diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json
index 9b9241b99e..a70de58660 100644
--- a/2007/CVE-2007-2447.json
+++ b/2007/CVE-2007-2447.json
@@ -17,13 +17,13 @@
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 36,
"watchers_count": 36,
- "forks_count": 22,
+ "forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 22,
+ "forks": 23,
"watchers": 36,
"score": 0
},
diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json
index f39cb5cceb..d590724352 100644
--- a/2017/CVE-2017-10271.json
+++ b/2017/CVE-2017-10271.json
@@ -444,10 +444,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
- "updated_at": "2022-06-28T08:15:09Z",
+ "updated_at": "2022-07-05T07:36:05Z",
"pushed_at": "2020-10-01T20:20:41Z",
- "stargazers_count": 347,
- "watchers_count": 347,
+ "stargazers_count": 348,
+ "watchers_count": 348,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
@@ -455,7 +455,7 @@
"topics": [],
"visibility": "public",
"forks": 114,
- "watchers": 347,
+ "watchers": 348,
"score": 0
},
{
diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json
index 394436a90d..aba13ad511 100644
--- a/2018/CVE-2018-10933.json
+++ b/2018/CVE-2018-10933.json
@@ -41,10 +41,10 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
- "updated_at": "2022-06-22T10:52:07Z",
+ "updated_at": "2022-07-05T08:51:31Z",
"pushed_at": "2022-03-29T21:56:08Z",
- "stargazers_count": 481,
- "watchers_count": 481,
+ "stargazers_count": 482,
+ "watchers_count": 482,
"forks_count": 121,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
- "watchers": 481,
+ "watchers": 482,
"score": 0
},
{
diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json
index 5e75c52db5..99f75f6f99 100644
--- a/2019/CVE-2019-11510.json
+++ b/2019/CVE-2019-11510.json
@@ -209,10 +209,10 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
- "updated_at": "2022-06-16T11:16:04Z",
+ "updated_at": "2022-07-05T08:40:48Z",
"pushed_at": "2020-01-15T17:01:50Z",
- "stargazers_count": 126,
- "watchers_count": 126,
+ "stargazers_count": 125,
+ "watchers_count": 125,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@@ -229,7 +229,7 @@
],
"visibility": "public",
"forks": 58,
- "watchers": 126,
+ "watchers": 125,
"score": 0
},
{
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index a5b109097c..8ba750f1f7 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -41,7 +41,7 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2022-07-05T03:54:35Z",
+ "updated_at": "2022-07-05T09:33:34Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3406,
"watchers_count": 3406,
diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json
index 96c1f75d2a..3b24d30e6f 100644
--- a/2019/CVE-2019-2725.json
+++ b/2019/CVE-2019-2725.json
@@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
- "updated_at": "2022-06-28T08:15:09Z",
+ "updated_at": "2022-07-05T07:36:05Z",
"pushed_at": "2020-10-01T20:20:41Z",
- "stargazers_count": 347,
- "watchers_count": 347,
+ "stargazers_count": 348,
+ "watchers_count": 348,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 114,
- "watchers": 347,
+ "watchers": 348,
"score": 0
},
{
@@ -181,10 +181,10 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
- "updated_at": "2022-06-13T07:35:45Z",
+ "updated_at": "2022-07-05T10:27:21Z",
"pushed_at": "2019-08-08T09:48:20Z",
- "stargazers_count": 420,
- "watchers_count": 420,
+ "stargazers_count": 421,
+ "watchers_count": 421,
"forks_count": 162,
"allow_forking": true,
"is_template": false,
@@ -192,7 +192,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
- "watchers": 420,
+ "watchers": 421,
"score": 0
},
{
diff --git a/2019/CVE-2019-5489.json b/2019/CVE-2019-5489.json
index cb3d5e97c5..1b889d7521 100644
--- a/2019/CVE-2019-5489.json
+++ b/2019/CVE-2019-5489.json
@@ -13,10 +13,10 @@
"description": "Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux",
"fork": false,
"created_at": "2019-12-06T05:37:08Z",
- "updated_at": "2022-03-01T08:57:54Z",
+ "updated_at": "2022-07-05T07:20:44Z",
"pushed_at": "2021-10-02T00:15:11Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 3,
- "watchers": 8,
+ "watchers": 9,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json
index dd2082a0eb..b6dcff0a1b 100644
--- a/2019/CVE-2019-7238.json
+++ b/2019/CVE-2019-7238.json
@@ -17,13 +17,13 @@
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 148,
"watchers_count": 148,
- "forks_count": 57,
+ "forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 57,
+ "forks": 56,
"watchers": 148,
"score": 0
},
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index bccfd54198..855f81ee83 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -1054,10 +1054,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
- "updated_at": "2022-07-03T15:31:26Z",
+ "updated_at": "2022-07-05T09:34:29Z",
"pushed_at": "2020-12-07T20:04:27Z",
- "stargazers_count": 1200,
- "watchers_count": 1200,
+ "stargazers_count": 1202,
+ "watchers_count": 1202,
"forks_count": 372,
"allow_forking": true,
"is_template": false,
@@ -1071,7 +1071,7 @@
],
"visibility": "public",
"forks": 372,
- "watchers": 1200,
+ "watchers": 1202,
"score": 0
},
{
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 4731e4d35c..0fdd0192b5 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -1634,7 +1634,7 @@
"fork": false,
"created_at": "2022-06-23T07:18:17Z",
"updated_at": "2022-07-04T13:52:48Z",
- "pushed_at": "2022-07-04T06:45:59Z",
+ "pushed_at": "2022-07-05T09:50:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 5e19da49ed..7a358aa856 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,7 +13,7 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2022-07-05T03:54:35Z",
+ "updated_at": "2022-07-05T09:33:34Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3406,
"watchers_count": 3406,
diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json
index 8df030b3be..8dd5683c42 100644
--- a/2020/CVE-2020-14883.json
+++ b/2020/CVE-2020-14883.json
@@ -125,10 +125,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
- "updated_at": "2022-06-29T09:39:00Z",
+ "updated_at": "2022-07-05T09:34:37Z",
"pushed_at": "2021-07-30T03:28:00Z",
- "stargazers_count": 973,
- "watchers_count": 973,
+ "stargazers_count": 974,
+ "watchers_count": 974,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@@ -140,7 +140,7 @@
],
"visibility": "public",
"forks": 306,
- "watchers": 973,
+ "watchers": 974,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-16938.json b/2020/CVE-2020-16938.json
index c8c4f86a63..dd5b7f97b1 100644
--- a/2020/CVE-2020-16938.json
+++ b/2020/CVE-2020-16938.json
@@ -13,10 +13,10 @@
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
"fork": false,
"created_at": "2020-10-21T15:38:22Z",
- "updated_at": "2022-06-09T16:31:29Z",
+ "updated_at": "2022-07-05T07:20:25Z",
"pushed_at": "2020-10-21T15:39:00Z",
- "stargazers_count": 178,
- "watchers_count": 178,
+ "stargazers_count": 179,
+ "watchers_count": 179,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
- "watchers": 178,
+ "watchers": 179,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-3956.json b/2020/CVE-2020-3956.json
index 5ca8dde6ad..1fcc3074a9 100644
--- a/2020/CVE-2020-3956.json
+++ b/2020/CVE-2020-3956.json
@@ -13,10 +13,10 @@
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
"fork": false,
"created_at": "2020-06-01T18:26:32Z",
- "updated_at": "2022-06-20T12:51:13Z",
+ "updated_at": "2022-07-05T07:20:48Z",
"pushed_at": "2020-06-02T08:30:22Z",
- "stargazers_count": 84,
- "watchers_count": 84,
+ "stargazers_count": 83,
+ "watchers_count": 83,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
- "watchers": 84,
+ "watchers": 83,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-5421.json b/2020/CVE-2020-5421.json
index 795de4024b..2edf328439 100644
--- a/2020/CVE-2020-5421.json
+++ b/2020/CVE-2020-5421.json
@@ -13,10 +13,10 @@
"description": "Spring 安全漏洞 CVE-2020-5421复现 ",
"fork": false,
"created_at": "2021-01-10T12:26:00Z",
- "updated_at": "2021-06-28T01:37:18Z",
+ "updated_at": "2022-07-05T09:12:58Z",
"pushed_at": "2021-01-10T12:48:19Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index 29a9b3f131..f0b18c80eb 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
- "updated_at": "2022-07-04T16:10:53Z",
+ "updated_at": "2022-07-05T11:34:58Z",
"pushed_at": "2021-07-20T15:28:13Z",
- "stargazers_count": 1574,
- "watchers_count": 1574,
+ "stargazers_count": 1575,
+ "watchers_count": 1575,
"forks_count": 567,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 567,
- "watchers": 1574,
+ "watchers": 1575,
"score": 0
},
{
diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json
index 333e4777a1..c33232d9df 100644
--- a/2021/CVE-2021-21551.json
+++ b/2021/CVE-2021-21551.json
@@ -196,10 +196,10 @@
"description": "Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.",
"fork": false,
"created_at": "2022-06-25T11:13:45Z",
- "updated_at": "2022-07-01T19:02:02Z",
+ "updated_at": "2022-07-05T09:47:54Z",
"pushed_at": "2022-07-01T19:02:25Z",
- "stargazers_count": 52,
- "watchers_count": 52,
+ "stargazers_count": 53,
+ "watchers_count": 53,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@@ -215,7 +215,7 @@
],
"visibility": "public",
"forks": 16,
- "watchers": 52,
+ "watchers": 53,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
index 5c0048562b..10d8be663b 100644
--- a/2021/CVE-2021-21985.json
+++ b/2021/CVE-2021-21985.json
@@ -132,10 +132,10 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
- "updated_at": "2022-07-04T07:50:44Z",
+ "updated_at": "2022-07-05T07:21:08Z",
"pushed_at": "2021-06-09T10:13:56Z",
- "stargazers_count": 342,
- "watchers_count": 342,
+ "stargazers_count": 341,
+ "watchers_count": 341,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
@@ -143,7 +143,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
- "watchers": 342,
+ "watchers": 341,
"score": 0
},
{
@@ -160,10 +160,10 @@
"description": "cve-2021-21985 exploit",
"fork": false,
"created_at": "2021-06-03T12:17:06Z",
- "updated_at": "2022-06-28T14:16:29Z",
+ "updated_at": "2022-07-05T07:21:08Z",
"pushed_at": "2022-01-10T07:01:58Z",
- "stargazers_count": 101,
- "watchers_count": 101,
+ "stargazers_count": 100,
+ "watchers_count": 100,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
@@ -171,7 +171,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
- "watchers": 101,
+ "watchers": 100,
"score": 0
},
{
diff --git a/2021/CVE-2021-22214.json b/2021/CVE-2021-22214.json
index 581fcb96b8..a5cffcda2c 100644
--- a/2021/CVE-2021-22214.json
+++ b/2021/CVE-2021-22214.json
@@ -13,10 +13,10 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
"fork": false,
"created_at": "2021-06-22T03:04:50Z",
- "updated_at": "2022-06-17T03:05:38Z",
+ "updated_at": "2022-07-05T07:21:08Z",
"pushed_at": "2021-06-22T04:35:08Z",
- "stargazers_count": 63,
- "watchers_count": 63,
+ "stargazers_count": 62,
+ "watchers_count": 62,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
- "watchers": 63,
+ "watchers": 62,
"score": 0
},
{
diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json
index 1331809758..4c73c95c7f 100644
--- a/2021/CVE-2021-22986.json
+++ b/2021/CVE-2021-22986.json
@@ -214,10 +214,10 @@
"description": "F5 BIG-IP远程代码执行;cve-2021-22986,批量检测;命令执行利用",
"fork": false,
"created_at": "2021-03-26T03:32:06Z",
- "updated_at": "2021-12-15T14:41:44Z",
+ "updated_at": "2022-07-05T07:21:07Z",
"pushed_at": "2021-03-26T05:09:54Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 10,
+ "watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@@ -225,7 +225,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 11,
+ "watchers": 10,
"score": 0
},
{
diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json
index 99e9e3ef72..0569bf84b6 100644
--- a/2021/CVE-2021-25646.json
+++ b/2021/CVE-2021-25646.json
@@ -125,10 +125,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
- "updated_at": "2022-06-29T09:39:00Z",
+ "updated_at": "2022-07-05T09:34:37Z",
"pushed_at": "2021-07-30T03:28:00Z",
- "stargazers_count": 973,
- "watchers_count": 973,
+ "stargazers_count": 974,
+ "watchers_count": 974,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@@ -140,7 +140,7 @@
],
"visibility": "public",
"forks": 306,
- "watchers": 973,
+ "watchers": 974,
"score": 0
},
{
diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json
index a4c4acc54e..da2e2569d0 100644
--- a/2021/CVE-2021-26855.json
+++ b/2021/CVE-2021-26855.json
@@ -166,10 +166,10 @@
"description": "PoC for CVE-2021-26855 -Just a checker-",
"fork": false,
"created_at": "2021-03-06T23:12:22Z",
- "updated_at": "2022-05-03T06:37:51Z",
+ "updated_at": "2022-07-05T07:21:07Z",
"pushed_at": "2021-03-09T22:07:46Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@@ -177,7 +177,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 19,
+ "watchers": 17,
"score": 0
},
{
@@ -281,10 +281,10 @@
"description": "CVE-2021-26855 exp",
"fork": false,
"created_at": "2021-03-08T08:39:05Z",
- "updated_at": "2022-06-09T03:00:43Z",
+ "updated_at": "2022-07-05T07:21:07Z",
"pushed_at": "2021-03-08T08:09:01Z",
- "stargazers_count": 112,
- "watchers_count": 112,
+ "stargazers_count": 110,
+ "watchers_count": 110,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
@@ -292,7 +292,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
- "watchers": 112,
+ "watchers": 110,
"score": 0
},
{
diff --git a/2021/CVE-2021-27651.json b/2021/CVE-2021-27651.json
index 183774a71f..5e6f96f29e 100644
--- a/2021/CVE-2021-27651.json
+++ b/2021/CVE-2021-27651.json
@@ -13,10 +13,10 @@
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
"fork": false,
"created_at": "2021-05-16T01:40:47Z",
- "updated_at": "2022-06-30T07:46:24Z",
+ "updated_at": "2022-07-05T12:00:48Z",
"pushed_at": "2021-05-16T05:54:07Z",
- "stargazers_count": 59,
- "watchers_count": 59,
+ "stargazers_count": 60,
+ "watchers_count": 60,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 59,
+ "watchers": 60,
"score": 0
},
{
diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json
deleted file mode 100644
index 69711de4fc..0000000000
--- a/2021/CVE-2021-30632.json
+++ /dev/null
@@ -1,30 +0,0 @@
-[
- {
- "id": 411162655,
- "name": "CVE-2021-30632",
- "full_name": "CrackerCat\/CVE-2021-30632",
- "owner": {
- "login": "CrackerCat",
- "id": 17995064,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
- "html_url": "https:\/\/github.com\/CrackerCat"
- },
- "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-30632",
- "description": null,
- "fork": false,
- "created_at": "2021-09-28T06:27:49Z",
- "updated_at": "2022-02-16T03:32:22Z",
- "pushed_at": "2021-12-13T06:02:21Z",
- "stargazers_count": 4,
- "watchers_count": 4,
- "forks_count": 25,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 25,
- "watchers": 4,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json
index 8598b44c7e..1acc7e93dc 100644
--- a/2021/CVE-2021-31166.json
+++ b/2021/CVE-2021-31166.json
@@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
- "updated_at": "2022-07-03T06:04:11Z",
+ "updated_at": "2022-07-05T07:21:08Z",
"pushed_at": "2021-06-12T08:27:09Z",
- "stargazers_count": 813,
- "watchers_count": 813,
+ "stargazers_count": 812,
+ "watchers_count": 812,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 137,
- "watchers": 813,
+ "watchers": 812,
"score": 0
},
{
diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json
index 2d627fe63d..05481d647a 100644
--- a/2021/CVE-2021-3129.json
+++ b/2021/CVE-2021-3129.json
@@ -125,10 +125,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
- "updated_at": "2022-06-23T16:11:34Z",
+ "updated_at": "2022-07-05T07:21:06Z",
"pushed_at": "2021-03-07T04:39:58Z",
- "stargazers_count": 54,
- "watchers_count": 54,
+ "stargazers_count": 53,
+ "watchers_count": 53,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@@ -140,7 +140,7 @@
],
"visibility": "public",
"forks": 22,
- "watchers": 54,
+ "watchers": 53,
"score": 0
},
{
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 05f534738f..bcbed20988 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -75,10 +75,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
- "updated_at": "2022-07-05T02:53:15Z",
+ "updated_at": "2022-07-05T11:39:34Z",
"pushed_at": "2022-06-08T04:00:28Z",
- "stargazers_count": 1596,
- "watchers_count": 1596,
+ "stargazers_count": 1597,
+ "watchers_count": 1597,
"forks_count": 462,
"allow_forking": true,
"is_template": false,
@@ -86,7 +86,7 @@
"topics": [],
"visibility": "public",
"forks": 462,
- "watchers": 1596,
+ "watchers": 1597,
"score": 0
},
{
@@ -159,11 +159,11 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
- "updated_at": "2022-07-03T21:31:34Z",
+ "updated_at": "2022-07-05T09:34:55Z",
"pushed_at": "2022-02-12T05:22:58Z",
- "stargazers_count": 875,
- "watchers_count": 875,
- "forks_count": 285,
+ "stargazers_count": 876,
+ "watchers_count": 876,
+ "forks_count": 286,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -173,8 +173,8 @@
"poc"
],
"visibility": "public",
- "forks": 285,
- "watchers": 875,
+ "forks": 286,
+ "watchers": 876,
"score": 0
},
{
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index b6184cab3c..18ef06171e 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -45,7 +45,7 @@
"pushed_at": "2022-06-22T20:21:42Z",
"stargazers_count": 683,
"watchers_count": 683,
- "forks_count": 157,
+ "forks_count": 158,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -58,7 +58,7 @@
"remote-code-execution"
],
"visibility": "public",
- "forks": 157,
+ "forks": 158,
"watchers": 683,
"score": 0
},
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 0c1f4f10c8..b0a45cb5d0 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -13,18 +13,18 @@
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
- "updated_at": "2022-06-10T09:08:10Z",
+ "updated_at": "2022-07-05T07:53:35Z",
"pushed_at": "2022-03-10T14:02:09Z",
- "stargazers_count": 39,
- "watchers_count": 39,
- "forks_count": 11,
+ "stargazers_count": 40,
+ "watchers_count": 40,
+ "forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 11,
- "watchers": 39,
+ "forks": 12,
+ "watchers": 40,
"score": 0
},
{
diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json
index 69520ee71e..4b51feecc8 100644
--- a/2021/CVE-2021-43798.json
+++ b/2021/CVE-2021-43798.json
@@ -227,34 +227,6 @@
"watchers": 1,
"score": 0
},
- {
- "id": 437761790,
- "name": "Grafana-CVE-2021-43798",
- "full_name": "Awrrays\/Grafana-CVE-2021-43798",
- "owner": {
- "login": "Awrrays",
- "id": 55682880,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55682880?v=4",
- "html_url": "https:\/\/github.com\/Awrrays"
- },
- "html_url": "https:\/\/github.com\/Awrrays\/Grafana-CVE-2021-43798",
- "description": "Grafana任意文件读取",
- "fork": false,
- "created_at": "2021-12-13T06:32:39Z",
- "updated_at": "2022-04-05T16:48:25Z",
- "pushed_at": "2021-12-13T06:36:22Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 3,
- "score": 0
- },
{
"id": 438335194,
"name": "CVE-2021-43798",
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 1bfe0086b0..deccb9fea3 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -525,10 +525,10 @@
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
- "updated_at": "2022-07-04T19:03:11Z",
+ "updated_at": "2022-07-05T09:35:02Z",
"pushed_at": "2022-01-15T16:18:44Z",
- "stargazers_count": 814,
- "watchers_count": 814,
+ "stargazers_count": 815,
+ "watchers_count": 815,
"forks_count": 131,
"allow_forking": true,
"is_template": false,
@@ -556,7 +556,7 @@
],
"visibility": "public",
"forks": 131,
- "watchers": 814,
+ "watchers": 815,
"score": 0
},
{
@@ -689,34 +689,6 @@
"watchers": 42,
"score": 0
},
- {
- "id": 437170557,
- "name": "sample-ldap-exploit",
- "full_name": "phoswald\/sample-ldap-exploit",
- "owner": {
- "login": "phoswald",
- "id": 12776329,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4",
- "html_url": "https:\/\/github.com\/phoswald"
- },
- "html_url": "https:\/\/github.com\/phoswald\/sample-ldap-exploit",
- "description": "A short demo of CVE-2021-44228",
- "fork": false,
- "created_at": "2021-12-11T02:45:39Z",
- "updated_at": "2022-05-22T14:45:42Z",
- "pushed_at": "2021-12-13T09:20:35Z",
- "stargazers_count": 7,
- "watchers_count": 7,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 2,
- "watchers": 7,
- "score": 0
- },
{
"id": 437174339,
"name": "jndi-ldap-test-server",
@@ -765,10 +737,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
- "updated_at": "2022-07-04T09:27:12Z",
+ "updated_at": "2022-07-05T07:43:08Z",
"pushed_at": "2022-06-02T02:16:13Z",
- "stargazers_count": 399,
- "watchers_count": 399,
+ "stargazers_count": 400,
+ "watchers_count": 400,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
@@ -781,7 +753,35 @@
],
"visibility": "public",
"forks": 86,
- "watchers": 399,
+ "watchers": 400,
+ "score": 0
+ },
+ {
+ "id": 437248883,
+ "name": "log4shell-mitigation-tester",
+ "full_name": "lhotari\/log4shell-mitigation-tester",
+ "owner": {
+ "login": "lhotari",
+ "id": 66864,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
+ "html_url": "https:\/\/github.com\/lhotari"
+ },
+ "html_url": "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester",
+ "description": "Log4Shell CVE-2021-44228 mitigation tester",
+ "fork": false,
+ "created_at": "2021-12-11T10:16:58Z",
+ "updated_at": "2021-12-21T20:05:48Z",
+ "pushed_at": "2021-12-13T17:24:37Z",
+ "stargazers_count": 16,
+ "watchers_count": 16,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 16,
"score": 0
},
{
@@ -853,34 +853,6 @@
"watchers": 2,
"score": 0
},
- {
- "id": 437265792,
- "name": "log4j2021_vul_test",
- "full_name": "gauthamg\/log4j2021_vul_test",
- "owner": {
- "login": "gauthamg",
- "id": 8748677,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4",
- "html_url": "https:\/\/github.com\/gauthamg"
- },
- "html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test",
- "description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228",
- "fork": false,
- "created_at": "2021-12-11T11:41:04Z",
- "updated_at": "2021-12-13T06:49:35Z",
- "pushed_at": "2021-12-13T06:49:32Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 437273514,
"name": "CVE-2021-44228-playground",
@@ -965,34 +937,6 @@
"watchers": 11,
"score": 0
},
- {
- "id": 437316134,
- "name": "log4j2-vulnerable-spring-app",
- "full_name": "zzzz0317\/log4j2-vulnerable-spring-app",
- "owner": {
- "login": "zzzz0317",
- "id": 16097046,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4",
- "html_url": "https:\/\/github.com\/zzzz0317"
- },
- "html_url": "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app",
- "description": "CVE-2021-44228",
- "fork": false,
- "created_at": "2021-12-11T15:18:42Z",
- "updated_at": "2022-03-23T06:42:48Z",
- "pushed_at": "2021-12-13T02:14:14Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 3,
- "score": 0
- },
{
"id": 437319619,
"name": "test-44228",
@@ -1307,34 +1251,6 @@
"watchers": 14,
"score": 0
},
- {
- "id": 437518939,
- "name": "CVE-2021-44228-docker-example",
- "full_name": "DiCanio\/CVE-2021-44228-docker-example",
- "owner": {
- "login": "DiCanio",
- "id": 6052859,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4",
- "html_url": "https:\/\/github.com\/DiCanio"
- },
- "html_url": "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example",
- "description": null,
- "fork": false,
- "created_at": "2021-12-12T10:53:15Z",
- "updated_at": "2021-12-13T03:58:51Z",
- "pushed_at": "2021-12-13T00:03:51Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 1,
- "score": 0
- },
{
"id": 437526168,
"name": "Log4JShell-Bytecode-Detector",
@@ -1550,34 +1466,6 @@
"watchers": 0,
"score": 0
},
- {
- "id": 437574258,
- "name": "log4j-poc",
- "full_name": "fireflyingup\/log4j-poc",
- "owner": {
- "login": "fireflyingup",
- "id": 48504204,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4",
- "html_url": "https:\/\/github.com\/fireflyingup"
- },
- "html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc",
- "description": "CVE-2021-44228 test demo",
- "fork": false,
- "created_at": "2021-12-12T14:54:25Z",
- "updated_at": "2021-12-13T05:10:53Z",
- "pushed_at": "2021-12-13T05:10:50Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 437582859,
"name": "log4j-jndi-be-gone",
@@ -1792,43 +1680,6 @@
"watchers": 0,
"score": 0
},
- {
- "id": 437660117,
- "name": "Log4j-RCE",
- "full_name": "momos1337\/Log4j-RCE",
- "owner": {
- "login": "momos1337",
- "id": 64172550,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4",
- "html_url": "https:\/\/github.com\/momos1337"
- },
- "html_url": "https:\/\/github.com\/momos1337\/Log4j-RCE",
- "description": "Log4j RCE - (CVE-2021-44228)",
- "fork": false,
- "created_at": "2021-12-12T21:26:44Z",
- "updated_at": "2021-12-23T14:39:40Z",
- "pushed_at": "2021-12-13T00:54:22Z",
- "stargazers_count": 7,
- "watchers_count": 7,
- "forks_count": 4,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "bughunter",
- "cve-2021-44228",
- "exploit",
- "hacking",
- "log4j",
- "log4j-rce",
- "rce",
- "remote-code-execution"
- ],
- "visibility": "public",
- "forks": 4,
- "watchers": 7,
- "score": 0
- },
{
"id": 437660360,
"name": "cve-2021-44228-log4j-mitigation",
@@ -1919,6 +1770,41 @@
"watchers": 330,
"score": 0
},
+ {
+ "id": 437681598,
+ "name": "CVE-2021-44228-PoC",
+ "full_name": "sunnyvale-it\/CVE-2021-44228-PoC",
+ "owner": {
+ "login": "sunnyvale-it",
+ "id": 44291039,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
+ "html_url": "https:\/\/github.com\/sunnyvale-it"
+ },
+ "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC",
+ "description": "CVE-2021-44228 (Log4Shell) Proof of Concept",
+ "fork": false,
+ "created_at": "2021-12-12T23:37:39Z",
+ "updated_at": "2022-03-18T18:44:50Z",
+ "pushed_at": "2021-12-13T21:23:25Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cybersecurity",
+ "java",
+ "log4j",
+ "log4j2",
+ "security"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 5,
+ "score": 0
+ },
{
"id": 437685288,
"name": "log4j2-CVE-2021-44228",
@@ -2031,34 +1917,6 @@
"watchers": 2,
"score": 0
},
- {
- "id": 437704633,
- "name": "Log4j-check",
- "full_name": "bigsizeme\/Log4j-check",
- "owner": {
- "login": "bigsizeme",
- "id": 17845094,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
- "html_url": "https:\/\/github.com\/bigsizeme"
- },
- "html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check",
- "description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
- "fork": false,
- "created_at": "2021-12-13T01:55:51Z",
- "updated_at": "2022-06-29T07:51:19Z",
- "pushed_at": "2021-12-13T09:18:19Z",
- "stargazers_count": 44,
- "watchers_count": 44,
- "forks_count": 19,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 19,
- "watchers": 44,
- "score": 0
- },
{
"id": 437709337,
"name": "exploit-CVE-2021-44228",
@@ -2343,41 +2201,6 @@
"watchers": 1,
"score": 0
},
- {
- "id": 437784907,
- "name": "aws-log4j-mitigations",
- "full_name": "markuman\/aws-log4j-mitigations",
- "owner": {
- "login": "markuman",
- "id": 3920157,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4",
- "html_url": "https:\/\/github.com\/markuman"
- },
- "html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations",
- "description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible",
- "fork": false,
- "created_at": "2021-12-13T08:01:55Z",
- "updated_at": "2021-12-13T08:05:42Z",
- "pushed_at": "2021-12-13T08:03:50Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "ansible",
- "aws",
- "cve-2021-44228",
- "log4j",
- "mitigation",
- "waf"
- ],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 437788180,
"name": "Log4shell",
@@ -2854,6 +2677,34 @@
"watchers": 4,
"score": 0
},
+ {
+ "id": 437902732,
+ "name": "JndiLookup",
+ "full_name": "madCdan\/JndiLookup",
+ "owner": {
+ "login": "madCdan",
+ "id": 10784600,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4",
+ "html_url": "https:\/\/github.com\/madCdan"
+ },
+ "html_url": "https:\/\/github.com\/madCdan\/JndiLookup",
+ "description": "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T14:22:34Z",
+ "updated_at": "2021-12-18T02:12:49Z",
+ "pushed_at": "2021-12-13T17:07:42Z",
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 3,
+ "score": 0
+ },
{
"id": 437904012,
"name": "MC-Log4j-Patcher",
@@ -3064,6 +2915,34 @@
"watchers": 11,
"score": 0
},
+ {
+ "id": 437960695,
+ "name": "CVE-2021-44228",
+ "full_name": "taurusxin\/CVE-2021-44228",
+ "owner": {
+ "login": "taurusxin",
+ "id": 17809960,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4",
+ "html_url": "https:\/\/github.com\/taurusxin"
+ },
+ "html_url": "https:\/\/github.com\/taurusxin\/CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T17:17:37Z",
+ "updated_at": "2021-12-13T17:22:22Z",
+ "pushed_at": "2021-12-13T17:22:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
{
"id": 437965181,
"name": "log4j2-prosecutor",
@@ -3094,6 +2973,34 @@
"watchers": 0,
"score": 0
},
+ {
+ "id": 437968616,
+ "name": "CVE-2021-44228_Log4Shell",
+ "full_name": "yanghaoi\/CVE-2021-44228_Log4Shell",
+ "owner": {
+ "login": "yanghaoi",
+ "id": 21354684,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4",
+ "html_url": "https:\/\/github.com\/yanghaoi"
+ },
+ "html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell",
+ "description": "Log4Shell A test for CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T17:44:01Z",
+ "updated_at": "2021-12-13T18:03:51Z",
+ "pushed_at": "2021-12-13T18:06:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
{
"id": 437983994,
"name": "log4j_checker",
@@ -3131,6 +3038,90 @@
"watchers": 8,
"score": 0
},
+ {
+ "id": 437988861,
+ "name": "Log4j-IOCs",
+ "full_name": "threatmonit\/Log4j-IOCs",
+ "owner": {
+ "login": "threatmonit",
+ "id": 90388073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4",
+ "html_url": "https:\/\/github.com\/threatmonit"
+ },
+ "html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs",
+ "description": "Public IOCs about log4j CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T18:52:19Z",
+ "updated_at": "2022-01-18T23:50:50Z",
+ "pushed_at": "2021-12-13T19:11:30Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0
+ },
+ {
+ "id": 437995131,
+ "name": "l4j-info",
+ "full_name": "ben-smash\/l4j-info",
+ "owner": {
+ "login": "ben-smash",
+ "id": 95368649,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
+ "html_url": "https:\/\/github.com\/ben-smash"
+ },
+ "html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
+ "description": "Compiling links of value i find regarding CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-13T19:14:23Z",
+ "updated_at": "2021-12-13T21:11:09Z",
+ "pushed_at": "2021-12-13T21:11:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
+ {
+ "id": 438003225,
+ "name": "log4j-test",
+ "full_name": "strawhatasif\/log4j-test",
+ "owner": {
+ "login": "strawhatasif",
+ "id": 10750101,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
+ "html_url": "https:\/\/github.com\/strawhatasif"
+ },
+ "html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
+ "description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
+ "fork": false,
+ "created_at": "2021-12-13T19:43:01Z",
+ "updated_at": "2021-12-13T20:26:40Z",
+ "pushed_at": "2021-12-13T20:26:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
{
"id": 438012376,
"name": "nmap-log4shell",
@@ -3166,6 +3157,34 @@
"watchers": 45,
"score": 0
},
+ {
+ "id": 438013062,
+ "name": "Siem-queries-for-CVE-2021-44228",
+ "full_name": "tica506\/Siem-queries-for-CVE-2021-44228",
+ "owner": {
+ "login": "tica506",
+ "id": 93236626,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4",
+ "html_url": "https:\/\/github.com\/tica506"
+ },
+ "html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-13T20:19:57Z",
+ "updated_at": "2021-12-13T20:56:54Z",
+ "pushed_at": "2021-12-13T20:56:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
{
"id": 438021782,
"name": "log4shell-example",
@@ -3230,6 +3249,34 @@
"watchers": 4,
"score": 0
},
+ {
+ "id": 438028657,
+ "name": "log4j2-CVE-2021-44228-poc-local",
+ "full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local",
+ "owner": {
+ "login": "snatalius",
+ "id": 22771118,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4",
+ "html_url": "https:\/\/github.com\/snatalius"
+ },
+ "html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local",
+ "description": "Just a personal proof of concept of CVE-2021-44228 on log4j2",
+ "fork": false,
+ "created_at": "2021-12-13T21:21:53Z",
+ "updated_at": "2021-12-13T21:21:56Z",
+ "pushed_at": "2021-12-13T21:21:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
{
"id": 438032780,
"name": "CVE-2021-44228",
@@ -3599,10 +3646,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
- "updated_at": "2022-07-04T00:10:34Z",
+ "updated_at": "2022-07-05T09:27:59Z",
"pushed_at": "2022-04-24T08:56:47Z",
- "stargazers_count": 321,
- "watchers_count": 321,
+ "stargazers_count": 322,
+ "watchers_count": 322,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
@@ -3616,7 +3663,7 @@
],
"visibility": "public",
"forks": 45,
- "watchers": 321,
+ "watchers": 322,
"score": 0
},
{
@@ -3779,10 +3826,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
- "updated_at": "2022-06-29T19:36:55Z",
+ "updated_at": "2022-07-05T09:29:39Z",
"pushed_at": "2022-01-27T16:08:20Z",
- "stargazers_count": 425,
- "watchers_count": 425,
+ "stargazers_count": 426,
+ "watchers_count": 426,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
@@ -3799,7 +3846,7 @@
],
"visibility": "public",
"forks": 94,
- "watchers": 425,
+ "watchers": 426,
"score": 0
},
{
@@ -4040,18 +4087,18 @@
"description": "Tools for investigating Log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T19:08:14Z",
- "updated_at": "2022-06-17T15:17:52Z",
+ "updated_at": "2022-07-05T08:10:28Z",
"pushed_at": "2021-12-23T21:03:08Z",
- "stargazers_count": 86,
- "watchers_count": 86,
- "forks_count": 11,
+ "stargazers_count": 87,
+ "watchers_count": 87,
+ "forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 11,
- "watchers": 86,
+ "forks": 12,
+ "watchers": 87,
"score": 0
},
{
diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json
index ce1950b01e..602fc19e0c 100644
--- a/2022/CVE-2022-0543.json
+++ b/2022/CVE-2022-0543.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
- "updated_at": "2022-06-21T05:56:17Z",
+ "updated_at": "2022-07-05T10:35:04Z",
"pushed_at": "2022-03-16T06:48:01Z",
- "stargazers_count": 48,
- "watchers_count": 48,
+ "stargazers_count": 51,
+ "watchers_count": 51,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
- "watchers": 48,
+ "watchers": 51,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json
index 83be73140a..4f3e6af881 100644
--- a/2022/CVE-2022-1388.json
+++ b/2022/CVE-2022-1388.json
@@ -209,10 +209,10 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
"fork": false,
"created_at": "2022-05-09T10:22:31Z",
- "updated_at": "2022-07-01T12:56:19Z",
+ "updated_at": "2022-07-05T07:31:32Z",
"pushed_at": "2022-06-28T18:14:40Z",
- "stargazers_count": 71,
- "watchers_count": 71,
+ "stargazers_count": 72,
+ "watchers_count": 72,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@@ -220,7 +220,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
- "watchers": 71,
+ "watchers": 72,
"score": 0
},
{
@@ -520,10 +520,10 @@
"description": "PoC For F5 BIG-IP - bash script Exploit one Liner",
"fork": false,
"created_at": "2022-05-10T02:57:31Z",
- "updated_at": "2022-06-25T15:12:05Z",
+ "updated_at": "2022-07-05T08:55:52Z",
"pushed_at": "2022-05-10T08:38:58Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@@ -531,7 +531,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 10,
+ "watchers": 9,
"score": 0
},
{
diff --git a/2022/CVE-2022-20124.json b/2022/CVE-2022-20124.json
new file mode 100644
index 0000000000..7352143c6f
--- /dev/null
+++ b/2022/CVE-2022-20124.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 510660359,
+ "name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-",
+ "full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
+ "owner": {
+ "login": "nidhi7598",
+ "id": 106973537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
+ "html_url": "https:\/\/github.com\/nidhi7598"
+ },
+ "html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-07-05T08:59:44Z",
+ "updated_at": "2022-07-05T09:52:45Z",
+ "pushed_at": "2022-07-05T09:52:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-20135.json b/2022/CVE-2022-20135.json
new file mode 100644
index 0000000000..6d5dc74e71
--- /dev/null
+++ b/2022/CVE-2022-20135.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 510684846,
+ "name": "frameworks_base_AOSP10_r33_CVE-2022-20135-",
+ "full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
+ "owner": {
+ "login": "nidhi7598",
+ "id": 106973537,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
+ "html_url": "https:\/\/github.com\/nidhi7598"
+ },
+ "html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-07-05T10:15:49Z",
+ "updated_at": "2022-07-05T10:42:21Z",
+ "pushed_at": "2022-07-05T10:41:43Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json
index f8c8260a91..8c15e0f000 100644
--- a/2022/CVE-2022-21882.json
+++ b/2022/CVE-2022-21882.json
@@ -73,13 +73,13 @@
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 167,
"watchers_count": 167,
- "forks_count": 44,
+ "forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 44,
+ "forks": 45,
"watchers": 167,
"score": 0
},
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 9c97010689..173d5571a8 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -1258,18 +1258,18 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
- "updated_at": "2022-07-05T05:52:29Z",
+ "updated_at": "2022-07-05T09:22:56Z",
"pushed_at": "2022-04-26T05:55:58Z",
- "stargazers_count": 81,
- "watchers_count": 81,
- "forks_count": 12,
+ "stargazers_count": 84,
+ "watchers_count": 84,
+ "forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 12,
- "watchers": 81,
+ "forks": 13,
+ "watchers": 84,
"score": 0
},
{
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index 85cf0cdee0..cf0a575013 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -1819,10 +1819,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-05T02:30:29Z",
- "updated_at": "2022-07-05T02:30:45Z",
+ "updated_at": "2022-07-05T09:20:53Z",
"pushed_at": "2022-07-05T02:32:04Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -1830,7 +1830,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 3,
"score": 0
},
{
diff --git a/2022/CVE-2022-22980.json b/2022/CVE-2022-22980.json
index d01074cb2d..874d9fba98 100644
--- a/2022/CVE-2022-22980.json
+++ b/2022/CVE-2022-22980.json
@@ -17,13 +17,13 @@
"pushed_at": "2022-06-23T09:53:01Z",
"stargazers_count": 29,
"watchers_count": 29,
- "forks_count": 6,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 6,
+ "forks": 7,
"watchers": 29,
"score": 0
},
diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json
index d9676007f2..59f5f2522f 100644
--- a/2022/CVE-2022-23222.json
+++ b/2022/CVE-2022-23222.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
- "updated_at": "2022-07-05T05:22:00Z",
+ "updated_at": "2022-07-05T06:59:58Z",
"pushed_at": "2022-06-07T03:41:13Z",
- "stargazers_count": 467,
- "watchers_count": 467,
+ "stargazers_count": 468,
+ "watchers_count": 468,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
- "watchers": 467,
+ "watchers": 468,
"score": 0
},
{
diff --git a/2022/CVE-2022-24342.json b/2022/CVE-2022-24342.json
index ef259de6de..8707e10a1b 100644
--- a/2022/CVE-2022-24342.json
+++ b/2022/CVE-2022-24342.json
@@ -13,11 +13,11 @@
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
"fork": false,
"created_at": "2022-07-02T22:04:29Z",
- "updated_at": "2022-07-05T00:37:02Z",
+ "updated_at": "2022-07-05T12:14:02Z",
"pushed_at": "2022-07-03T08:53:04Z",
- "stargazers_count": 24,
- "watchers_count": 24,
- "forks_count": 3,
+ "stargazers_count": 26,
+ "watchers_count": 26,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -31,8 +31,8 @@
"vulnerability"
],
"visibility": "public",
- "forks": 3,
- "watchers": 24,
+ "forks": 4,
+ "watchers": 26,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index ff180047c8..54d2d74017 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
- "updated_at": "2022-07-05T06:06:07Z",
+ "updated_at": "2022-07-05T12:12:32Z",
"pushed_at": "2022-07-05T01:29:14Z",
- "stargazers_count": 182,
- "watchers_count": 182,
- "forks_count": 33,
+ "stargazers_count": 190,
+ "watchers_count": 190,
+ "forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -30,8 +30,8 @@
"nday"
],
"visibility": "public",
- "forks": 33,
- "watchers": 182,
+ "forks": 35,
+ "watchers": 190,
"score": 0
},
{
@@ -137,10 +137,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
- "updated_at": "2022-07-05T00:54:45Z",
+ "updated_at": "2022-07-05T07:32:28Z",
"pushed_at": "2022-06-06T16:38:49Z",
- "stargazers_count": 125,
- "watchers_count": 125,
+ "stargazers_count": 126,
+ "watchers_count": 126,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 37,
- "watchers": 125,
+ "watchers": 126,
"score": 0
},
{
@@ -197,11 +197,11 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-06-03T21:07:30Z",
- "updated_at": "2022-07-05T01:10:58Z",
+ "updated_at": "2022-07-05T07:10:35Z",
"pushed_at": "2022-06-06T20:24:06Z",
- "stargazers_count": 238,
- "watchers_count": 238,
- "forks_count": 61,
+ "stargazers_count": 240,
+ "watchers_count": 240,
+ "forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -219,8 +219,8 @@
"vulnerability"
],
"visibility": "public",
- "forks": 61,
- "watchers": 238,
+ "forks": 62,
+ "watchers": 240,
"score": 0
},
{
@@ -399,18 +399,18 @@
"description": null,
"fork": false,
"created_at": "2022-06-05T12:23:34Z",
- "updated_at": "2022-07-04T08:47:54Z",
+ "updated_at": "2022-07-05T07:53:51Z",
"pushed_at": "2022-06-06T07:47:06Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "forks_count": 0,
+ "stargazers_count": 3,
+ "watchers_count": 3,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 2,
+ "forks": 1,
+ "watchers": 3,
"score": 0
},
{
@@ -1326,5 +1326,33 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 510624422,
+ "name": "CVE-2022-26134",
+ "full_name": "Debajyoti0-0\/CVE-2022-26134",
+ "owner": {
+ "login": "Debajyoti0-0",
+ "id": 79437050,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4",
+ "html_url": "https:\/\/github.com\/Debajyoti0-0"
+ },
+ "html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134",
+ "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
+ "fork": false,
+ "created_at": "2022-07-05T07:04:50Z",
+ "updated_at": "2022-07-05T10:20:09Z",
+ "pushed_at": "2022-07-05T09:40:39Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-27254.json b/2022/CVE-2022-27254.json
index d2ee395f49..20cfec5394 100644
--- a/2022/CVE-2022-27254.json
+++ b/2022/CVE-2022-27254.json
@@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
- "updated_at": "2022-07-04T10:46:42Z",
+ "updated_at": "2022-07-05T10:21:21Z",
"pushed_at": "2022-03-26T05:52:15Z",
- "stargazers_count": 349,
- "watchers_count": 349,
+ "stargazers_count": 350,
+ "watchers_count": 350,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
- "watchers": 349,
+ "watchers": 350,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json
index 673b88b1c4..bbccb7ba9c 100644
--- a/2022/CVE-2022-29464.json
+++ b/2022/CVE-2022-29464.json
@@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
- "updated_at": "2022-07-05T03:21:43Z",
+ "updated_at": "2022-07-05T10:33:11Z",
"pushed_at": "2022-04-27T05:52:43Z",
- "stargazers_count": 288,
- "watchers_count": 288,
+ "stargazers_count": 289,
+ "watchers_count": 289,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
@@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 66,
- "watchers": 288,
+ "watchers": 289,
"score": 0
},
{
@@ -507,5 +507,33 @@
"forks": 1,
"watchers": 4,
"score": 0
+ },
+ {
+ "id": 510649929,
+ "name": "WSO2RCE",
+ "full_name": "Pasch0\/WSO2RCE",
+ "owner": {
+ "login": "Pasch0",
+ "id": 78447612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78447612?v=4",
+ "html_url": "https:\/\/github.com\/Pasch0"
+ },
+ "html_url": "https:\/\/github.com\/Pasch0\/WSO2RCE",
+ "description": "CVE-2022-29464 Exploit",
+ "fork": false,
+ "created_at": "2022-07-05T08:27:04Z",
+ "updated_at": "2022-07-05T11:55:14Z",
+ "pushed_at": "2022-07-05T08:58:58Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 5,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-29885.json b/2022/CVE-2022-29885.json
index 2600740f72..787fe0916f 100644
--- a/2022/CVE-2022-29885.json
+++ b/2022/CVE-2022-29885.json
@@ -13,18 +13,18 @@
"description": "Apache Tomcat CVE-2022-29885",
"fork": false,
"created_at": "2022-04-30T02:30:00Z",
- "updated_at": "2022-07-04T10:25:57Z",
+ "updated_at": "2022-07-05T07:06:43Z",
"pushed_at": "2022-06-30T13:46:47Z",
- "stargazers_count": 14,
- "watchers_count": 14,
- "forks_count": 2,
+ "stargazers_count": 15,
+ "watchers_count": 15,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 14,
+ "forks": 3,
+ "watchers": 15,
"score": 0
},
{
@@ -41,8 +41,8 @@
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
"fork": false,
"created_at": "2022-07-01T09:02:10Z",
- "updated_at": "2022-07-01T09:02:10Z",
- "pushed_at": "2022-07-01T09:02:10Z",
+ "updated_at": "2022-07-05T06:23:21Z",
+ "pushed_at": "2022-07-05T06:23:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index bcd3093b78..f3906ae97d 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
- "updated_at": "2022-07-04T08:39:31Z",
+ "updated_at": "2022-07-05T10:20:07Z",
"pushed_at": "2022-06-05T21:06:13Z",
- "stargazers_count": 131,
- "watchers_count": 131,
+ "stargazers_count": 132,
+ "watchers_count": 132,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
@@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 51,
- "watchers": 131,
+ "watchers": 132,
"score": 0
},
{
@@ -772,10 +772,10 @@
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
- "updated_at": "2022-07-05T02:05:39Z",
+ "updated_at": "2022-07-05T08:00:07Z",
"pushed_at": "2022-06-06T07:19:53Z",
- "stargazers_count": 302,
- "watchers_count": 302,
+ "stargazers_count": 303,
+ "watchers_count": 303,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@@ -783,7 +783,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
- "watchers": 302,
+ "watchers": 303,
"score": 0
},
{
@@ -1753,18 +1753,18 @@
"description": "Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files",
"fork": false,
"created_at": "2022-06-15T02:22:53Z",
- "updated_at": "2022-06-23T20:26:56Z",
+ "updated_at": "2022-07-05T08:07:41Z",
"pushed_at": "2022-06-15T02:24:00Z",
- "stargazers_count": 26,
- "watchers_count": 26,
- "forks_count": 1,
+ "stargazers_count": 27,
+ "watchers_count": 27,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
- "watchers": 26,
+ "forks": 2,
+ "watchers": 27,
"score": 0
},
{
diff --git a/2022/CVE-2022-30333.json b/2022/CVE-2022-30333.json
index 608663a8d1..62473caaee 100644
--- a/2022/CVE-2022-30333.json
+++ b/2022/CVE-2022-30333.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-05T02:35:12Z",
- "updated_at": "2022-07-05T02:35:12Z",
+ "updated_at": "2022-07-05T09:10:18Z",
"pushed_at": "2022-07-05T02:58:30Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 2,
"score": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 83d3abe5ed..5d31c20d32 100644
--- a/README.md
+++ b/README.md
@@ -474,6 +474,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007)
+### CVE-2022-20124 (2022-06-15)
+
+
+In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-170646036
+
+
+- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
+
### CVE-2022-20130 (2022-06-15)
@@ -482,6 +490,14 @@ In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bou
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
+### CVE-2022-20135 (2022-06-15)
+
+
+In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
+
+
+- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-)
+
### CVE-2022-20142 (2022-06-15)
@@ -1661,6 +1677,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
+- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
### CVE-2022-26155 (2022-02-28)
@@ -2149,6 +2166,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- [trhacknon/CVE-2022-29464-mass](https://github.com/trhacknon/CVE-2022-29464-mass)
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
+- [Pasch0/WSO2RCE](https://github.com/Pasch0/WSO2RCE)
### CVE-2022-29548 (2022-04-20)
@@ -5009,14 +5027,6 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
-### CVE-2021-30632 (2021-10-08)
-
-
-Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
-
-
-- [CrackerCat/CVE-2021-30632](https://github.com/CrackerCat/CVE-2021-30632)
-
### CVE-2021-30682 (2021-09-08)
@@ -6250,7 +6260,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
-- [Awrrays/Grafana-CVE-2021-43798](https://github.com/Awrrays/Grafana-CVE-2021-43798)
- [Ryze-T/CVE-2021-43798](https://github.com/Ryze-T/CVE-2021-43798)
- [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana)
- [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798)
@@ -6397,16 +6406,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot)
- [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC)
- [1lann/log4shelldetect](https://github.com/1lann/log4shelldetect)
-- [phoswald/sample-ldap-exploit](https://github.com/phoswald/sample-ldap-exploit)
- [rakutentech/jndi-ldap-test-server](https://github.com/rakutentech/jndi-ldap-test-server)
- [f0ng/log4j2burpscanner](https://github.com/f0ng/log4j2burpscanner)
+- [lhotari/log4shell-mitigation-tester](https://github.com/lhotari/log4shell-mitigation-tester)
- [logpresso/CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner)
- [vorburger/Log4j_CVE-2021-44228](https://github.com/vorburger/Log4j_CVE-2021-44228)
-- [gauthamg/log4j2021_vul_test](https://github.com/gauthamg/log4j2021_vul_test)
- [b-abderrahmane/CVE-2021-44228-playground](https://github.com/b-abderrahmane/CVE-2021-44228-playground)
- [js-on/jndiRep](https://github.com/js-on/jndiRep)
- [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs)
-- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app)
- [datadavev/test-44228](https://github.com/datadavev/test-44228)
- [LemonCraftRu/JndiRemover](https://github.com/LemonCraftRu/JndiRemover)
- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
@@ -6417,7 +6424,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [alexandre-lavoie/python-log4rce](https://github.com/alexandre-lavoie/python-log4rce)
- [RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs)
- [blake-fm/vcenter-log4j](https://github.com/blake-fm/vcenter-log4j)
-- [DiCanio/CVE-2021-44228-docker-example](https://github.com/DiCanio/CVE-2021-44228-docker-example)
- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector)
- [dtact/divd-2021-00038--log4j-scanner](https://github.com/dtact/divd-2021-00038--log4j-scanner)
- [kali-dass/CVE-2021-44228-log4Shell](https://github.com/kali-dass/CVE-2021-44228-log4Shell)
@@ -6425,7 +6431,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [infiniroot/nginx-mitigate-log4shell](https://github.com/infiniroot/nginx-mitigate-log4shell)
- [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected)
- [guardicode/CVE-2021-44228_IoCs](https://github.com/guardicode/CVE-2021-44228_IoCs)
-- [fireflyingup/log4j-poc](https://github.com/fireflyingup/log4j-poc)
- [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone)
- [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch)
- [tasooshi/horrors-log4shell](https://github.com/tasooshi/horrors-log4shell)
@@ -6433,15 +6438,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [OlafHaalstra/log4jcheck](https://github.com/OlafHaalstra/log4jcheck)
- [psychose-club/Saturn](https://github.com/psychose-club/Saturn)
- [Panyaprach/Proof-CVE-2021-44228](https://github.com/Panyaprach/Proof-CVE-2021-44228)
-- [momos1337/Log4j-RCE](https://github.com/momos1337/Log4j-RCE)
- [palominoinc/cve-2021-44228-log4j-mitigation](https://github.com/palominoinc/cve-2021-44228-log4j-mitigation)
- [cyberxml/log4j-poc](https://github.com/cyberxml/log4j-poc)
- [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell)
+- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC)
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
-- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
@@ -6452,7 +6456,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources)
- [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832)
- [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228)
-- [markuman/aws-log4j-mitigations](https://github.com/markuman/aws-log4j-mitigations)
- [tuyenee/Log4shell](https://github.com/tuyenee/Log4shell)
- [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228)
- [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV)
@@ -6470,6 +6473,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [VNYui/CVE-2021-44228](https://github.com/VNYui/CVE-2021-44228)
- [flxhaas/Scan-CVE-2021-44228](https://github.com/flxhaas/Scan-CVE-2021-44228)
- [justakazh/Log4j-CVE-2021-44228](https://github.com/justakazh/Log4j-CVE-2021-44228)
+- [madCdan/JndiLookup](https://github.com/madCdan/JndiLookup)
- [Koupah/MC-Log4j-Patcher](https://github.com/Koupah/MC-Log4j-Patcher)
- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
@@ -6477,11 +6481,18 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips)
- [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
+- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
- [rodfer20/log4j2-prosecutor](https://github.com/rodfer20/log4j2-prosecutor)
+- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
+- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)
+- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
+- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
+- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228)
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)
+- [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local)
- [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228)
- [back2root/log4shell-rex](https://github.com/back2root/log4shell-rex)
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)