description": "CVE-2020-36188 &&Jackson-databind RCE", "fork": false, "created_at": "2021-01-11T06:29:38Z", - "updated_at": "2022-01-09T23:42:39Z", + "updated_at": "2022-03-11T08:06:41Z", "pushed_at": "2021-01-11T06:29:59Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 10, + "watchers": 11, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7247.json b/2020/CVE-2020-7247.json index 63428153c1..3d8a709d78 100644 --- a/2020/CVE-2020-7247.json +++ b/2020/CVE-2020-7247.json @@ -207,17 +207,17 @@ "description": "Proof of concept for CVE-2020-7247 for educational purposes.", "fork": false, "created_at": "2021-11-26T17:28:56Z", - "updated_at": "2021-12-28T12:54:32Z", + "updated_at": "2022-03-11T10:24:30Z", "pushed_at": "2022-01-20T18:36:05Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 0, "score": 0 }, { diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 8e995bedb0..bc46c6b7c8 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,17 +13,17 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2022-03-10T03:08:51Z", + "updated_at": "2022-03-11T07:54:55Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 369, - "watchers_count": 369, - "forks_count": 112, + "stargazers_count": 371, + "watchers_count": 371, + "forks_count": 113, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 112, - "watchers": 369, + "forks": 113, + "watchers": 371, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index b8dcdad94c..823d0532de 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -40,17 +40,17 @@ "description": null, "fork": false, "created_at": "2021-05-29T13:07:14Z", - "updated_at": "2022-02-21T02:58:06Z", + "updated_at": "2022-03-11T11:54:11Z", "pushed_at": "2022-01-16T04:17:08Z", - "stargazers_count": 191, - "watchers_count": 191, + "stargazers_count": 192, + "watchers_count": 192, "forks_count": 47, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 47, - "watchers": 191, + "watchers": 192, "score": 0 }, { diff --git a/2021/CVE-2021-26415.json b/2021/CVE-2021-26415.json index 49f2ec0793..8e62ef4984 100644 --- a/2021/CVE-2021-26415.json +++ b/2021/CVE-2021-26415.json @@ -17,12 +17,12 @@ "pushed_at": "2021-04-22T14:04:46Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 2, "score": 0 } diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index f4879014be..b13cb92a37 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2021-12-29T15:00:00Z", "updated_at": "2022-02-18T08:21:56Z", - "pushed_at": "2022-02-18T08:22:36Z", + "pushed_at": "2022-03-11T10:44:41Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -106,17 +106,17 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-03-11T02:04:45Z", + "updated_at": "2022-03-11T10:18:20Z", "pushed_at": "2022-01-30T14:22:23Z", - "stargazers_count": 1398, - "watchers_count": 1398, - "forks_count": 407, + "stargazers_count": 1400, + "watchers_count": 1400, + "forks_count": 408, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 407, - "watchers": 1398, + "forks": 408, + "watchers": 1400, "score": 0 }, { @@ -1822,7 +1822,7 @@ "fork": false, "created_at": "2022-01-27T14:43:57Z", "updated_at": "2022-03-08T20:48:21Z", - "pushed_at": "2022-03-04T14:44:49Z", + "pushed_at": "2022-03-11T09:49:22Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 0, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 790bbced1f..b9f59a3384 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -13,17 +13,17 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2022-03-09T06:55:38Z", + "updated_at": "2022-03-11T10:26:21Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1382, - "watchers_count": 1382, + "stargazers_count": 1383, + "watchers_count": 1383, "forks_count": 453, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 453, - "watchers": 1382, + "watchers": 1383, "score": 0 }, { diff --git a/2021/CVE-2021-41277.json b/2021/CVE-2021-41277.json index 487a89f045..57b857dfca 100644 --- a/2021/CVE-2021-41277.json +++ b/2021/CVE-2021-41277.json @@ -300,5 +300,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 468638331, + "name": "CVE-2021-41277", + "full_name": "Chen-ling-afk\/CVE-2021-41277", + "owner": { + "login": "Chen-ling-afk", + "id": 76235286, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76235286?v=4", + "html_url": "https:\/\/github.com\/Chen-ling-afk" + }, + "html_url": "https:\/\/github.com\/Chen-ling-afk\/CVE-2021-41277", + "description": "MetaBase 任意文件读取", + "fork": false, + "created_at": "2022-03-11T06:39:38Z", + "updated_at": "2022-03-11T07:35:31Z", + "pushed_at": "2022-03-11T07:48:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41822.json b/2021/CVE-2021-41822.json deleted file mode 100644 index e99872bbb8..0000000000 --- a/2021/CVE-2021-41822.json +++ /dev/null @@ -1,29 +0,0 @@ -[ - { - "id": 411250558, - "name": "CVE-2021-41822", - "full_name": "badboycxcc\/CVE-2021-41822", - "owner": { - "login": "badboycxcc", - "id": 72059221, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72059221?v=4", - "html_url": "https:\/\/github.com\/badboycxcc" - }, - "html_url": "https:\/\/github.com\/badboycxcc\/CVE-2021-41822", - "description": "个人CVE", - "fork": false, - "created_at": "2021-09-28T11:17:41Z", - "updated_at": "2021-11-03T03:53:59Z", - "pushed_at": "2021-10-20T10:15:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index 343c6565d5..63a4e3e42d 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -354,17 +354,17 @@ "description": "CVE-2021-42013批量", "fork": false, "created_at": "2022-03-04T06:38:26Z", - "updated_at": "2022-03-11T03:52:23Z", + "updated_at": "2022-03-11T09:51:44Z", "pushed_at": "2022-03-04T10:49:00Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, - "watchers": 32, + "watchers": 31, "score": 0 }, { diff --git a/2021/CVE-2021-43224.json b/2021/CVE-2021-43224.json index 27d0865d26..7d033bbf43 100644 --- a/2021/CVE-2021-43224.json +++ b/2021/CVE-2021-43224.json @@ -13,17 +13,17 @@ "description": "Windows Common Log File System Driver POC", "fork": false, "created_at": "2021-12-21T01:51:41Z", - "updated_at": "2022-03-10T03:09:07Z", + "updated_at": "2022-03-11T07:33:01Z", "pushed_at": "2021-12-21T06:57:06Z", - "stargazers_count": 76, - "watchers_count": 76, - "forks_count": 23, + "stargazers_count": 77, + "watchers_count": 77, + "forks_count": 25, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 23, - "watchers": 76, + "forks": 25, + "watchers": 77, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index acb6be0d1d..df84630f82 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -417,10 +417,10 @@ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2022-03-09T12:49:02Z", + "updated_at": "2022-03-11T09:26:10Z", "pushed_at": "2022-02-24T12:04:51Z", - "stargazers_count": 960, - "watchers_count": 960, + "stargazers_count": 962, + "watchers_count": 962, "forks_count": 400, "allow_forking": true, "is_template": false, @@ -429,7 +429,7 @@ ], "visibility": "public", "forks": 400, - "watchers": 960, + "watchers": 962, "score": 0 }, { @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-03-10T20:51:36Z", + "updated_at": "2022-03-11T09:45:18Z", "pushed_at": "2022-01-22T14:55:02Z", - "stargazers_count": 1268, - "watchers_count": 1268, + "stargazers_count": 1269, + "watchers_count": 1269, "forks_count": 346, "allow_forking": true, "is_template": false, @@ -922,7 +922,7 @@ ], "visibility": "public", "forks": 346, - "watchers": 1268, + "watchers": 1269, "score": 0 }, { @@ -10598,7 +10598,7 @@ "fork": false, "created_at": "2022-02-12T11:19:41Z", "updated_at": "2022-03-07T10:11:58Z", - "pushed_at": "2022-03-07T10:11:54Z", + "pushed_at": "2022-03-11T11:58:22Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json index 352e859040..3860b461bc 100644 --- a/2022/CVE-2022-0492.json +++ b/2022/CVE-2022-0492.json @@ -79,5 +79,32 @@ "forks": 0, "watchers": 4, "score": 0 + }, + { + "id": 468660841, + "name": "CVE-2022-0492", + "full_name": "chenaotian\/CVE-2022-0492", + "owner": { + "login": "chenaotian", + "id": 86546351, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4", + "html_url": "https:\/\/github.com\/chenaotian" + }, + "html_url": "https:\/\/github.com\/chenaotian\/CVE-2022-0492", + "description": "CVE-2022-0492 EXP and Analysis write up", + "fork": false, + "created_at": "2022-03-11T08:02:46Z", + "updated_at": "2022-03-11T08:06:36Z", + "pushed_at": "2022-03-11T09:33:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 06fab9d548..9ba5521ef6 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -94,17 +94,17 @@ "description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”", "fork": false, "created_at": "2022-03-07T18:36:50Z", - "updated_at": "2022-03-11T04:35:59Z", + "updated_at": "2022-03-11T11:47:04Z", "pushed_at": "2022-03-09T08:40:29Z", - "stargazers_count": 116, - "watchers_count": 116, - "forks_count": 36, + "stargazers_count": 123, + "watchers_count": 123, + "forks_count": 37, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 36, - "watchers": 116, + "forks": 37, + "watchers": 123, "score": 0 }, { @@ -121,17 +121,17 @@ "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "fork": false, "created_at": "2022-03-07T18:55:20Z", - "updated_at": "2022-03-11T06:14:40Z", + "updated_at": "2022-03-11T10:04:16Z", "pushed_at": "2022-03-08T06:20:05Z", - "stargazers_count": 736, - "watchers_count": 736, - "forks_count": 141, + "stargazers_count": 768, + "watchers_count": 768, + "forks_count": 145, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 141, - "watchers": 736, + "forks": 145, + "watchers": 768, "score": 0 }, { @@ -337,17 +337,17 @@ "description": "CVE-2022-0847 DirtyPipe Exploit.", "fork": false, "created_at": "2022-03-08T11:49:40Z", - "updated_at": "2022-03-10T22:39:01Z", + "updated_at": "2022-03-11T09:24:27Z", "pushed_at": "2022-03-08T11:52:22Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, - "watchers": 11, + "watchers": 12, "score": 0 }, { @@ -1005,5 +1005,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 468666839, + "name": "DirtyPipePython", + "full_name": "crusoe112\/DirtyPipePython", + "owner": { + "login": "crusoe112", + "id": 6531586, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6531586?v=4", + "html_url": "https:\/\/github.com\/crusoe112" + }, + "html_url": "https:\/\/github.com\/crusoe112\/DirtyPipePython", + "description": "A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shell", + "fork": false, + "created_at": "2022-03-11T08:22:56Z", + "updated_at": "2022-03-11T10:59:23Z", + "pushed_at": "2022-03-11T08:31:54Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0848.json b/2022/CVE-2022-0848.json new file mode 100644 index 0000000000..76b082c0ba --- /dev/null +++ b/2022/CVE-2022-0848.json @@ -0,0 +1,29 @@ +[ + { + "id": 468650717, + "name": "CVE-2022-0848", + "full_name": "dskmehra\/CVE-2022-0848", + "owner": { + "login": "dskmehra", + "id": 18103236, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18103236?v=4", + "html_url": "https:\/\/github.com\/dskmehra" + }, + "html_url": "https:\/\/github.com\/dskmehra\/CVE-2022-0848", + "description": null, + "fork": false, + "created_at": "2022-03-11T07:26:04Z", + "updated_at": "2022-03-11T07:27:11Z", + "pushed_at": "2022-03-11T07:29:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0853.json b/2022/CVE-2022-0853.json index c01c76bbda..20a28aebb2 100644 --- a/2022/CVE-2022-0853.json +++ b/2022/CVE-2022-0853.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-03-10T09:10:56Z", - "updated_at": "2022-03-11T00:31:36Z", + "updated_at": "2022-03-11T08:17:56Z", "pushed_at": "2022-03-10T09:28:22Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-20699.json b/2022/CVE-2022-20699.json index 6414131efd..5acd1391e3 100644 --- a/2022/CVE-2022-20699.json +++ b/2022/CVE-2022-20699.json @@ -13,17 +13,17 @@ "description": "Cisco Anyconnect VPN unauth RCE (rwx stack)", "fork": false, "created_at": "2022-02-07T15:53:21Z", - "updated_at": "2022-03-08T09:16:56Z", + "updated_at": "2022-03-11T11:56:34Z", "pushed_at": "2022-02-07T15:55:03Z", - "stargazers_count": 221, - "watchers_count": 221, - "forks_count": 41, + "stargazers_count": 222, + "watchers_count": 222, + "forks_count": 42, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 41, - "watchers": 221, + "forks": 42, + "watchers": 222, "score": 0 }, { diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index f2cf9aa449..a9ba488775 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -13,17 +13,17 @@ "description": "win32k LPE ", "fork": false, "created_at": "2022-01-27T03:44:10Z", - "updated_at": "2022-03-10T18:57:09Z", + "updated_at": "2022-03-11T07:35:21Z", "pushed_at": "2022-01-27T04:18:18Z", - "stargazers_count": 389, - "watchers_count": 389, - "forks_count": 115, + "stargazers_count": 390, + "watchers_count": 390, + "forks_count": 116, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 115, - "watchers": 389, + "forks": 116, + "watchers": 390, "score": 0 }, { @@ -67,17 +67,17 @@ "description": null, "fork": false, "created_at": "2022-02-03T11:25:14Z", - "updated_at": "2022-03-11T01:22:08Z", + "updated_at": "2022-03-11T09:19:10Z", "pushed_at": "2022-02-04T02:20:47Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 133, + "watchers_count": 133, "forks_count": 38, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 38, - "watchers": 132, + "watchers": 133, "score": 0 }, { diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json index 3d00a3b38c..d9d428e10b 100644 --- a/2022/CVE-2022-21971.json +++ b/2022/CVE-2022-21971.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"", "fork": false, "created_at": "2022-02-26T20:37:42Z", - "updated_at": "2022-03-09T11:40:55Z", + "updated_at": "2022-03-11T07:53:51Z", "pushed_at": "2022-02-26T20:45:19Z", - "stargazers_count": 201, - "watchers_count": 201, + "stargazers_count": 202, + "watchers_count": 202, "forks_count": 37, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 37, - "watchers": 201, + "watchers": 202, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21974.json b/2022/CVE-2022-21974.json index 6f37cfb4af..c61ecd7af7 100644 --- a/2022/CVE-2022-21974.json +++ b/2022/CVE-2022-21974.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"", "fork": false, "created_at": "2022-02-26T18:53:56Z", - "updated_at": "2022-03-10T13:59:11Z", + "updated_at": "2022-03-11T09:12:59Z", "pushed_at": "2022-02-26T19:12:12Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 46, + "watchers_count": 46, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 43, + "watchers": 46, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 5786ad8600..afc8b2c380 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,11 +13,11 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-03-09T18:53:59Z", + "updated_at": "2022-03-11T11:42:19Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 485, - "watchers_count": 485, - "forks_count": 91, + "stargazers_count": 486, + "watchers_count": 486, + "forks_count": 93, "allow_forking": true, "is_template": false, "topics": [ @@ -25,8 +25,8 @@ "cve-2022-22718" ], "visibility": "public", - "forks": 91, - "watchers": 485, + "forks": 93, + "watchers": 486, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 990da77697..aec3fb4a57 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -339,17 +339,17 @@ "description": "CVE-2021-42013批量", "fork": false, "created_at": "2022-03-04T06:38:26Z", - "updated_at": "2022-03-11T03:52:23Z", + "updated_at": "2022-03-11T09:51:44Z", "pushed_at": "2022-03-04T10:49:00Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, - "watchers": 32, + "watchers": 31, "score": 0 }, { @@ -447,17 +447,17 @@ "description": "CVE-2022-22947批量检测脚本,超时时间不超过2s,已更新可反弹shell的EXP,欢迎师傅们试用", "fork": false, "created_at": "2022-03-04T11:31:00Z", - "updated_at": "2022-03-10T02:31:00Z", + "updated_at": "2022-03-11T08:54:48Z", "pushed_at": "2022-03-08T09:43:50Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 9, + "watchers": 10, "score": 0 }, { @@ -744,17 +744,17 @@ "description": "CVE-2022-22947 Exploit script", "fork": false, "created_at": "2022-03-10T03:51:47Z", - "updated_at": "2022-03-10T08:44:28Z", + "updated_at": "2022-03-11T06:35:31Z", "pushed_at": "2022-03-10T08:43:59Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2022/CVE-2022-23940.json b/2022/CVE-2022-23940.json index 7744d2a0b2..e689c21eda 100644 --- a/2022/CVE-2022-23940.json +++ b/2022/CVE-2022-23940.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-03-06T17:05:02Z", "updated_at": "2022-03-07T15:32:26Z", - "pushed_at": "2022-03-10T19:18:41Z", + "pushed_at": "2022-03-11T06:38:16Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, diff --git a/2022/CVE-2022-24990.json b/2022/CVE-2022-24990.json index 546ffff04d..1f247de6ad 100644 --- a/2022/CVE-2022-24990.json +++ b/2022/CVE-2022-24990.json @@ -52,32 +52,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 468562369, - "name": "CVE-2022-24990-EXP", - "full_name": "VVeakee\/CVE-2022-24990-EXP", - "owner": { - "login": "VVeakee", - "id": 85714114, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85714114?v=4", - "html_url": "https:\/\/github.com\/VVeakee" - }, - "html_url": "https:\/\/github.com\/VVeakee\/CVE-2022-24990-EXP", - "description": null, - "fork": false, - "created_at": "2022-03-11T01:06:26Z", - "updated_at": "2022-03-11T01:06:26Z", - "pushed_at": "2022-03-11T01:21:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-25090.json b/2022/CVE-2022-25090.json index 5c5699ebe1..aa7ada5978 100644 --- a/2022/CVE-2022-25090.json +++ b/2022/CVE-2022-25090.json @@ -17,7 +17,7 @@ "pushed_at": "2022-03-02T15:29:46Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ @@ -27,7 +27,7 @@ "printix" ], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 2, "score": 0 } diff --git a/README.md b/README.md index 4483200584..6de15f08dc 100644 --- a/README.md +++ b/README.md @@ -47,6 +47,7 @@ A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in - [PaloAltoNetworks/can-ctr-escape-cve-2022-0492](https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492) - [SofianeHamlaoui/CVE-2022-0492-Checker](https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker) - [puckiestyle/CVE-2022-0492](https://github.com/puckiestyle/CVE-2022-0492) +- [chenaotian/CVE-2022-0492](https://github.com/chenaotian/CVE-2022-0492) ### CVE-2022-0529 (2022-02-09) @@ -116,6 +117,15 @@ A flaw was found in the way the "flags" member of the new pipe buffer - [michaelklaan/CVE-2022-0847-Dirty-Pipe](https://github.com/michaelklaan/CVE-2022-0847-Dirty-Pipe) - [terabitSec/dirtyPipe-automaticRoot](https://github.com/terabitSec/dirtyPipe-automaticRoot) - [Greetdawn/CVE-2022-0847-DirtyPipe-](https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-) +- [crusoe112/DirtyPipePython](https://github.com/crusoe112/DirtyPipePython) + +### CVE-2022-0848 (2022-03-04) + + +OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11. + + +- [dskmehra/CVE-2022-0848](https://github.com/dskmehra/CVE-2022-0848) ### CVE-2022-0853 - [ByteHackr/CVE-2022-0853](https://github.com/ByteHackr/CVE-2022-0853) @@ -480,7 +490,6 @@ ZZ Inc. KeyMouse Windows 3.08 and prior is affected by a remote code execution v ### CVE-2022-24990 - [Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-](https://github.com/Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-) - [VVeakee/CVE-2022-24990-POC](https://github.com/VVeakee/CVE-2022-24990-POC) -- [VVeakee/CVE-2022-24990-EXP](https://github.com/VVeakee/CVE-2022-24990-EXP) ### CVE-2022-25018 (2022-02-28) @@ -3266,6 +3275,7 @@ Metabase is an open source data analytics platform. In affected versions a secur - [zer0yu/CVE-2021-41277](https://github.com/zer0yu/CVE-2021-41277) - [sasukeourad/CVE-2021-41277_SSRF](https://github.com/sasukeourad/CVE-2021-41277_SSRF) - [frknktlca/Metabase_Nmap_Script](https://github.com/frknktlca/Metabase_Nmap_Script) +- [Chen-ling-afk/CVE-2021-41277](https://github.com/Chen-ling-afk/CVE-2021-41277) ### CVE-2021-41349 (2021-11-09) @@ -3369,9 +3379,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773) - [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773) -### CVE-2021-41822 -- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822) - ### CVE-2021-41962 (2021-12-16) @@ -13540,6 +13547,14 @@ Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used - [tafamace/CVE-2018-1259](https://github.com/tafamace/CVE-2018-1259) +### CVE-2018-1263 (2018-05-15) + + +Addresses partial fix in CVE-2018-1261. Pivotal spring-integration-zip, versions prior to 1.0.2, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. + + +- [sakib570/CVE-2018-1263-Demo](https://github.com/sakib570/CVE-2018-1263-Demo) + ### CVE-2018-1270 (2018-04-06)