diff --git a/2015/CVE-2015-1701.json b/2015/CVE-2015-1701.json index a69e354075..f982cb51b9 100644 --- a/2015/CVE-2015-1701.json +++ b/2015/CVE-2015-1701.json @@ -13,10 +13,10 @@ "description": "Win32k LPE vulnerability used in APT attack", "fork": false, "created_at": "2015-05-12T18:04:48Z", - "updated_at": "2022-11-12T18:38:46Z", + "updated_at": "2023-01-13T15:35:59Z", "pushed_at": "2017-12-18T14:11:29Z", - "stargazers_count": 284, - "watchers_count": 284, + "stargazers_count": 285, + "watchers_count": 285, "has_discussions": false, "forks_count": 189, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 189, - "watchers": 284, + "watchers": 285, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 03eb8210d0..f7bae834bb 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-01-11T15:09:40Z", + "updated_at": "2023-01-13T17:10:31Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1585, - "watchers_count": 1585, + "stargazers_count": 1584, + "watchers_count": 1584, "has_discussions": false, "forks_count": 316, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 316, - "watchers": 1585, + "watchers": 1584, "score": 0 }, { diff --git a/2017/CVE-2017-0806.json b/2017/CVE-2017-0806.json index b6e01f0a45..c051955049 100644 --- a/2017/CVE-2017-0806.json +++ b/2017/CVE-2017-0806.json @@ -13,10 +13,10 @@ "description": "CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel\/createFromParcel mismatch)", "fork": false, "created_at": "2018-06-03T09:04:50Z", - "updated_at": "2023-01-13T12:13:21Z", + "updated_at": "2023-01-13T12:35:54Z", "pushed_at": "2018-06-03T09:06:00Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 15, + "watchers": 16, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-15303.json b/2017/CVE-2017-15303.json index e13bb614a1..33dcebc306 100644 --- a/2017/CVE-2017-15303.json +++ b/2017/CVE-2017-15303.json @@ -13,10 +13,10 @@ "description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303", "fork": false, "created_at": "2018-02-22T05:31:13Z", - "updated_at": "2022-11-30T04:56:13Z", + "updated_at": "2023-01-13T15:36:01Z", "pushed_at": "2018-02-25T08:49:07Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 60, - "watchers": 103, + "watchers": 104, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 7533a3a6c9..77d86f850f 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-01-11T15:09:40Z", + "updated_at": "2023-01-13T17:10:31Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1585, - "watchers_count": 1585, + "stargazers_count": 1584, + "watchers_count": 1584, "has_discussions": false, "forks_count": 316, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 316, - "watchers": 1585, + "watchers": 1584, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 8e72fc8940..8b9951fec8 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -564,13 +564,13 @@ "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 19, "score": 0 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index f5491a1bd7..d660052210 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,10 +568,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-01-11T15:09:40Z", + "updated_at": "2023-01-13T17:10:31Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1585, - "watchers_count": 1585, + "stargazers_count": 1584, + "watchers_count": 1584, "has_discussions": false, "forks_count": 316, "allow_forking": true, @@ -601,7 +601,7 @@ ], "visibility": "public", "forks": 316, - "watchers": 1585, + "watchers": 1584, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 1e7f2c4bb6..9ee341fdcd 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1590,10 +1590,10 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2022-12-29T22:42:26Z", + "updated_at": "2023-01-13T17:10:28Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 874, - "watchers_count": 874, + "stargazers_count": 873, + "watchers_count": 873, "has_discussions": false, "forks_count": 288, "allow_forking": true, @@ -1602,7 +1602,7 @@ "topics": [], "visibility": "public", "forks": 288, - "watchers": 874, + "watchers": 873, "score": 0 }, { @@ -2848,10 +2848,10 @@ "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", - "updated_at": "2023-01-04T02:17:13Z", + "updated_at": "2023-01-13T17:10:30Z", "pushed_at": "2021-02-06T00:24:21Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 211, + "watchers_count": 211, "has_discussions": false, "forks_count": 77, "allow_forking": true, @@ -2860,7 +2860,7 @@ "topics": [], "visibility": "public", "forks": 77, - "watchers": 212, + "watchers": 211, "score": 0 }, { @@ -3211,43 +3211,6 @@ "watchers": 0, "score": 0 }, - { - "id": 351340241, - "name": "CVE-2019--0708-SCANNER", - "full_name": "ORCA666\/CVE-2019--0708-SCANNER", - "owner": { - "login": "ORCA666", - "id": 66519611, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66519611?v=4", - "html_url": "https:\/\/github.com\/ORCA666" - }, - "html_url": "https:\/\/github.com\/ORCA666\/CVE-2019--0708-SCANNER", - "description": "this is a local scanner for cve-2019-0708", - "fork": false, - "created_at": "2021-03-25T07:05:38Z", - "updated_at": "2022-06-30T13:50:49Z", - "pushed_at": "2021-03-25T07:12:21Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bluekeep", - "cve-2019-0708", - "exe", - "local-scanner", - "rdp", - "scanner", - "windows" - ], - "visibility": "public", - "forks": 4, - "watchers": 3, - "score": 0 - }, { "id": 378511068, "name": "CVE-2019-0708", diff --git a/2019/CVE-2019-11581.json b/2019/CVE-2019-11581.json index b2ed58a9ce..0c0ba3a561 100644 --- a/2019/CVE-2019-11581.json +++ b/2019/CVE-2019-11581.json @@ -13,10 +13,10 @@ "description": "Atlassian JIRA Template injection vulnerability RCE", "fork": false, "created_at": "2019-07-16T02:27:00Z", - "updated_at": "2023-01-08T01:50:50Z", + "updated_at": "2023-01-13T17:10:30Z", "pushed_at": "2019-07-22T06:47:52Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 89, + "watchers": 88, "score": 0 }, { diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json index 34c89e5f97..d79e476ab3 100644 --- a/2019/CVE-2019-1405.json +++ b/2019/CVE-2019-1405.json @@ -13,10 +13,10 @@ "description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322", "fork": false, "created_at": "2019-11-13T16:34:03Z", - "updated_at": "2023-01-13T07:56:24Z", + "updated_at": "2023-01-13T17:10:31Z", "pushed_at": "2019-11-14T14:16:54Z", - "stargazers_count": 314, - "watchers_count": 314, + "stargazers_count": 313, + "watchers_count": 313, "has_discussions": false, "forks_count": 76, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 76, - "watchers": 314, + "watchers": 313, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index ac575ca553..a96e6e573f 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -13,10 +13,10 @@ "description": "POC for cve-2019-1458", "fork": false, "created_at": "2020-03-03T17:55:07Z", - "updated_at": "2023-01-08T20:19:34Z", + "updated_at": "2023-01-13T16:39:44Z", "pushed_at": "2022-01-17T19:45:41Z", - "stargazers_count": 164, - "watchers_count": 164, + "stargazers_count": 165, + "watchers_count": 165, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 164, + "watchers": 165, "score": 0 }, { diff --git a/2019/CVE-2019-17026.json b/2019/CVE-2019-17026.json index 0da7498b96..8acfd8ae27 100644 --- a/2019/CVE-2019-17026.json +++ b/2019/CVE-2019-17026.json @@ -13,10 +13,10 @@ "description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).", "fork": false, "created_at": "2020-08-27T19:32:07Z", - "updated_at": "2022-11-26T00:41:45Z", + "updated_at": "2023-01-13T17:10:35Z", "pushed_at": "2020-08-27T19:33:42Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 47, + "watchers_count": 47, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 48, + "watchers": 47, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 87502a1658..cdf69178ce 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -42,10 +42,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-01-12T08:55:04Z", + "updated_at": "2023-01-13T17:10:33Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3656, - "watchers_count": 3656, + "stargazers_count": 3655, + "watchers_count": 3655, "has_discussions": false, "forks_count": 1052, "allow_forking": true, @@ -74,7 +74,7 @@ ], "visibility": "public", "forks": 1052, - "watchers": 3656, + "watchers": 3655, "score": 0 }, { diff --git a/2019/CVE-2019-18426.json b/2019/CVE-2019-18426.json index ac83e07278..b5cfa8f1ff 100644 --- a/2019/CVE-2019-18426.json +++ b/2019/CVE-2019-18426.json @@ -18,7 +18,7 @@ "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -26,7 +26,7 @@ "cve-2019-18426" ], "visibility": "public", - "forks": 10, + "forks": 11, "watchers": 8, "score": 0 } diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 03fddb2a1d..7841e40e82 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -100,10 +100,10 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2022-12-07T07:48:09Z", + "updated_at": "2023-01-13T17:10:29Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 847, - "watchers_count": 847, + "stargazers_count": 846, + "watchers_count": 846, "has_discussions": false, "forks_count": 173, "allow_forking": true, @@ -112,7 +112,7 @@ "topics": [], "visibility": "public", "forks": 173, - "watchers": 847, + "watchers": 846, "score": 0 }, { @@ -187,10 +187,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-01-11T15:09:40Z", + "updated_at": "2023-01-13T17:10:31Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1585, - "watchers_count": 1585, + "stargazers_count": 1584, + "watchers_count": 1584, "has_discussions": false, "forks_count": 316, "allow_forking": true, @@ -220,7 +220,7 @@ ], "visibility": "public", "forks": 316, - "watchers": 1585, + "watchers": 1584, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index 5d542b600d..956162818d 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -134,10 +134,10 @@ "description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞", "fork": false, "created_at": "2019-04-10T02:22:24Z", - "updated_at": "2023-01-05T08:42:24Z", + "updated_at": "2023-01-13T17:10:28Z", "pushed_at": "2019-11-01T14:33:21Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 143, + "watchers_count": 143, "has_discussions": false, "forks_count": 64, "allow_forking": true, @@ -146,7 +146,7 @@ "topics": [], "visibility": "public", "forks": 64, - "watchers": 144, + "watchers": 143, "score": 0 }, { diff --git a/2019/CVE-2019-5418.json b/2019/CVE-2019-5418.json index 1a8c539c23..fa1d262c37 100644 --- a/2019/CVE-2019-5418.json +++ b/2019/CVE-2019-5418.json @@ -253,10 +253,10 @@ "description": "Ruby on Rails是一个 Web 应用程序框架,是一个相对较新的 Web 应用程序框架,构建在 Ruby 语言之上。这个漏洞主要是由于Ruby on Rails使用了指定参数的render file来渲染应用之外的视图,我们可以通过修改访问某控制器的请求包,通过“…\/…\/…\/…\/”来达到路径穿越的目的,然后再通过“{{”来进行模板查询路径的闭合,使得所要访问的文件被当做外部模板来解析。", "fork": false, "created_at": "2022-10-17T09:04:43Z", - "updated_at": "2022-10-18T01:08:22Z", + "updated_at": "2023-01-13T12:24:23Z", "pushed_at": "2022-10-17T09:17:42Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -265,7 +265,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index 1483f46f54..af8c8d2cfb 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -42,10 +42,10 @@ "description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE", "fork": false, "created_at": "2020-01-23T22:29:46Z", - "updated_at": "2022-12-27T16:37:27Z", + "updated_at": "2023-01-13T17:10:32Z", "pushed_at": "2020-01-24T15:21:06Z", - "stargazers_count": 255, - "watchers_count": 255, + "stargazers_count": 254, + "watchers_count": 254, "has_discussions": false, "forks_count": 80, "allow_forking": true, @@ -57,7 +57,7 @@ ], "visibility": "public", "forks": 80, - "watchers": 255, + "watchers": 254, "score": 0 }, { diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 8d1b5f163f..f91cc53d7a 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,10 +13,10 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2022-12-22T12:51:29Z", + "updated_at": "2023-01-13T17:10:34Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 650, - "watchers_count": 650, + "stargazers_count": 649, + "watchers_count": 649, "has_discussions": false, "forks_count": 171, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 171, - "watchers": 650, + "watchers": 649, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index de84522263..f6c29f02d6 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -100,10 +100,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2022-12-27T16:37:24Z", + "updated_at": "2023-01-13T17:10:33Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 629, - "watchers_count": 629, + "stargazers_count": 628, + "watchers_count": 628, "has_discussions": false, "forks_count": 205, "allow_forking": true, @@ -114,7 +114,7 @@ ], "visibility": "public", "forks": 205, - "watchers": 629, + "watchers": 628, "score": 0 }, { @@ -1032,10 +1032,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2022-12-30T11:25:53Z", + "updated_at": "2023-01-13T17:10:33Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1228, - "watchers_count": 1228, + "stargazers_count": 1227, + "watchers_count": 1227, "has_discussions": false, "forks_count": 370, "allow_forking": true, @@ -1050,7 +1050,7 @@ ], "visibility": "public", "forks": 370, - "watchers": 1228, + "watchers": 1227, "score": 0 }, { @@ -1369,10 +1369,10 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2022-12-29T17:27:52Z", + "updated_at": "2023-01-13T17:10:33Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 481, - "watchers_count": 481, + "stargazers_count": 480, + "watchers_count": 480, "has_discussions": false, "forks_count": 156, "allow_forking": true, @@ -1387,7 +1387,7 @@ ], "visibility": "public", "forks": 156, - "watchers": 481, + "watchers": 480, "score": 0 }, { @@ -1636,10 +1636,10 @@ "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "fork": false, "created_at": "2020-06-10T16:44:39Z", - "updated_at": "2022-12-24T22:49:53Z", + "updated_at": "2023-01-13T17:10:34Z", "pushed_at": "2022-03-30T14:02:04Z", - "stargazers_count": 207, - "watchers_count": 207, + "stargazers_count": 206, + "watchers_count": 206, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -1648,7 +1648,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 207, + "watchers": 206, "score": 0 }, { @@ -1917,40 +1917,6 @@ "watchers": 2, "score": 0 }, - { - "id": 328551475, - "name": "CVE-2020-0796", - "full_name": "ORCA666\/CVE-2020-0796", - "owner": { - "login": "ORCA666", - "id": 66519611, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66519611?v=4", - "html_url": "https:\/\/github.com\/ORCA666" - }, - "html_url": "https:\/\/github.com\/ORCA666\/CVE-2020-0796", - "description": "local exploit", - "fork": false, - "created_at": "2021-01-11T04:48:26Z", - "updated_at": "2022-06-10T10:41:17Z", - "pushed_at": "2021-05-31T16:20:17Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2020-0796", - "exploit", - "local-exploits", - "poc" - ], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0 - }, { "id": 385839527, "name": "CVE-2020-0796-Scanner", diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 73988ebb53..09c6924b9e 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -42,10 +42,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2023-01-11T08:16:47Z", + "updated_at": "2023-01-13T17:10:36Z", "pushed_at": "2021-12-08T10:31:54Z", - "stargazers_count": 1543, - "watchers_count": 1543, + "stargazers_count": 1542, + "watchers_count": 1542, "has_discussions": false, "forks_count": 352, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 352, - "watchers": 1543, + "watchers": 1542, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index d6016888e1..fde81fb406 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-01-12T08:55:04Z", + "updated_at": "2023-01-13T17:10:33Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3656, - "watchers_count": 3656, + "stargazers_count": 3655, + "watchers_count": 3655, "has_discussions": false, "forks_count": 1052, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1052, - "watchers": 3656, + "watchers": 3655, "score": 0 }, { diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index 04b57e399c..333ef04cc9 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -13,10 +13,10 @@ "description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"", "fork": false, "created_at": "2021-06-29T04:38:24Z", - "updated_at": "2023-01-11T23:23:39Z", + "updated_at": "2023-01-13T17:10:40Z", "pushed_at": "2022-04-14T03:17:44Z", - "stargazers_count": 356, - "watchers_count": 356, + "stargazers_count": 355, + "watchers_count": 355, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 38, - "watchers": 356, + "watchers": 355, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 37d33c06f2..cdb3bfb5a8 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-01-11T15:09:40Z", + "updated_at": "2023-01-13T17:10:31Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1585, - "watchers_count": 1585, + "stargazers_count": 1584, + "watchers_count": 1584, "has_discussions": false, "forks_count": 316, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 316, - "watchers": 1585, + "watchers": 1584, "score": 0 }, { diff --git a/2021/CVE-2021-0928.json b/2021/CVE-2021-0928.json index f3ff66eb59..03b1cf7d21 100644 --- a/2021/CVE-2021-0928.json +++ b/2021/CVE-2021-0928.json @@ -13,10 +13,10 @@ "description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`", "fork": false, "created_at": "2022-01-29T10:14:32Z", - "updated_at": "2023-01-13T11:36:14Z", + "updated_at": "2023-01-13T17:45:08Z", "pushed_at": "2022-03-03T17:50:03Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 54, + "watchers": 57, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 3dc4a89edf..5848828538 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -42,10 +42,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2023-01-05T12:09:14Z", + "updated_at": "2023-01-13T17:10:40Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1648, - "watchers_count": 1648, + "stargazers_count": 1647, + "watchers_count": 1647, "has_discussions": false, "forks_count": 584, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 584, - "watchers": 1648, + "watchers": 1647, "score": 0 }, { diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 134f7b14c5..670e4acba5 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -129,10 +129,10 @@ "description": "CVE-2021-1732 poc & exp; tested on 20H2", "fork": false, "created_at": "2021-04-23T08:21:54Z", - "updated_at": "2022-11-29T00:14:59Z", + "updated_at": "2023-01-13T17:10:39Z", "pushed_at": "2021-04-23T08:28:53Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -141,7 +141,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 64, + "watchers": 63, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index d1ac42db94..eda2ccea63 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -42,10 +42,10 @@ "description": null, "fork": false, "created_at": "2021-05-29T13:07:14Z", - "updated_at": "2022-12-09T21:09:21Z", + "updated_at": "2023-01-13T17:10:39Z", "pushed_at": "2022-01-16T04:17:08Z", - "stargazers_count": 204, - "watchers_count": 204, + "stargazers_count": 203, + "watchers_count": 203, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 204, + "watchers": 203, "score": 0 }, { diff --git a/2021/CVE-2021-24085.json b/2021/CVE-2021-24085.json index 86c48eedfa..1060acc7cd 100644 --- a/2021/CVE-2021-24085.json +++ b/2021/CVE-2021-24085.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2021-02-15T14:41:25Z", - "updated_at": "2022-12-24T13:36:12Z", + "updated_at": "2023-01-13T14:25:19Z", "pushed_at": "2021-02-15T15:11:00Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 67, + "watchers": 68, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-24086.json b/2021/CVE-2021-24086.json index c5910fe1d4..dcaee418c9 100644 --- a/2021/CVE-2021-24086.json +++ b/2021/CVE-2021-24086.json @@ -13,10 +13,10 @@ "description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.", "fork": false, "created_at": "2021-04-07T11:10:40Z", - "updated_at": "2022-12-14T16:58:53Z", + "updated_at": "2023-01-13T17:10:39Z", "pushed_at": "2021-04-15T12:46:54Z", - "stargazers_count": 220, - "watchers_count": 220, + "stargazers_count": 219, + "watchers_count": 219, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 49, - "watchers": 220, + "watchers": 219, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index e6a5a1c4ad..e981288181 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -319,10 +319,10 @@ "description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).", "fork": false, "created_at": "2021-03-08T11:54:32Z", - "updated_at": "2022-12-26T00:03:27Z", + "updated_at": "2023-01-13T17:10:39Z", "pushed_at": "2022-03-02T15:41:29Z", - "stargazers_count": 145, - "watchers_count": 145, + "stargazers_count": 144, + "watchers_count": 144, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -339,7 +339,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 145, + "watchers": 144, "score": 0 }, { @@ -450,10 +450,10 @@ "description": null, "fork": false, "created_at": "2021-03-09T16:54:39Z", - "updated_at": "2022-11-24T11:13:53Z", + "updated_at": "2023-01-13T17:10:39Z", "pushed_at": "2021-03-09T16:56:09Z", - "stargazers_count": 95, - "watchers_count": 95, + "stargazers_count": 94, + "watchers_count": 94, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -462,7 +462,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 95, + "watchers": 94, "score": 0 }, { @@ -819,10 +819,10 @@ "description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.", "fork": false, "created_at": "2021-03-16T07:31:25Z", - "updated_at": "2022-11-04T22:30:28Z", + "updated_at": "2023-01-13T17:10:39Z", "pushed_at": "2021-05-01T17:20:15Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -831,7 +831,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 32, + "watchers": 31, "score": 0 }, { diff --git a/2021/CVE-2021-268855.json b/2021/CVE-2021-268855.json new file mode 100644 index 0000000000..3aa608ee2b --- /dev/null +++ b/2021/CVE-2021-268855.json @@ -0,0 +1,31 @@ +[ + { + "id": 573157644, + "name": "CVE-2021-268855", + "full_name": "sikkertech\/CVE-2021-268855", + "owner": { + "login": "sikkertech", + "id": 74667436, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74667436?v=4", + "html_url": "https:\/\/github.com\/sikkertech" + }, + "html_url": "https:\/\/github.com\/sikkertech\/CVE-2021-268855", + "description": "Exploiting Microsoft CVE-2021-268855 in Exchange (Getting RCE)", + "fork": false, + "created_at": "2022-12-01T20:30:56Z", + "updated_at": "2023-01-13T18:04:46Z", + "pushed_at": "2022-12-01T20:39:30Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-27928.json b/2021/CVE-2021-27928.json index b7aa80d0f1..d39d3a29fa 100644 --- a/2021/CVE-2021-27928.json +++ b/2021/CVE-2021-27928.json @@ -13,10 +13,10 @@ "description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞", "fork": false, "created_at": "2021-04-15T06:40:49Z", - "updated_at": "2022-12-15T02:33:35Z", + "updated_at": "2023-01-13T15:22:44Z", "pushed_at": "2021-12-08T03:06:43Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 53, + "watchers": 54, "score": 0 }, { diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 7345272f10..1621d98b4b 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,10 +13,10 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2023-01-06T05:20:13Z", + "updated_at": "2023-01-13T17:10:39Z", "pushed_at": "2021-06-12T08:27:09Z", - "stargazers_count": 820, - "watchers_count": 820, + "stargazers_count": 819, + "watchers_count": 819, "has_discussions": false, "forks_count": 137, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 137, - "watchers": 820, + "watchers": 819, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 1c9c20ea88..abba8dc907 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -397,10 +397,10 @@ "description": "PoC for CVE-2021-3156 (sudo heap overflow)", "fork": false, "created_at": "2021-01-30T03:22:04Z", - "updated_at": "2023-01-13T09:13:39Z", + "updated_at": "2023-01-13T17:10:37Z", "pushed_at": "2022-04-14T11:51:18Z", - "stargazers_count": 431, - "watchers_count": 431, + "stargazers_count": 430, + "watchers_count": 430, "has_discussions": false, "forks_count": 120, "allow_forking": true, @@ -409,7 +409,7 @@ "topics": [], "visibility": "public", "forks": 120, - "watchers": 431, + "watchers": 430, "score": 0 }, { @@ -460,13 +460,13 @@ "stargazers_count": 852, "watchers_count": 852, "has_discussions": false, - "forks_count": 239, + "forks_count": 240, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 239, + "forks": 240, "watchers": 852, "score": 0 }, diff --git a/2021/CVE-2021-32537.json b/2021/CVE-2021-32537.json index ffa3a353d6..8b3b2c5c37 100644 --- a/2021/CVE-2021-32537.json +++ b/2021/CVE-2021-32537.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.", "fork": false, "created_at": "2021-06-09T15:44:00Z", - "updated_at": "2022-08-23T13:04:22Z", + "updated_at": "2023-01-13T17:10:40Z", "pushed_at": "2021-06-26T18:31:23Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 55, + "watchers": 54, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 4c70817a0e..a3cd174593 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -49,10 +49,10 @@ "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "fork": false, "created_at": "2021-07-05T20:13:49Z", - "updated_at": "2022-12-22T12:01:43Z", + "updated_at": "2023-01-13T17:10:40Z", "pushed_at": "2022-12-07T12:52:32Z", - "stargazers_count": 705, - "watchers_count": 705, + "stargazers_count": 704, + "watchers_count": 704, "has_discussions": false, "forks_count": 113, "allow_forking": true, @@ -61,7 +61,7 @@ "topics": [], "visibility": "public", "forks": 113, - "watchers": 705, + "watchers": 704, "score": 0 }, { diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index 057c7f0dc6..dbbcea8f6d 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -134,10 +134,10 @@ "description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM", "fork": false, "created_at": "2021-07-24T12:55:05Z", - "updated_at": "2022-12-21T11:15:02Z", + "updated_at": "2023-01-13T17:10:41Z", "pushed_at": "2021-09-15T12:41:32Z", - "stargazers_count": 266, - "watchers_count": 266, + "stargazers_count": 265, + "watchers_count": 265, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -146,7 +146,7 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 266, + "watchers": 265, "score": 0 }, { diff --git a/2021/CVE-2021-39749.json b/2021/CVE-2021-39749.json index 3da04fb5af..82491c786c 100644 --- a/2021/CVE-2021-39749.json +++ b/2021/CVE-2021-39749.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta", "fork": false, "created_at": "2022-04-16T16:36:48Z", - "updated_at": "2023-01-13T12:11:42Z", + "updated_at": "2023-01-13T12:35:46Z", "pushed_at": "2022-04-16T16:37:23Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 9, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index e6523200f2..9c7169d9dd 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -169,7 +169,7 @@ "stargazers_count": 939, "watchers_count": 939, "has_discussions": false, - "forks_count": 310, + "forks_count": 309, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -179,7 +179,7 @@ "poc" ], "visibility": "public", - "forks": 310, + "forks": 309, "watchers": 939, "score": 0 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index a0ef2972ff..89adfa5776 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -477,10 +477,10 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2023-01-12T22:50:09Z", + "updated_at": "2023-01-13T12:42:08Z", "pushed_at": "2022-06-22T20:21:42Z", - "stargazers_count": 727, - "watchers_count": 727, + "stargazers_count": 728, + "watchers_count": 728, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -496,7 +496,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 727, + "watchers": 728, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index fc524b8bd5..04276f0055 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -8895,10 +8895,10 @@ "description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.", "fork": false, "created_at": "2021-12-20T15:22:50Z", - "updated_at": "2023-01-07T16:23:34Z", + "updated_at": "2023-01-13T14:43:47Z", "pushed_at": "2022-12-30T12:32:05Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -8907,7 +8907,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 20, + "watchers": 21, "score": 0 }, { @@ -9585,10 +9585,10 @@ "description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.", "fork": false, "created_at": "2021-12-24T13:18:49Z", - "updated_at": "2023-01-02T23:33:43Z", + "updated_at": "2023-01-13T17:53:09Z", "pushed_at": "2022-08-12T20:12:50Z", - "stargazers_count": 96, - "watchers_count": 96, + "stargazers_count": 97, + "watchers_count": 97, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -9597,7 +9597,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 96, + "watchers": 97, "score": 0 }, { diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index 3d1ff4322f..8adfdeb6fa 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -13,19 +13,19 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2023-01-13T12:12:40Z", + "updated_at": "2023-01-13T15:36:35Z", "pushed_at": "2023-01-10T16:25:49Z", - "stargazers_count": 91, - "watchers_count": 91, + "stargazers_count": 94, + "watchers_count": 94, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, - "watchers": 91, + "forks": 18, + "watchers": 94, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index b290341890..49591b4344 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2023-01-13T09:48:49Z", + "updated_at": "2023-01-13T13:01:16Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 678, - "watchers_count": 678, + "stargazers_count": 679, + "watchers_count": 679, "has_discussions": false, "forks_count": 144, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 144, - "watchers": 678, + "watchers": 679, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 0000feecf9..bd78f2a3e1 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -187,10 +187,10 @@ "description": "CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection", "fork": false, "created_at": "2022-06-03T19:24:30Z", - "updated_at": "2022-11-30T04:48:11Z", + "updated_at": "2023-01-13T12:49:04Z", "pushed_at": "2022-06-03T19:59:01Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -199,7 +199,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 28, + "watchers": 29, "score": 0 }, { diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index c63fb131a4..d35adfcdb3 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -2279,5 +2279,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 588668068, + "name": "Follina_Vagrant", + "full_name": "3barz\/Follina_Vagrant", + "owner": { + "login": "3barz", + "id": 113859310, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113859310?v=4", + "html_url": "https:\/\/github.com\/3barz" + }, + "html_url": "https:\/\/github.com\/3barz\/Follina_Vagrant", + "description": "Follina(CVE-2022-30190) Vagrant Demo", + "fork": false, + "created_at": "2023-01-13T17:32:13Z", + "updated_at": "2023-01-13T17:36:25Z", + "pushed_at": "2023-01-13T17:36:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-31705.json b/2022/CVE-2022-31705.json index e0b8f63979..e4ae2f6f82 100644 --- a/2022/CVE-2022-31705.json +++ b/2022/CVE-2022-31705.json @@ -13,10 +13,10 @@ "description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ", "fork": false, "created_at": "2023-01-09T04:27:15Z", - "updated_at": "2023-01-13T05:09:35Z", + "updated_at": "2023-01-13T17:16:25Z", "pushed_at": "2023-01-09T08:19:27Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 98, + "watchers": 99, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-3656.json b/2022/CVE-2022-3656.json index c00ec1a4fe..c0ca3506d7 100644 --- a/2022/CVE-2022-3656.json +++ b/2022/CVE-2022-3656.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2023-01-13T03:26:14Z", - "updated_at": "2023-01-13T10:19:09Z", + "updated_at": "2023-01-13T16:31:21Z", "pushed_at": "2023-01-13T03:35:05Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 15, + "forks": 5, + "watchers": 17, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-41082.json b/2022/CVE-2022-41082.json index 915b899e30..81c749c0a8 100644 --- a/2022/CVE-2022-41082.json +++ b/2022/CVE-2022-41082.json @@ -86,6 +86,35 @@ "watchers": 2, "score": 0 }, + { + "id": 573162752, + "name": "CVE-2022-41082", + "full_name": "sikkertech\/CVE-2022-41082", + "owner": { + "login": "sikkertech", + "id": 74667436, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74667436?v=4", + "html_url": "https:\/\/github.com\/sikkertech" + }, + "html_url": "https:\/\/github.com\/sikkertech\/CVE-2022-41082", + "description": "Exchange CVE '22", + "fork": false, + "created_at": "2022-12-01T20:48:53Z", + "updated_at": "2023-01-13T18:05:11Z", + "pushed_at": "2022-12-01T20:50:01Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 + }, { "id": 581104837, "name": "OWASSRF-CVE-2022-41082-POC", @@ -100,10 +129,10 @@ "description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers", "fork": false, "created_at": "2022-12-22T09:35:26Z", - "updated_at": "2023-01-13T08:59:46Z", + "updated_at": "2023-01-13T14:38:55Z", "pushed_at": "2023-01-10T08:09:36Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -120,7 +149,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 30, + "watchers": 32, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-41828.json b/2022/CVE-2022-41828.json new file mode 100644 index 0000000000..c28374bbf1 --- /dev/null +++ b/2022/CVE-2022-41828.json @@ -0,0 +1,31 @@ +[ + { + "id": 576236390, + "name": "CVE-2022-41828", + "full_name": "murataydemir\/CVE-2022-41828", + "owner": { + "login": "murataydemir", + "id": 16391655, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4", + "html_url": "https:\/\/github.com\/murataydemir" + }, + "html_url": "https:\/\/github.com\/murataydemir\/CVE-2022-41828", + "description": "[CVE-2022-41828] Amazon AWS Redshift JDBC Driver Remote Code Execution (RCE)", + "fork": false, + "created_at": "2022-12-09T10:35:33Z", + "updated_at": "2023-01-13T14:31:20Z", + "pushed_at": "2023-01-13T09:00:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json index 22b6bdc251..075d82f3e6 100644 --- a/2022/CVE-2022-46169.json +++ b/2022/CVE-2022-46169.json @@ -76,7 +76,7 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -90,7 +90,7 @@ "vulnerability" ], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 2, "score": 0 }, @@ -145,13 +145,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 2, "watchers": 0, "score": 0 } diff --git a/2022/CVE-2022-46485.json b/2022/CVE-2022-46485.json index 093749fb80..e4c48f3a59 100644 --- a/2022/CVE-2022-46485.json +++ b/2022/CVE-2022-46485.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-11-16T16:26:34Z", "updated_at": "2023-01-11T10:12:05Z", - "pushed_at": "2023-01-11T09:13:55Z", + "pushed_at": "2023-01-13T15:41:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 1f75b6721e..39f73ef9f3 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -13,10 +13,10 @@ "description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.", "fork": false, "created_at": "2022-12-17T16:45:24Z", - "updated_at": "2023-01-12T15:49:49Z", + "updated_at": "2023-01-13T16:16:15Z", "pushed_at": "2022-12-21T17:53:19Z", - "stargazers_count": 235, - "watchers_count": 235, + "stargazers_count": 236, + "watchers_count": 236, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 235, + "watchers": 236, "score": 0 }, { @@ -43,7 +43,7 @@ "fork": false, "created_at": "2022-12-26T00:08:55Z", "updated_at": "2023-01-11T11:03:33Z", - "pushed_at": "2023-01-04T02:01:53Z", + "pushed_at": "2023-01-13T18:26:06Z", "stargazers_count": 70, "watchers_count": 70, "has_discussions": false, @@ -71,19 +71,19 @@ "description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.", "fork": false, "created_at": "2022-12-26T06:56:35Z", - "updated_at": "2023-01-13T11:26:07Z", + "updated_at": "2023-01-13T18:08:48Z", "pushed_at": "2023-01-06T06:31:57Z", - "stargazers_count": 603, - "watchers_count": 603, + "stargazers_count": 605, + "watchers_count": 605, "has_discussions": false, - "forks_count": 39, + "forks_count": 40, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 39, - "watchers": 603, + "forks": 40, + "watchers": 605, "score": 0 }, { @@ -130,7 +130,7 @@ "fork": false, "created_at": "2023-01-03T21:46:37Z", "updated_at": "2023-01-13T10:12:19Z", - "pushed_at": "2023-01-04T02:03:17Z", + "pushed_at": "2023-01-13T18:24:29Z", "stargazers_count": 49, "watchers_count": 49, "has_discussions": false, @@ -159,7 +159,7 @@ "fork": false, "created_at": "2023-01-04T05:08:20Z", "updated_at": "2023-01-10T15:04:48Z", - "pushed_at": "2023-01-04T05:32:52Z", + "pushed_at": "2023-01-13T18:23:51Z", "stargazers_count": 28, "watchers_count": 28, "has_discussions": false, @@ -192,7 +192,7 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -203,7 +203,7 @@ "swift" ], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0 }, @@ -222,7 +222,7 @@ "fork": false, "created_at": "2023-01-05T21:50:25Z", "updated_at": "2023-01-13T09:34:02Z", - "pushed_at": "2023-01-13T09:30:17Z", + "pushed_at": "2023-01-13T18:22:32Z", "stargazers_count": 81, "watchers_count": 81, "has_discussions": false, @@ -252,10 +252,10 @@ "description": "Simple customization app using CVE-2022-46689", "fork": false, "created_at": "2023-01-12T14:31:30Z", - "updated_at": "2023-01-12T17:06:38Z", + "updated_at": "2023-01-13T14:00:39Z", "pushed_at": "2023-01-12T19:14:47Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -264,7 +264,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21752.json b/2023/CVE-2023-21752.json index c32e16d5e3..14ee7bd6c4 100644 --- a/2023/CVE-2023-21752.json +++ b/2023/CVE-2023-21752.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2023-01-10T15:59:26Z", - "updated_at": "2023-01-13T12:19:49Z", + "updated_at": "2023-01-13T18:04:12Z", "pushed_at": "2023-01-13T09:01:20Z", - "stargazers_count": 151, - "watchers_count": 151, + "stargazers_count": 158, + "watchers_count": 158, "has_discussions": false, - "forks_count": 30, + "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 30, - "watchers": 151, + "forks": 31, + "watchers": 158, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 4fabf2c10c..8bcfaac06b 100644 --- a/README.md +++ b/README.md @@ -3249,6 +3249,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi - [0xAbbarhSF/FollinaXploit](https://github.com/0xAbbarhSF/FollinaXploit) - [kevinsmith96/Cve-2022-30190](https://github.com/kevinsmith96/Cve-2022-30190) - [melting0256/Enterprise-Cybersecurity](https://github.com/melting0256/Enterprise-Cybersecurity) +- [3barz/Follina_Vagrant](https://github.com/3barz/Follina_Vagrant) ### CVE-2022-30206 (2022-07-12) @@ -4607,6 +4608,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability. - [Diverto/nse-exchange](https://github.com/Diverto/nse-exchange) - [trhacknon/CVE-2022-41082-MASS-SCANNER](https://github.com/trhacknon/CVE-2022-41082-MASS-SCANNER) - [notareaperbutDR34P3r/http-vuln-CVE-2022-41082](https://github.com/notareaperbutDR34P3r/http-vuln-CVE-2022-41082) +- [sikkertech/CVE-2022-41082](https://github.com/sikkertech/CVE-2022-41082) - [balki97/OWASSRF-CVE-2022-41082-POC](https://github.com/balki97/OWASSRF-CVE-2022-41082-POC) ### CVE-2022-41218 (2022-09-21) @@ -4699,6 +4701,14 @@ An attacker can cause excessive memory growth in a Go server accepting HTTP/2 re - [domdom82/h2conn-exploit](https://github.com/domdom82/h2conn-exploit) +### CVE-2022-41828 (2022-09-29) + +<code> +In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name. +</code> + +- [murataydemir/CVE-2022-41828](https://github.com/murataydemir/CVE-2022-41828) + ### CVE-2022-41852 - [Warxim/CVE-2022-41852](https://github.com/Warxim/CVE-2022-41852) @@ -11716,6 +11726,9 @@ Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclos - [malakkf/CVE-2021-46702](https://github.com/malakkf/CVE-2021-46702) +### CVE-2021-268855 +- [sikkertech/CVE-2021-268855](https://github.com/sikkertech/CVE-2021-268855) + ## 2020 ### CVE-2020-0001 (2020-01-08) @@ -12419,7 +12432,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve - [AaronCaiii/CVE-2020-0796-POC](https://github.com/AaronCaiii/CVE-2020-0796-POC) - [datntsec/CVE-2020-0796](https://github.com/datntsec/CVE-2020-0796) - [MasterSploit/LPE---CVE-2020-0796](https://github.com/MasterSploit/LPE---CVE-2020-0796) -- [ORCA666/CVE-2020-0796](https://github.com/ORCA666/CVE-2020-0796) - [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner) - [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker) - [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796) @@ -17370,7 +17382,6 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly - [AaronCaiii/CVE-2019-0708-POC](https://github.com/AaronCaiii/CVE-2019-0708-POC) - [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit) - [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows) -- [ORCA666/CVE-2019--0708-SCANNER](https://github.com/ORCA666/CVE-2019--0708-SCANNER) - [FroydCod3r/CVE-2019-0708](https://github.com/FroydCod3r/CVE-2019-0708) - [pywc/CVE-2019-0708](https://github.com/pywc/CVE-2019-0708) - [bibo318/kali-CVE-2019-0708-lab](https://github.com/bibo318/kali-CVE-2019-0708-lab)