From 811292d84301482b25da59ffb06caccd10d16e71 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 5 Jul 2022 21:17:50 +0900 Subject: [PATCH] Auto Update 2022/07/05 12:17:50 --- 2007/CVE-2007-2447.json | 4 +- 2017/CVE-2017-10271.json | 8 +- 2018/CVE-2018-10933.json | 8 +- 2019/CVE-2019-11510.json | 8 +- 2019/CVE-2019-17558.json | 2 +- 2019/CVE-2019-2725.json | 16 +- 2019/CVE-2019-5489.json | 8 +- 2019/CVE-2019-7238.json | 4 +- 2020/CVE-2020-0796.json | 8 +- 2020/CVE-2020-1472.json | 2 +- 2020/CVE-2020-14882.json | 2 +- 2020/CVE-2020-14883.json | 8 +- 2020/CVE-2020-16938.json | 8 +- 2020/CVE-2020-3956.json | 8 +- 2020/CVE-2020-5421.json | 8 +- 2021/CVE-2021-1675.json | 8 +- 2021/CVE-2021-21551.json | 8 +- 2021/CVE-2021-21985.json | 16 +- 2021/CVE-2021-22214.json | 8 +- 2021/CVE-2021-22986.json | 8 +- 2021/CVE-2021-25646.json | 8 +- 2021/CVE-2021-26855.json | 16 +- 2021/CVE-2021-27651.json | 8 +- 2021/CVE-2021-30632.json | 30 -- 2021/CVE-2021-31166.json | 8 +- 2021/CVE-2021-3129.json | 8 +- 2021/CVE-2021-4034.json | 20 +- 2021/CVE-2021-40444.json | 4 +- 2021/CVE-2021-41773.json | 12 +- 2021/CVE-2021-43798.json | 28 -- 2021/CVE-2021-44228.json | 571 +++++++++++++++++++++------------------ 2022/CVE-2022-0543.json | 8 +- 2022/CVE-2022-1388.json | 16 +- 2022/CVE-2022-20124.json | 30 ++ 2022/CVE-2022-20135.json | 30 ++ 2022/CVE-2022-21882.json | 4 +- 2022/CVE-2022-22947.json | 12 +- 2022/CVE-2022-22965.json | 8 +- 2022/CVE-2022-22980.json | 4 +- 2022/CVE-2022-23222.json | 8 +- 2022/CVE-2022-24342.json | 12 +- 2022/CVE-2022-26134.json | 72 +++-- 2022/CVE-2022-27254.json | 8 +- 2022/CVE-2022-29464.json | 36 ++- 2022/CVE-2022-29885.json | 16 +- 2022/CVE-2022-30190.json | 28 +- 2022/CVE-2022-30333.json | 8 +- README.md | 45 +-- 48 files changed, 662 insertions(+), 546 deletions(-) delete mode 100644 2021/CVE-2021-30632.json create mode 100644 2022/CVE-2022-20124.json create mode 100644 2022/CVE-2022-20135.json diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index 9b9241b99e..a70de58660 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -17,13 +17,13 @@ "pushed_at": "2020-08-16T18:54:38Z", "stargazers_count": 36, "watchers_count": 36, - "forks_count": 22, + "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 22, + "forks": 23, "watchers": 36, "score": 0 }, diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index f39cb5cceb..d590724352 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -444,10 +444,10 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-06-28T08:15:09Z", + "updated_at": "2022-07-05T07:36:05Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 347, - "watchers_count": 347, + "stargazers_count": 348, + "watchers_count": 348, "forks_count": 114, "allow_forking": true, "is_template": false, @@ -455,7 +455,7 @@ "topics": [], "visibility": "public", "forks": 114, - "watchers": 347, + "watchers": 348, "score": 0 }, { diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 394436a90d..aba13ad511 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -41,10 +41,10 @@ "description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)", "fork": false, "created_at": "2018-10-17T14:14:12Z", - "updated_at": "2022-06-22T10:52:07Z", + "updated_at": "2022-07-05T08:51:31Z", "pushed_at": "2022-03-29T21:56:08Z", - "stargazers_count": 481, - "watchers_count": 481, + "stargazers_count": 482, + "watchers_count": 482, "forks_count": 121, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 121, - "watchers": 481, + "watchers": 482, "score": 0 }, { diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index 5e75c52db5..99f75f6f99 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -209,10 +209,10 @@ "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", - "updated_at": "2022-06-16T11:16:04Z", + "updated_at": "2022-07-05T08:40:48Z", "pushed_at": "2020-01-15T17:01:50Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 125, + "watchers_count": 125, "forks_count": 58, "allow_forking": true, "is_template": false, @@ -229,7 +229,7 @@ ], "visibility": "public", "forks": 58, - "watchers": 126, + "watchers": 125, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index a5b109097c..8ba750f1f7 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -41,7 +41,7 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-07-05T03:54:35Z", + "updated_at": "2022-07-05T09:33:34Z", "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 3406, "watchers_count": 3406, diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 96c1f75d2a..3b24d30e6f 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,10 +13,10 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-06-28T08:15:09Z", + "updated_at": "2022-07-05T07:36:05Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 347, - "watchers_count": 347, + "stargazers_count": 348, + "watchers_count": 348, "forks_count": 114, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 114, - "watchers": 347, + "watchers": 348, "score": 0 }, { @@ -181,10 +181,10 @@ "description": "CVE-2019-2725 命令回显", "fork": false, "created_at": "2019-05-29T01:57:05Z", - "updated_at": "2022-06-13T07:35:45Z", + "updated_at": "2022-07-05T10:27:21Z", "pushed_at": "2019-08-08T09:48:20Z", - "stargazers_count": 420, - "watchers_count": 420, + "stargazers_count": 421, + "watchers_count": 421, "forks_count": 162, "allow_forking": true, "is_template": false, @@ -192,7 +192,7 @@ "topics": [], "visibility": "public", "forks": 162, - "watchers": 420, + "watchers": 421, "score": 0 }, { diff --git a/2019/CVE-2019-5489.json b/2019/CVE-2019-5489.json index cb3d5e97c5..1b889d7521 100644 --- a/2019/CVE-2019-5489.json +++ b/2019/CVE-2019-5489.json @@ -13,10 +13,10 @@ "description": "Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux", "fork": false, "created_at": "2019-12-06T05:37:08Z", - "updated_at": "2022-03-01T08:57:54Z", + "updated_at": "2022-07-05T07:20:44Z", "pushed_at": "2021-10-02T00:15:11Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 8, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json index dd2082a0eb..b6dcff0a1b 100644 --- a/2019/CVE-2019-7238.json +++ b/2019/CVE-2019-7238.json @@ -17,13 +17,13 @@ "pushed_at": "2019-02-25T07:37:07Z", "stargazers_count": 148, "watchers_count": 148, - "forks_count": 57, + "forks_count": 56, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 57, + "forks": 56, "watchers": 148, "score": 0 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index bccfd54198..855f81ee83 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1054,10 +1054,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2022-07-03T15:31:26Z", + "updated_at": "2022-07-05T09:34:29Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1200, - "watchers_count": 1200, + "stargazers_count": 1202, + "watchers_count": 1202, "forks_count": 372, "allow_forking": true, "is_template": false, @@ -1071,7 +1071,7 @@ ], "visibility": "public", "forks": 372, - "watchers": 1200, + "watchers": 1202, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 4731e4d35c..0fdd0192b5 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -1634,7 +1634,7 @@ "fork": false, "created_at": "2022-06-23T07:18:17Z", "updated_at": "2022-07-04T13:52:48Z", - "pushed_at": "2022-07-04T06:45:59Z", + "pushed_at": "2022-07-05T09:50:45Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 5e19da49ed..7a358aa856 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,7 +13,7 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-07-05T03:54:35Z", + "updated_at": "2022-07-05T09:33:34Z", "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 3406, "watchers_count": 3406, diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 8df030b3be..8dd5683c42 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -125,10 +125,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2022-06-29T09:39:00Z", + "updated_at": "2022-07-05T09:34:37Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 973, - "watchers_count": 973, + "stargazers_count": 974, + "watchers_count": 974, "forks_count": 306, "allow_forking": true, "is_template": false, @@ -140,7 +140,7 @@ ], "visibility": "public", "forks": 306, - "watchers": 973, + "watchers": 974, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-16938.json b/2020/CVE-2020-16938.json index c8c4f86a63..dd5b7f97b1 100644 --- a/2020/CVE-2020-16938.json +++ b/2020/CVE-2020-16938.json @@ -13,10 +13,10 @@ "description": "Bypassing NTFS permissions to read any files as unprivileged user.", "fork": false, "created_at": "2020-10-21T15:38:22Z", - "updated_at": "2022-06-09T16:31:29Z", + "updated_at": "2022-07-05T07:20:25Z", "pushed_at": "2020-10-21T15:39:00Z", - "stargazers_count": 178, - "watchers_count": 178, + "stargazers_count": 179, + "watchers_count": 179, "forks_count": 39, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 178, + "watchers": 179, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-3956.json b/2020/CVE-2020-3956.json index 5ca8dde6ad..1fcc3074a9 100644 --- a/2020/CVE-2020-3956.json +++ b/2020/CVE-2020-3956.json @@ -13,10 +13,10 @@ "description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)", "fork": false, "created_at": "2020-06-01T18:26:32Z", - "updated_at": "2022-06-20T12:51:13Z", + "updated_at": "2022-07-05T07:20:48Z", "pushed_at": "2020-06-02T08:30:22Z", - "stargazers_count": 84, - "watchers_count": 84, + "stargazers_count": 83, + "watchers_count": 83, "forks_count": 31, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 84, + "watchers": 83, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-5421.json b/2020/CVE-2020-5421.json index 795de4024b..2edf328439 100644 --- a/2020/CVE-2020-5421.json +++ b/2020/CVE-2020-5421.json @@ -13,10 +13,10 @@ "description": "Spring 安全漏洞 CVE-2020-5421复现 ", "fork": false, "created_at": "2021-01-10T12:26:00Z", - "updated_at": "2021-06-28T01:37:18Z", + "updated_at": "2022-07-05T09:12:58Z", "pushed_at": "2021-01-10T12:48:19Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 29a9b3f131..f0b18c80eb 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -41,10 +41,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2022-07-04T16:10:53Z", + "updated_at": "2022-07-05T11:34:58Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1574, - "watchers_count": 1574, + "stargazers_count": 1575, + "watchers_count": 1575, "forks_count": 567, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 567, - "watchers": 1574, + "watchers": 1575, "score": 0 }, { diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index 333e4777a1..c33232d9df 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -196,10 +196,10 @@ "description": "Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.", "fork": false, "created_at": "2022-06-25T11:13:45Z", - "updated_at": "2022-07-01T19:02:02Z", + "updated_at": "2022-07-05T09:47:54Z", "pushed_at": "2022-07-01T19:02:25Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 16, "allow_forking": true, "is_template": false, @@ -215,7 +215,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 52, + "watchers": 53, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 5c0048562b..10d8be663b 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -132,10 +132,10 @@ "description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)", "fork": false, "created_at": "2021-06-03T09:59:21Z", - "updated_at": "2022-07-04T07:50:44Z", + "updated_at": "2022-07-05T07:21:08Z", "pushed_at": "2021-06-09T10:13:56Z", - "stargazers_count": 342, - "watchers_count": 342, + "stargazers_count": 341, + "watchers_count": 341, "forks_count": 74, "allow_forking": true, "is_template": false, @@ -143,7 +143,7 @@ "topics": [], "visibility": "public", "forks": 74, - "watchers": 342, + "watchers": 341, "score": 0 }, { @@ -160,10 +160,10 @@ "description": "cve-2021-21985 exploit", "fork": false, "created_at": "2021-06-03T12:17:06Z", - "updated_at": "2022-06-28T14:16:29Z", + "updated_at": "2022-07-05T07:21:08Z", "pushed_at": "2022-01-10T07:01:58Z", - "stargazers_count": 101, - "watchers_count": 101, + "stargazers_count": 100, + "watchers_count": 100, "forks_count": 34, "allow_forking": true, "is_template": false, @@ -171,7 +171,7 @@ "topics": [], "visibility": "public", "forks": 34, - "watchers": 101, + "watchers": 100, "score": 0 }, { diff --git a/2021/CVE-2021-22214.json b/2021/CVE-2021-22214.json index 581fcb96b8..a5cffcda2c 100644 --- a/2021/CVE-2021-22214.json +++ b/2021/CVE-2021-22214.json @@ -13,10 +13,10 @@ "description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)", "fork": false, "created_at": "2021-06-22T03:04:50Z", - "updated_at": "2022-06-17T03:05:38Z", + "updated_at": "2022-07-05T07:21:08Z", "pushed_at": "2021-06-22T04:35:08Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 62, + "watchers_count": 62, "forks_count": 15, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 63, + "watchers": 62, "score": 0 }, { diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 1331809758..4c73c95c7f 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -214,10 +214,10 @@ "description": "F5 BIG-IP远程代码执行;cve-2021-22986,批量检测;命令执行利用", "fork": false, "created_at": "2021-03-26T03:32:06Z", - "updated_at": "2021-12-15T14:41:44Z", + "updated_at": "2022-07-05T07:21:07Z", "pushed_at": "2021-03-26T05:09:54Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -225,7 +225,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 11, + "watchers": 10, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 99e9e3ef72..0569bf84b6 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -125,10 +125,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2022-06-29T09:39:00Z", + "updated_at": "2022-07-05T09:34:37Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 973, - "watchers_count": 973, + "stargazers_count": 974, + "watchers_count": 974, "forks_count": 306, "allow_forking": true, "is_template": false, @@ -140,7 +140,7 @@ ], "visibility": "public", "forks": 306, - "watchers": 973, + "watchers": 974, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index a4c4acc54e..da2e2569d0 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -166,10 +166,10 @@ "description": "PoC for CVE-2021-26855 -Just a checker-", "fork": false, "created_at": "2021-03-06T23:12:22Z", - "updated_at": "2022-05-03T06:37:51Z", + "updated_at": "2022-07-05T07:21:07Z", "pushed_at": "2021-03-09T22:07:46Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -177,7 +177,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 19, + "watchers": 17, "score": 0 }, { @@ -281,10 +281,10 @@ "description": "CVE-2021-26855 exp", "fork": false, "created_at": "2021-03-08T08:39:05Z", - "updated_at": "2022-06-09T03:00:43Z", + "updated_at": "2022-07-05T07:21:07Z", "pushed_at": "2021-03-08T08:09:01Z", - "stargazers_count": 112, - "watchers_count": 112, + "stargazers_count": 110, + "watchers_count": 110, "forks_count": 75, "allow_forking": true, "is_template": false, @@ -292,7 +292,7 @@ "topics": [], "visibility": "public", "forks": 75, - "watchers": 112, + "watchers": 110, "score": 0 }, { diff --git a/2021/CVE-2021-27651.json b/2021/CVE-2021-27651.json index 183774a71f..5e6f96f29e 100644 --- a/2021/CVE-2021-27651.json +++ b/2021/CVE-2021-27651.json @@ -13,10 +13,10 @@ "description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2", "fork": false, "created_at": "2021-05-16T01:40:47Z", - "updated_at": "2022-06-30T07:46:24Z", + "updated_at": "2022-07-05T12:00:48Z", "pushed_at": "2021-05-16T05:54:07Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "forks_count": 14, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 59, + "watchers": 60, "score": 0 }, { diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json deleted file mode 100644 index 69711de4fc..0000000000 --- a/2021/CVE-2021-30632.json +++ /dev/null @@ -1,30 +0,0 @@ -[ - { - "id": 411162655, - "name": "CVE-2021-30632", - "full_name": "CrackerCat\/CVE-2021-30632", - "owner": { - "login": "CrackerCat", - "id": 17995064, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4", - "html_url": "https:\/\/github.com\/CrackerCat" - }, - "html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-30632", - "description": null, - "fork": false, - "created_at": "2021-09-28T06:27:49Z", - "updated_at": "2022-02-16T03:32:22Z", - "pushed_at": "2021-12-13T06:02:21Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 25, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 25, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 8598b44c7e..1acc7e93dc 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,10 +13,10 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2022-07-03T06:04:11Z", + "updated_at": "2022-07-05T07:21:08Z", "pushed_at": "2021-06-12T08:27:09Z", - "stargazers_count": 813, - "watchers_count": 813, + "stargazers_count": 812, + "watchers_count": 812, "forks_count": 137, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 137, - "watchers": 813, + "watchers": 812, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 2d627fe63d..05481d647a 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -125,10 +125,10 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-27T10:16:35Z", - "updated_at": "2022-06-23T16:11:34Z", + "updated_at": "2022-07-05T07:21:06Z", "pushed_at": "2021-03-07T04:39:58Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 22, "allow_forking": true, "is_template": false, @@ -140,7 +140,7 @@ ], "visibility": "public", "forks": 22, - "watchers": 54, + "watchers": 53, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 05f534738f..bcbed20988 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -75,10 +75,10 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-07-05T02:53:15Z", + "updated_at": "2022-07-05T11:39:34Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1596, - "watchers_count": 1596, + "stargazers_count": 1597, + "watchers_count": 1597, "forks_count": 462, "allow_forking": true, "is_template": false, @@ -86,7 +86,7 @@ "topics": [], "visibility": "public", "forks": 462, - "watchers": 1596, + "watchers": 1597, "score": 0 }, { @@ -159,11 +159,11 @@ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)", "fork": false, "created_at": "2022-01-26T00:56:36Z", - "updated_at": "2022-07-03T21:31:34Z", + "updated_at": "2022-07-05T09:34:55Z", "pushed_at": "2022-02-12T05:22:58Z", - "stargazers_count": 875, - "watchers_count": 875, - "forks_count": 285, + "stargazers_count": 876, + "watchers_count": 876, + "forks_count": 286, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -173,8 +173,8 @@ "poc" ], "visibility": "public", - "forks": 285, - "watchers": 875, + "forks": 286, + "watchers": 876, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index b6184cab3c..18ef06171e 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -45,7 +45,7 @@ "pushed_at": "2022-06-22T20:21:42Z", "stargazers_count": 683, "watchers_count": 683, - "forks_count": 157, + "forks_count": 158, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -58,7 +58,7 @@ "remote-code-execution" ], "visibility": "public", - "forks": 157, + "forks": 158, "watchers": 683, "score": 0 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 0c1f4f10c8..b0a45cb5d0 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -13,18 +13,18 @@ "description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T16:13:38Z", - "updated_at": "2022-06-10T09:08:10Z", + "updated_at": "2022-07-05T07:53:35Z", "pushed_at": "2022-03-10T14:02:09Z", - "stargazers_count": 39, - "watchers_count": 39, - "forks_count": 11, + "stargazers_count": 40, + "watchers_count": 40, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, - "watchers": 39, + "forks": 12, + "watchers": 40, "score": 0 }, { diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 69520ee71e..4b51feecc8 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -227,34 +227,6 @@ "watchers": 1, "score": 0 }, - { - "id": 437761790, - "name": "Grafana-CVE-2021-43798", - "full_name": "Awrrays\/Grafana-CVE-2021-43798", - "owner": { - "login": "Awrrays", - "id": 55682880, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55682880?v=4", - "html_url": "https:\/\/github.com\/Awrrays" - }, - "html_url": "https:\/\/github.com\/Awrrays\/Grafana-CVE-2021-43798", - "description": "Grafana任意文件读取", - "fork": false, - "created_at": "2021-12-13T06:32:39Z", - "updated_at": "2022-04-05T16:48:25Z", - "pushed_at": "2021-12-13T06:36:22Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0 - }, { "id": 438335194, "name": "CVE-2021-43798", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 1bfe0086b0..deccb9fea3 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -525,10 +525,10 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2022-07-04T19:03:11Z", + "updated_at": "2022-07-05T09:35:02Z", "pushed_at": "2022-01-15T16:18:44Z", - "stargazers_count": 814, - "watchers_count": 814, + "stargazers_count": 815, + "watchers_count": 815, "forks_count": 131, "allow_forking": true, "is_template": false, @@ -556,7 +556,7 @@ ], "visibility": "public", "forks": 131, - "watchers": 814, + "watchers": 815, "score": 0 }, { @@ -689,34 +689,6 @@ "watchers": 42, "score": 0 }, - { - "id": 437170557, - "name": "sample-ldap-exploit", - "full_name": "phoswald\/sample-ldap-exploit", - "owner": { - "login": "phoswald", - "id": 12776329, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4", - "html_url": "https:\/\/github.com\/phoswald" - }, - "html_url": "https:\/\/github.com\/phoswald\/sample-ldap-exploit", - "description": "A short demo of CVE-2021-44228", - "fork": false, - "created_at": "2021-12-11T02:45:39Z", - "updated_at": "2022-05-22T14:45:42Z", - "pushed_at": "2021-12-13T09:20:35Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0 - }, { "id": 437174339, "name": "jndi-ldap-test-server", @@ -765,10 +737,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-07-04T09:27:12Z", + "updated_at": "2022-07-05T07:43:08Z", "pushed_at": "2022-06-02T02:16:13Z", - "stargazers_count": 399, - "watchers_count": 399, + "stargazers_count": 400, + "watchers_count": 400, "forks_count": 86, "allow_forking": true, "is_template": false, @@ -781,7 +753,35 @@ ], "visibility": "public", "forks": 86, - "watchers": 399, + "watchers": 400, + "score": 0 + }, + { + "id": 437248883, + "name": "log4shell-mitigation-tester", + "full_name": "lhotari\/log4shell-mitigation-tester", + "owner": { + "login": "lhotari", + "id": 66864, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4", + "html_url": "https:\/\/github.com\/lhotari" + }, + "html_url": "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester", + "description": "Log4Shell CVE-2021-44228 mitigation tester", + "fork": false, + "created_at": "2021-12-11T10:16:58Z", + "updated_at": "2021-12-21T20:05:48Z", + "pushed_at": "2021-12-13T17:24:37Z", + "stargazers_count": 16, + "watchers_count": 16, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 16, "score": 0 }, { @@ -853,34 +853,6 @@ "watchers": 2, "score": 0 }, - { - "id": 437265792, - "name": "log4j2021_vul_test", - "full_name": "gauthamg\/log4j2021_vul_test", - "owner": { - "login": "gauthamg", - "id": 8748677, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4", - "html_url": "https:\/\/github.com\/gauthamg" - }, - "html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test", - "description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228", - "fork": false, - "created_at": "2021-12-11T11:41:04Z", - "updated_at": "2021-12-13T06:49:35Z", - "pushed_at": "2021-12-13T06:49:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 437273514, "name": "CVE-2021-44228-playground", @@ -965,34 +937,6 @@ "watchers": 11, "score": 0 }, - { - "id": 437316134, - "name": "log4j2-vulnerable-spring-app", - "full_name": "zzzz0317\/log4j2-vulnerable-spring-app", - "owner": { - "login": "zzzz0317", - "id": 16097046, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4", - "html_url": "https:\/\/github.com\/zzzz0317" - }, - "html_url": "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app", - "description": "CVE-2021-44228", - "fork": false, - "created_at": "2021-12-11T15:18:42Z", - "updated_at": "2022-03-23T06:42:48Z", - "pushed_at": "2021-12-13T02:14:14Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0 - }, { "id": 437319619, "name": "test-44228", @@ -1307,34 +1251,6 @@ "watchers": 14, "score": 0 }, - { - "id": 437518939, - "name": "CVE-2021-44228-docker-example", - "full_name": "DiCanio\/CVE-2021-44228-docker-example", - "owner": { - "login": "DiCanio", - "id": 6052859, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4", - "html_url": "https:\/\/github.com\/DiCanio" - }, - "html_url": "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example", - "description": null, - "fork": false, - "created_at": "2021-12-12T10:53:15Z", - "updated_at": "2021-12-13T03:58:51Z", - "pushed_at": "2021-12-13T00:03:51Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 437526168, "name": "Log4JShell-Bytecode-Detector", @@ -1550,34 +1466,6 @@ "watchers": 0, "score": 0 }, - { - "id": 437574258, - "name": "log4j-poc", - "full_name": "fireflyingup\/log4j-poc", - "owner": { - "login": "fireflyingup", - "id": 48504204, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4", - "html_url": "https:\/\/github.com\/fireflyingup" - }, - "html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc", - "description": "CVE-2021-44228 test demo", - "fork": false, - "created_at": "2021-12-12T14:54:25Z", - "updated_at": "2021-12-13T05:10:53Z", - "pushed_at": "2021-12-13T05:10:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 437582859, "name": "log4j-jndi-be-gone", @@ -1792,43 +1680,6 @@ "watchers": 0, "score": 0 }, - { - "id": 437660117, - "name": "Log4j-RCE", - "full_name": "momos1337\/Log4j-RCE", - "owner": { - "login": "momos1337", - "id": 64172550, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4", - "html_url": "https:\/\/github.com\/momos1337" - }, - "html_url": "https:\/\/github.com\/momos1337\/Log4j-RCE", - "description": "Log4j RCE - (CVE-2021-44228)", - "fork": false, - "created_at": "2021-12-12T21:26:44Z", - "updated_at": "2021-12-23T14:39:40Z", - "pushed_at": "2021-12-13T00:54:22Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bughunter", - "cve-2021-44228", - "exploit", - "hacking", - "log4j", - "log4j-rce", - "rce", - "remote-code-execution" - ], - "visibility": "public", - "forks": 4, - "watchers": 7, - "score": 0 - }, { "id": 437660360, "name": "cve-2021-44228-log4j-mitigation", @@ -1919,6 +1770,41 @@ "watchers": 330, "score": 0 }, + { + "id": 437681598, + "name": "CVE-2021-44228-PoC", + "full_name": "sunnyvale-it\/CVE-2021-44228-PoC", + "owner": { + "login": "sunnyvale-it", + "id": 44291039, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4", + "html_url": "https:\/\/github.com\/sunnyvale-it" + }, + "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC", + "description": "CVE-2021-44228 (Log4Shell) Proof of Concept", + "fork": false, + "created_at": "2021-12-12T23:37:39Z", + "updated_at": "2022-03-18T18:44:50Z", + "pushed_at": "2021-12-13T21:23:25Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve", + "cybersecurity", + "java", + "log4j", + "log4j2", + "security" + ], + "visibility": "public", + "forks": 0, + "watchers": 5, + "score": 0 + }, { "id": 437685288, "name": "log4j2-CVE-2021-44228", @@ -2031,34 +1917,6 @@ "watchers": 2, "score": 0 }, - { - "id": 437704633, - "name": "Log4j-check", - "full_name": "bigsizeme\/Log4j-check", - "owner": { - "login": "bigsizeme", - "id": 17845094, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4", - "html_url": "https:\/\/github.com\/bigsizeme" - }, - "html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check", - "description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload", - "fork": false, - "created_at": "2021-12-13T01:55:51Z", - "updated_at": "2022-06-29T07:51:19Z", - "pushed_at": "2021-12-13T09:18:19Z", - "stargazers_count": 44, - "watchers_count": 44, - "forks_count": 19, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 19, - "watchers": 44, - "score": 0 - }, { "id": 437709337, "name": "exploit-CVE-2021-44228", @@ -2343,41 +2201,6 @@ "watchers": 1, "score": 0 }, - { - "id": 437784907, - "name": "aws-log4j-mitigations", - "full_name": "markuman\/aws-log4j-mitigations", - "owner": { - "login": "markuman", - "id": 3920157, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4", - "html_url": "https:\/\/github.com\/markuman" - }, - "html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations", - "description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible", - "fork": false, - "created_at": "2021-12-13T08:01:55Z", - "updated_at": "2021-12-13T08:05:42Z", - "pushed_at": "2021-12-13T08:03:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "ansible", - "aws", - "cve-2021-44228", - "log4j", - "mitigation", - "waf" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 437788180, "name": "Log4shell", @@ -2854,6 +2677,34 @@ "watchers": 4, "score": 0 }, + { + "id": 437902732, + "name": "JndiLookup", + "full_name": "madCdan\/JndiLookup", + "owner": { + "login": "madCdan", + "id": 10784600, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4", + "html_url": "https:\/\/github.com\/madCdan" + }, + "html_url": "https:\/\/github.com\/madCdan\/JndiLookup", + "description": "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228", + "fork": false, + "created_at": "2021-12-13T14:22:34Z", + "updated_at": "2021-12-18T02:12:49Z", + "pushed_at": "2021-12-13T17:07:42Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0 + }, { "id": 437904012, "name": "MC-Log4j-Patcher", @@ -3064,6 +2915,34 @@ "watchers": 11, "score": 0 }, + { + "id": 437960695, + "name": "CVE-2021-44228", + "full_name": "taurusxin\/CVE-2021-44228", + "owner": { + "login": "taurusxin", + "id": 17809960, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4", + "html_url": "https:\/\/github.com\/taurusxin" + }, + "html_url": "https:\/\/github.com\/taurusxin\/CVE-2021-44228", + "description": null, + "fork": false, + "created_at": "2021-12-13T17:17:37Z", + "updated_at": "2021-12-13T17:22:22Z", + "pushed_at": "2021-12-13T17:22:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 437965181, "name": "log4j2-prosecutor", @@ -3094,6 +2973,34 @@ "watchers": 0, "score": 0 }, + { + "id": 437968616, + "name": "CVE-2021-44228_Log4Shell", + "full_name": "yanghaoi\/CVE-2021-44228_Log4Shell", + "owner": { + "login": "yanghaoi", + "id": 21354684, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4", + "html_url": "https:\/\/github.com\/yanghaoi" + }, + "html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell", + "description": "Log4Shell A test for CVE-2021-44228", + "fork": false, + "created_at": "2021-12-13T17:44:01Z", + "updated_at": "2021-12-13T18:03:51Z", + "pushed_at": "2021-12-13T18:06:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 437983994, "name": "log4j_checker", @@ -3131,6 +3038,90 @@ "watchers": 8, "score": 0 }, + { + "id": 437988861, + "name": "Log4j-IOCs", + "full_name": "threatmonit\/Log4j-IOCs", + "owner": { + "login": "threatmonit", + "id": 90388073, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4", + "html_url": "https:\/\/github.com\/threatmonit" + }, + "html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs", + "description": "Public IOCs about log4j CVE-2021-44228", + "fork": false, + "created_at": "2021-12-13T18:52:19Z", + "updated_at": "2022-01-18T23:50:50Z", + "pushed_at": "2021-12-13T19:11:30Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 + }, + { + "id": 437995131, + "name": "l4j-info", + "full_name": "ben-smash\/l4j-info", + "owner": { + "login": "ben-smash", + "id": 95368649, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4", + "html_url": "https:\/\/github.com\/ben-smash" + }, + "html_url": "https:\/\/github.com\/ben-smash\/l4j-info", + "description": "Compiling links of value i find regarding CVE-2021-44228", + "fork": false, + "created_at": "2021-12-13T19:14:23Z", + "updated_at": "2021-12-13T21:11:09Z", + "pushed_at": "2021-12-13T21:11:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 438003225, + "name": "log4j-test", + "full_name": "strawhatasif\/log4j-test", + "owner": { + "login": "strawhatasif", + "id": 10750101, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4", + "html_url": "https:\/\/github.com\/strawhatasif" + }, + "html_url": "https:\/\/github.com\/strawhatasif\/log4j-test", + "description": "Demonstration of CVE-2021-44228 with a possible strategic fix.", + "fork": false, + "created_at": "2021-12-13T19:43:01Z", + "updated_at": "2021-12-13T20:26:40Z", + "pushed_at": "2021-12-13T20:26:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 438012376, "name": "nmap-log4shell", @@ -3166,6 +3157,34 @@ "watchers": 45, "score": 0 }, + { + "id": 438013062, + "name": "Siem-queries-for-CVE-2021-44228", + "full_name": "tica506\/Siem-queries-for-CVE-2021-44228", + "owner": { + "login": "tica506", + "id": 93236626, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4", + "html_url": "https:\/\/github.com\/tica506" + }, + "html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228", + "description": null, + "fork": false, + "created_at": "2021-12-13T20:19:57Z", + "updated_at": "2021-12-13T20:56:54Z", + "pushed_at": "2021-12-13T20:56:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 438021782, "name": "log4shell-example", @@ -3230,6 +3249,34 @@ "watchers": 4, "score": 0 }, + { + "id": 438028657, + "name": "log4j2-CVE-2021-44228-poc-local", + "full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local", + "owner": { + "login": "snatalius", + "id": 22771118, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4", + "html_url": "https:\/\/github.com\/snatalius" + }, + "html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local", + "description": "Just a personal proof of concept of CVE-2021-44228 on log4j2", + "fork": false, + "created_at": "2021-12-13T21:21:53Z", + "updated_at": "2021-12-13T21:21:56Z", + "pushed_at": "2021-12-13T21:21:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 438032780, "name": "CVE-2021-44228", @@ -3599,10 +3646,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2022-07-04T00:10:34Z", + "updated_at": "2022-07-05T09:27:59Z", "pushed_at": "2022-04-24T08:56:47Z", - "stargazers_count": 321, - "watchers_count": 321, + "stargazers_count": 322, + "watchers_count": 322, "forks_count": 45, "allow_forking": true, "is_template": false, @@ -3616,7 +3663,7 @@ ], "visibility": "public", "forks": 45, - "watchers": 321, + "watchers": 322, "score": 0 }, { @@ -3779,10 +3826,10 @@ "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)", "fork": false, "created_at": "2021-12-14T10:04:42Z", - "updated_at": "2022-06-29T19:36:55Z", + "updated_at": "2022-07-05T09:29:39Z", "pushed_at": "2022-01-27T16:08:20Z", - "stargazers_count": 425, - "watchers_count": 425, + "stargazers_count": 426, + "watchers_count": 426, "forks_count": 94, "allow_forking": true, "is_template": false, @@ -3799,7 +3846,7 @@ ], "visibility": "public", "forks": 94, - "watchers": 425, + "watchers": 426, "score": 0 }, { @@ -4040,18 +4087,18 @@ "description": "Tools for investigating Log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-14T19:08:14Z", - "updated_at": "2022-06-17T15:17:52Z", + "updated_at": "2022-07-05T08:10:28Z", "pushed_at": "2021-12-23T21:03:08Z", - "stargazers_count": 86, - "watchers_count": 86, - "forks_count": 11, + "stargazers_count": 87, + "watchers_count": 87, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, - "watchers": 86, + "forks": 12, + "watchers": 87, "score": 0 }, { diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json index ce1950b01e..602fc19e0c 100644 --- a/2022/CVE-2022-0543.json +++ b/2022/CVE-2022-0543.json @@ -13,10 +13,10 @@ "description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行", "fork": false, "created_at": "2022-03-16T06:41:50Z", - "updated_at": "2022-06-21T05:56:17Z", + "updated_at": "2022-07-05T10:35:04Z", "pushed_at": "2022-03-16T06:48:01Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 51, + "watchers_count": 51, "forks_count": 20, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 48, + "watchers": 51, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 83be73140a..4f3e6af881 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -209,10 +209,10 @@ "description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE", "fork": false, "created_at": "2022-05-09T10:22:31Z", - "updated_at": "2022-07-01T12:56:19Z", + "updated_at": "2022-07-05T07:31:32Z", "pushed_at": "2022-06-28T18:14:40Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "forks_count": 30, "allow_forking": true, "is_template": false, @@ -220,7 +220,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 71, + "watchers": 72, "score": 0 }, { @@ -520,10 +520,10 @@ "description": "PoC For F5 BIG-IP - bash script Exploit one Liner", "fork": false, "created_at": "2022-05-10T02:57:31Z", - "updated_at": "2022-06-25T15:12:05Z", + "updated_at": "2022-07-05T08:55:52Z", "pushed_at": "2022-05-10T08:38:58Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -531,7 +531,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 10, + "watchers": 9, "score": 0 }, { diff --git a/2022/CVE-2022-20124.json b/2022/CVE-2022-20124.json new file mode 100644 index 0000000000..7352143c6f --- /dev/null +++ b/2022/CVE-2022-20124.json @@ -0,0 +1,30 @@ +[ + { + "id": 510660359, + "name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "description": null, + "fork": false, + "created_at": "2022-07-05T08:59:44Z", + "updated_at": "2022-07-05T09:52:45Z", + "pushed_at": "2022-07-05T09:52:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20135.json b/2022/CVE-2022-20135.json new file mode 100644 index 0000000000..6d5dc74e71 --- /dev/null +++ b/2022/CVE-2022-20135.json @@ -0,0 +1,30 @@ +[ + { + "id": 510684846, + "name": "frameworks_base_AOSP10_r33_CVE-2022-20135-", + "full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-", + "description": null, + "fork": false, + "created_at": "2022-07-05T10:15:49Z", + "updated_at": "2022-07-05T10:42:21Z", + "pushed_at": "2022-07-05T10:41:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index f8c8260a91..8c15e0f000 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -73,13 +73,13 @@ "pushed_at": "2022-02-04T02:20:47Z", "stargazers_count": 167, "watchers_count": 167, - "forks_count": 44, + "forks_count": 45, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 44, + "forks": 45, "watchers": 167, "score": 0 }, diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 9c97010689..173d5571a8 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1258,18 +1258,18 @@ "description": "CVE-2022-22947 注入Godzilla内存马", "fork": false, "created_at": "2022-04-26T05:48:27Z", - "updated_at": "2022-07-05T05:52:29Z", + "updated_at": "2022-07-05T09:22:56Z", "pushed_at": "2022-04-26T05:55:58Z", - "stargazers_count": 81, - "watchers_count": 81, - "forks_count": 12, + "stargazers_count": 84, + "watchers_count": 84, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, - "watchers": 81, + "forks": 13, + "watchers": 84, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 85cf0cdee0..cf0a575013 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -1819,10 +1819,10 @@ "description": null, "fork": false, "created_at": "2022-07-05T02:30:29Z", - "updated_at": "2022-07-05T02:30:45Z", + "updated_at": "2022-07-05T09:20:53Z", "pushed_at": "2022-07-05T02:32:04Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -1830,7 +1830,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 3, "score": 0 }, { diff --git a/2022/CVE-2022-22980.json b/2022/CVE-2022-22980.json index d01074cb2d..874d9fba98 100644 --- a/2022/CVE-2022-22980.json +++ b/2022/CVE-2022-22980.json @@ -17,13 +17,13 @@ "pushed_at": "2022-06-23T09:53:01Z", "stargazers_count": 29, "watchers_count": 29, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 29, "score": 0 }, diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json index d9676007f2..59f5f2522f 100644 --- a/2022/CVE-2022-23222.json +++ b/2022/CVE-2022-23222.json @@ -13,10 +13,10 @@ "description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation", "fork": false, "created_at": "2022-06-07T03:20:23Z", - "updated_at": "2022-07-05T05:22:00Z", + "updated_at": "2022-07-05T06:59:58Z", "pushed_at": "2022-06-07T03:41:13Z", - "stargazers_count": 467, - "watchers_count": 467, + "stargazers_count": 468, + "watchers_count": 468, "forks_count": 77, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 77, - "watchers": 467, + "watchers": 468, "score": 0 }, { diff --git a/2022/CVE-2022-24342.json b/2022/CVE-2022-24342.json index ef259de6de..8707e10a1b 100644 --- a/2022/CVE-2022-24342.json +++ b/2022/CVE-2022-24342.json @@ -13,11 +13,11 @@ "description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication", "fork": false, "created_at": "2022-07-02T22:04:29Z", - "updated_at": "2022-07-05T00:37:02Z", + "updated_at": "2022-07-05T12:14:02Z", "pushed_at": "2022-07-03T08:53:04Z", - "stargazers_count": 24, - "watchers_count": 24, - "forks_count": 3, + "stargazers_count": 26, + "watchers_count": 26, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -31,8 +31,8 @@ "vulnerability" ], "visibility": "public", - "forks": 3, - "watchers": 24, + "forks": 4, + "watchers": 26, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index ff180047c8..54d2d74017 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,11 +13,11 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-07-05T06:06:07Z", + "updated_at": "2022-07-05T12:12:32Z", "pushed_at": "2022-07-05T01:29:14Z", - "stargazers_count": 182, - "watchers_count": 182, - "forks_count": 33, + "stargazers_count": 190, + "watchers_count": 190, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "nday" ], "visibility": "public", - "forks": 33, - "watchers": 182, + "forks": 35, + "watchers": 190, "score": 0 }, { @@ -137,10 +137,10 @@ "description": "CVE-2022-26134 Proof of Concept", "fork": false, "created_at": "2022-06-03T13:59:19Z", - "updated_at": "2022-07-05T00:54:45Z", + "updated_at": "2022-07-05T07:32:28Z", "pushed_at": "2022-06-06T16:38:49Z", - "stargazers_count": 125, - "watchers_count": 125, + "stargazers_count": 126, + "watchers_count": 126, "forks_count": 37, "allow_forking": true, "is_template": false, @@ -152,7 +152,7 @@ ], "visibility": "public", "forks": 37, - "watchers": 125, + "watchers": 126, "score": 0 }, { @@ -197,11 +197,11 @@ "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).", "fork": false, "created_at": "2022-06-03T21:07:30Z", - "updated_at": "2022-07-05T01:10:58Z", + "updated_at": "2022-07-05T07:10:35Z", "pushed_at": "2022-06-06T20:24:06Z", - "stargazers_count": 238, - "watchers_count": 238, - "forks_count": 61, + "stargazers_count": 240, + "watchers_count": 240, + "forks_count": 62, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -219,8 +219,8 @@ "vulnerability" ], "visibility": "public", - "forks": 61, - "watchers": 238, + "forks": 62, + "watchers": 240, "score": 0 }, { @@ -399,18 +399,18 @@ "description": null, "fork": false, "created_at": "2022-06-05T12:23:34Z", - "updated_at": "2022-07-04T08:47:54Z", + "updated_at": "2022-07-05T07:53:51Z", "pushed_at": "2022-06-06T07:47:06Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 2, + "forks": 1, + "watchers": 3, "score": 0 }, { @@ -1326,5 +1326,33 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 510624422, + "name": "CVE-2022-26134", + "full_name": "Debajyoti0-0\/CVE-2022-26134", + "owner": { + "login": "Debajyoti0-0", + "id": 79437050, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4", + "html_url": "https:\/\/github.com\/Debajyoti0-0" + }, + "html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134", + "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).", + "fork": false, + "created_at": "2022-07-05T07:04:50Z", + "updated_at": "2022-07-05T10:20:09Z", + "pushed_at": "2022-07-05T09:40:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27254.json b/2022/CVE-2022-27254.json index d2ee395f49..20cfec5394 100644 --- a/2022/CVE-2022-27254.json +++ b/2022/CVE-2022-27254.json @@ -13,10 +13,10 @@ "description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)", "fork": false, "created_at": "2022-03-23T15:03:09Z", - "updated_at": "2022-07-04T10:46:42Z", + "updated_at": "2022-07-05T10:21:21Z", "pushed_at": "2022-03-26T05:52:15Z", - "stargazers_count": 349, - "watchers_count": 349, + "stargazers_count": 350, + "watchers_count": 350, "forks_count": 48, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 349, + "watchers": 350, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 673b88b1c4..bbccb7ba9c 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2022-07-05T03:21:43Z", + "updated_at": "2022-07-05T10:33:11Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 288, - "watchers_count": 288, + "stargazers_count": 289, + "watchers_count": 289, "forks_count": 66, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 66, - "watchers": 288, + "watchers": 289, "score": 0 }, { @@ -507,5 +507,33 @@ "forks": 1, "watchers": 4, "score": 0 + }, + { + "id": 510649929, + "name": "WSO2RCE", + "full_name": "Pasch0\/WSO2RCE", + "owner": { + "login": "Pasch0", + "id": 78447612, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78447612?v=4", + "html_url": "https:\/\/github.com\/Pasch0" + }, + "html_url": "https:\/\/github.com\/Pasch0\/WSO2RCE", + "description": "CVE-2022-29464 Exploit", + "fork": false, + "created_at": "2022-07-05T08:27:04Z", + "updated_at": "2022-07-05T11:55:14Z", + "pushed_at": "2022-07-05T08:58:58Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 5, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29885.json b/2022/CVE-2022-29885.json index 2600740f72..787fe0916f 100644 --- a/2022/CVE-2022-29885.json +++ b/2022/CVE-2022-29885.json @@ -13,18 +13,18 @@ "description": "Apache Tomcat CVE-2022-29885", "fork": false, "created_at": "2022-04-30T02:30:00Z", - "updated_at": "2022-07-04T10:25:57Z", + "updated_at": "2022-07-05T07:06:43Z", "pushed_at": "2022-06-30T13:46:47Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 2, + "stargazers_count": 15, + "watchers_count": 15, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 14, + "forks": 3, + "watchers": 15, "score": 0 }, { @@ -41,8 +41,8 @@ "description": "Apache Tomcat DoS (CVE-2022-29885) Exploit", "fork": false, "created_at": "2022-07-01T09:02:10Z", - "updated_at": "2022-07-01T09:02:10Z", - "pushed_at": "2022-07-01T09:02:10Z", + "updated_at": "2022-07-05T06:23:21Z", + "pushed_at": "2022-07-05T06:23:18Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index bcd3093b78..f3906ae97d 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-05-30T18:17:38Z", - "updated_at": "2022-07-04T08:39:31Z", + "updated_at": "2022-07-05T10:20:07Z", "pushed_at": "2022-06-05T21:06:13Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 132, + "watchers_count": 132, "forks_count": 51, "allow_forking": true, "is_template": false, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 51, - "watchers": 131, + "watchers": 132, "score": 0 }, { @@ -772,10 +772,10 @@ "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。", "fork": false, "created_at": "2022-06-02T12:33:18Z", - "updated_at": "2022-07-05T02:05:39Z", + "updated_at": "2022-07-05T08:00:07Z", "pushed_at": "2022-06-06T07:19:53Z", - "stargazers_count": 302, - "watchers_count": 302, + "stargazers_count": 303, + "watchers_count": 303, "forks_count": 43, "allow_forking": true, "is_template": false, @@ -783,7 +783,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 302, + "watchers": 303, "score": 0 }, { @@ -1753,18 +1753,18 @@ "description": "Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files", "fork": false, "created_at": "2022-06-15T02:22:53Z", - "updated_at": "2022-06-23T20:26:56Z", + "updated_at": "2022-07-05T08:07:41Z", "pushed_at": "2022-06-15T02:24:00Z", - "stargazers_count": 26, - "watchers_count": 26, - "forks_count": 1, + "stargazers_count": 27, + "watchers_count": 27, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 26, + "forks": 2, + "watchers": 27, "score": 0 }, { diff --git a/2022/CVE-2022-30333.json b/2022/CVE-2022-30333.json index 608663a8d1..62473caaee 100644 --- a/2022/CVE-2022-30333.json +++ b/2022/CVE-2022-30333.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-07-05T02:35:12Z", - "updated_at": "2022-07-05T02:35:12Z", + "updated_at": "2022-07-05T09:10:18Z", "pushed_at": "2022-07-05T02:58:30Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 83d3abe5ed..5d31c20d32 100644 --- a/README.md +++ b/README.md @@ -474,6 +474,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther - [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007) +### CVE-2022-20124 (2022-06-15) + + +In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-170646036 + + +- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-) + ### CVE-2022-20130 (2022-06-15) @@ -482,6 +490,14 @@ In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bou - [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130) +### CVE-2022-20135 (2022-06-15) + + +In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465 + + +- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-) + ### CVE-2022-20142 (2022-06-15) @@ -1661,6 +1677,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU) - [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134) - [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134) +- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134) ### CVE-2022-26155 (2022-02-28) @@ -2149,6 +2166,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code - [trhacknon/CVE-2022-29464-mass](https://github.com/trhacknon/CVE-2022-29464-mass) - [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464) - [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464) +- [Pasch0/WSO2RCE](https://github.com/Pasch0/WSO2RCE) ### CVE-2022-29548 (2022-04-20) @@ -5009,14 +5027,6 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r - [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481) -### CVE-2021-30632 (2021-10-08) - - -Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. - - -- [CrackerCat/CVE-2021-30632](https://github.com/CrackerCat/CVE-2021-30632) - ### CVE-2021-30682 (2021-09-08) @@ -6250,7 +6260,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver - [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798) - [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp) - [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798) -- [Awrrays/Grafana-CVE-2021-43798](https://github.com/Awrrays/Grafana-CVE-2021-43798) - [Ryze-T/CVE-2021-43798](https://github.com/Ryze-T/CVE-2021-43798) - [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana) - [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798) @@ -6397,16 +6406,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot) - [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC) - [1lann/log4shelldetect](https://github.com/1lann/log4shelldetect) -- [phoswald/sample-ldap-exploit](https://github.com/phoswald/sample-ldap-exploit) - [rakutentech/jndi-ldap-test-server](https://github.com/rakutentech/jndi-ldap-test-server) - [f0ng/log4j2burpscanner](https://github.com/f0ng/log4j2burpscanner) +- [lhotari/log4shell-mitigation-tester](https://github.com/lhotari/log4shell-mitigation-tester) - [logpresso/CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner) - [vorburger/Log4j_CVE-2021-44228](https://github.com/vorburger/Log4j_CVE-2021-44228) -- [gauthamg/log4j2021_vul_test](https://github.com/gauthamg/log4j2021_vul_test) - [b-abderrahmane/CVE-2021-44228-playground](https://github.com/b-abderrahmane/CVE-2021-44228-playground) - [js-on/jndiRep](https://github.com/js-on/jndiRep) - [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs) -- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app) - [datadavev/test-44228](https://github.com/datadavev/test-44228) - [LemonCraftRu/JndiRemover](https://github.com/LemonCraftRu/JndiRemover) - [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect) @@ -6417,7 +6424,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [alexandre-lavoie/python-log4rce](https://github.com/alexandre-lavoie/python-log4rce) - [RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs) - [blake-fm/vcenter-log4j](https://github.com/blake-fm/vcenter-log4j) -- [DiCanio/CVE-2021-44228-docker-example](https://github.com/DiCanio/CVE-2021-44228-docker-example) - [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector) - [dtact/divd-2021-00038--log4j-scanner](https://github.com/dtact/divd-2021-00038--log4j-scanner) - [kali-dass/CVE-2021-44228-log4Shell](https://github.com/kali-dass/CVE-2021-44228-log4Shell) @@ -6425,7 +6431,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [infiniroot/nginx-mitigate-log4shell](https://github.com/infiniroot/nginx-mitigate-log4shell) - [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected) - [guardicode/CVE-2021-44228_IoCs](https://github.com/guardicode/CVE-2021-44228_IoCs) -- [fireflyingup/log4j-poc](https://github.com/fireflyingup/log4j-poc) - [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone) - [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch) - [tasooshi/horrors-log4shell](https://github.com/tasooshi/horrors-log4shell) @@ -6433,15 +6438,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [OlafHaalstra/log4jcheck](https://github.com/OlafHaalstra/log4jcheck) - [psychose-club/Saturn](https://github.com/psychose-club/Saturn) - [Panyaprach/Proof-CVE-2021-44228](https://github.com/Panyaprach/Proof-CVE-2021-44228) -- [momos1337/Log4j-RCE](https://github.com/momos1337/Log4j-RCE) - [palominoinc/cve-2021-44228-log4j-mitigation](https://github.com/palominoinc/cve-2021-44228-log4j-mitigation) - [cyberxml/log4j-poc](https://github.com/cyberxml/log4j-poc) - [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell) +- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC) - [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228) - [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j) - [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228) - [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi) -- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check) - [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228) - [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute) - [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228) @@ -6452,7 +6456,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources) - [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832) - [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228) -- [markuman/aws-log4j-mitigations](https://github.com/markuman/aws-log4j-mitigations) - [tuyenee/Log4shell](https://github.com/tuyenee/Log4shell) - [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228) - [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV) @@ -6470,6 +6473,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [VNYui/CVE-2021-44228](https://github.com/VNYui/CVE-2021-44228) - [flxhaas/Scan-CVE-2021-44228](https://github.com/flxhaas/Scan-CVE-2021-44228) - [justakazh/Log4j-CVE-2021-44228](https://github.com/justakazh/Log4j-CVE-2021-44228) +- [madCdan/JndiLookup](https://github.com/madCdan/JndiLookup) - [Koupah/MC-Log4j-Patcher](https://github.com/Koupah/MC-Log4j-Patcher) - [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228) - [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test) @@ -6477,11 +6481,18 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips) - [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod) - [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell) +- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228) - [rodfer20/log4j2-prosecutor](https://github.com/rodfer20/log4j2-prosecutor) +- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell) - [lfama/log4j_checker](https://github.com/lfama/log4j_checker) +- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs) +- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info) +- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test) - [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell) +- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228) - [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example) - [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker) +- [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local) - [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228) - [back2root/log4shell-rex](https://github.com/back2root/log4shell-rex) - [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)