diff --git a/2009/CVE-2009-2698.json b/2009/CVE-2009-2698.json
index 430e2db007..2fe4062871 100644
--- a/2009/CVE-2009-2698.json
+++ b/2009/CVE-2009-2698.json
@@ -13,17 +13,17 @@
"description": "CVE-2009-2698 compiled for CentOS 4.8",
"fork": false,
"created_at": "2018-02-16T16:17:24Z",
- "updated_at": "2022-02-23T04:22:45Z",
+ "updated_at": "2022-03-19T14:43:34Z",
"pushed_at": "2018-02-16T16:30:00Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 4,
+ "watchers": 5,
"score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-0075.json b/2017/CVE-2017-0075.json
index d0d2b6020a..76794a4c10 100644
--- a/2017/CVE-2017-0075.json
+++ b/2017/CVE-2017-0075.json
@@ -25,5 +25,32 @@
"forks": 16,
"watchers": 35,
"score": 0
+ },
+ {
+ "id": 471700783,
+ "name": "4B5F5F4Bp",
+ "full_name": "belyakovvitagmailt\/4B5F5F4Bp",
+ "owner": {
+ "login": "belyakovvitagmailt",
+ "id": 101933630,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101933630?v=4",
+ "html_url": "https:\/\/github.com\/belyakovvitagmailt"
+ },
+ "html_url": "https:\/\/github.com\/belyakovvitagmailt\/4B5F5F4Bp",
+ "description": "PoC for CVE-2017-0075",
+ "fork": false,
+ "created_at": "2022-03-19T13:18:12Z",
+ "updated_at": "2022-03-19T13:18:12Z",
+ "pushed_at": "2022-03-19T13:18:13Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json
index 67039b5777..87c8a5412c 100644
--- a/2018/CVE-2018-15473.json
+++ b/2018/CVE-2018-15473.json
@@ -523,17 +523,17 @@
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
"fork": false,
"created_at": "2020-11-29T17:36:11Z",
- "updated_at": "2022-03-11T12:11:07Z",
+ "updated_at": "2022-03-19T16:45:51Z",
"pushed_at": "2020-11-29T17:48:55Z",
- "stargazers_count": 9,
- "watchers_count": 9,
+ "stargazers_count": 10,
+ "watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 9,
+ "watchers": 10,
"score": 0
},
{
diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json
index d7adcbca39..4c607d3f9a 100644
--- a/2018/CVE-2018-5955.json
+++ b/2018/CVE-2018-5955.json
@@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
- "updated_at": "2022-03-18T08:39:43Z",
+ "updated_at": "2022-03-19T12:57:29Z",
"pushed_at": "2020-01-05T21:46:25Z",
- "stargazers_count": 506,
- "watchers_count": 506,
+ "stargazers_count": 507,
+ "watchers_count": 507,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
@@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 114,
- "watchers": 506,
+ "watchers": 507,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-1821.json b/2019/CVE-2019-1821.json
index bbec0bdfd7..3a5f56f439 100644
--- a/2019/CVE-2019-1821.json
+++ b/2019/CVE-2019-1821.json
@@ -13,11 +13,11 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
- "updated_at": "2022-03-08T11:40:23Z",
+ "updated_at": "2022-03-19T15:41:44Z",
"pushed_at": "2019-05-21T14:52:36Z",
- "stargazers_count": 98,
- "watchers_count": 98,
- "forks_count": 53,
+ "stargazers_count": 99,
+ "watchers_count": 99,
+ "forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -30,8 +30,8 @@
"rce"
],
"visibility": "public",
- "forks": 53,
- "watchers": 98,
+ "forks": 54,
+ "watchers": 99,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json
index 767b202b12..d628e12fa2 100644
--- a/2019/CVE-2019-2215.json
+++ b/2019/CVE-2019-2215.json
@@ -323,7 +323,7 @@
"fork": false,
"created_at": "2022-02-28T02:34:31Z",
"updated_at": "2022-02-28T16:22:18Z",
- "pushed_at": "2022-02-28T03:54:44Z",
+ "pushed_at": "2022-03-19T14:07:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json
index 1dd04a91cd..a5242ae29f 100644
--- a/2019/CVE-2019-3396.json
+++ b/2019/CVE-2019-3396.json
@@ -130,12 +130,12 @@
"pushed_at": "2019-11-01T14:33:21Z",
"stargazers_count": 132,
"watchers_count": 132,
- "forks_count": 60,
+ "forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 60,
+ "forks": 61,
"watchers": 132,
"score": 0
},
diff --git a/2020/CVE-2020-0890.json b/2020/CVE-2020-0890.json
index cd29a79aff..ac8aa1a67f 100644
--- a/2020/CVE-2020-0890.json
+++ b/2020/CVE-2020-0890.json
@@ -25,5 +25,32 @@
"forks": 9,
"watchers": 32,
"score": 0
+ },
+ {
+ "id": 471740268,
+ "name": "gerhart01",
+ "full_name": "skasanagottu57gmailv\/gerhart01",
+ "owner": {
+ "login": "skasanagottu57gmailv",
+ "id": 101940293,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101940293?v=4",
+ "html_url": "https:\/\/github.com\/skasanagottu57gmailv"
+ },
+ "html_url": "https:\/\/github.com\/skasanagottu57gmailv\/gerhart01",
+ "description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
+ "fork": false,
+ "created_at": "2022-03-19T15:47:10Z",
+ "updated_at": "2022-03-19T15:47:10Z",
+ "pushed_at": "2022-03-19T15:47:11Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json
index 0b4ef237e2..4041bb849a 100644
--- a/2020/CVE-2020-14883.json
+++ b/2020/CVE-2020-14883.json
@@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
- "updated_at": "2022-03-17T10:38:09Z",
+ "updated_at": "2022-03-19T13:38:14Z",
"pushed_at": "2021-07-30T03:28:00Z",
- "stargazers_count": 922,
- "watchers_count": 922,
+ "stargazers_count": 923,
+ "watchers_count": 923,
"forks_count": 293,
"allow_forking": true,
"is_template": false,
@@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 293,
- "watchers": 922,
+ "watchers": 923,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 2e9c0d6c5b..0be99f388f 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -144,12 +144,12 @@
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 181,
"watchers_count": 181,
- "forks_count": 69,
+ "forks_count": 70,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 69,
+ "forks": 70,
"watchers": 181,
"score": 0
},
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
index cfe8a37ed2..54632dcb75 100644
--- a/2021/CVE-2021-21985.json
+++ b/2021/CVE-2021-21985.json
@@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
- "updated_at": "2022-03-11T11:54:11Z",
+ "updated_at": "2022-03-19T13:51:35Z",
"pushed_at": "2022-01-16T04:17:08Z",
- "stargazers_count": 192,
- "watchers_count": 192,
- "forks_count": 47,
+ "stargazers_count": 193,
+ "watchers_count": 193,
+ "forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 47,
- "watchers": 192,
+ "forks": 48,
+ "watchers": 193,
"score": 0
},
{
diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json
index 810f696f8d..2d028e7183 100644
--- a/2021/CVE-2021-22204.json
+++ b/2021/CVE-2021-22204.json
@@ -17,7 +17,7 @@
"pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 47,
"watchers_count": 47,
- "forks_count": 16,
+ "forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -25,7 +25,7 @@
"exiftool"
],
"visibility": "public",
- "forks": 16,
+ "forks": 17,
"watchers": 47,
"score": 0
},
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index 6f875bd34c..6b73109e09 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -94,17 +94,17 @@
"description": "Gitlab CE\/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205",
"fork": false,
"created_at": "2021-10-29T04:15:00Z",
- "updated_at": "2022-03-11T04:47:52Z",
+ "updated_at": "2022-03-19T15:09:08Z",
"pushed_at": "2021-11-04T02:17:54Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 7,
+ "watchers_count": 7,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 6,
+ "watchers": 7,
"score": 0
},
{
diff --git a/2021/CVE-2021-22214.json b/2021/CVE-2021-22214.json
index 266137b7a9..98a747e130 100644
--- a/2021/CVE-2021-22214.json
+++ b/2021/CVE-2021-22214.json
@@ -67,17 +67,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214",
"fork": false,
"created_at": "2021-11-01T04:04:42Z",
- "updated_at": "2022-03-11T04:47:34Z",
+ "updated_at": "2022-03-19T15:09:12Z",
"pushed_at": "2021-11-04T02:21:28Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 7,
+ "watchers": 8,
"score": 0
},
{
diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json
index 5be5ec2872..9ad19e44ba 100644
--- a/2021/CVE-2021-25646.json
+++ b/2021/CVE-2021-25646.json
@@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
- "updated_at": "2022-03-17T10:38:09Z",
+ "updated_at": "2022-03-19T13:38:14Z",
"pushed_at": "2021-07-30T03:28:00Z",
- "stargazers_count": 922,
- "watchers_count": 922,
+ "stargazers_count": 923,
+ "watchers_count": 923,
"forks_count": 293,
"allow_forking": true,
"is_template": false,
@@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 293,
- "watchers": 922,
+ "watchers": 923,
"score": 0
},
{
diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json
index 3966e6b1e9..c77c85f33c 100644
--- a/2021/CVE-2021-26084.json
+++ b/2021/CVE-2021-26084.json
@@ -202,17 +202,17 @@
"description": "POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.",
"fork": false,
"created_at": "2022-01-13T06:29:51Z",
- "updated_at": "2022-03-11T04:47:30Z",
+ "updated_at": "2022-03-19T15:09:22Z",
"pushed_at": "2022-01-14T04:21:27Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 7,
+ "watchers": 8,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json
index 1eab33e618..d139e32e53 100644
--- a/2021/CVE-2021-26855.json
+++ b/2021/CVE-2021-26855.json
@@ -1000,12 +1000,12 @@
"pushed_at": "2021-03-24T01:25:05Z",
"stargazers_count": 39,
"watchers_count": 39,
- "forks_count": 13,
+ "forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 13,
+ "forks": 14,
"watchers": 39,
"score": 0
},
diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json
index 0385f43a70..79d35e5482 100644
--- a/2021/CVE-2021-30955.json
+++ b/2021/CVE-2021-30955.json
@@ -94,17 +94,17 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
- "updated_at": "2022-03-18T09:24:40Z",
+ "updated_at": "2022-03-19T17:24:44Z",
"pushed_at": "2022-03-01T16:11:31Z",
- "stargazers_count": 225,
- "watchers_count": 225,
- "forks_count": 38,
+ "stargazers_count": 226,
+ "watchers_count": 226,
+ "forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 38,
- "watchers": 225,
+ "forks": 39,
+ "watchers": 226,
"score": 0
},
{
@@ -179,12 +179,12 @@
"pushed_at": "2022-03-18T16:11:21Z",
"stargazers_count": 12,
"watchers_count": 12,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 12,
"score": 0
}
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index 529b49ce4b..ccc9e77c80 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -969,17 +969,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
- "updated_at": "2022-03-17T04:13:40Z",
+ "updated_at": "2022-03-19T15:13:07Z",
"pushed_at": "2022-01-13T05:48:01Z",
- "stargazers_count": 458,
- "watchers_count": 458,
+ "stargazers_count": 459,
+ "watchers_count": 459,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 124,
- "watchers": 458,
+ "watchers": 459,
"score": 0
},
{
@@ -1401,17 +1401,17 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2022-03-18T00:05:48Z",
- "updated_at": "2022-03-18T00:19:02Z",
+ "updated_at": "2022-03-19T12:58:55Z",
"pushed_at": "2022-03-18T00:17:41Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json
index e4ffb8e7ce..df9a9120f6 100644
--- a/2021/CVE-2021-3490.json
+++ b/2021/CVE-2021-3490.json
@@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
- "updated_at": "2022-03-14T08:08:53Z",
+ "updated_at": "2022-03-19T17:56:08Z",
"pushed_at": "2021-08-25T19:26:21Z",
- "stargazers_count": 227,
- "watchers_count": 227,
+ "stargazers_count": 229,
+ "watchers_count": 229,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
- "watchers": 227,
+ "watchers": 229,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json
index f0394e8134..5e059afa91 100644
--- a/2021/CVE-2021-3560.json
+++ b/2021/CVE-2021-3560.json
@@ -184,17 +184,17 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
- "updated_at": "2022-03-18T21:39:10Z",
+ "updated_at": "2022-03-19T17:12:14Z",
"pushed_at": "2021-06-20T07:38:13Z",
- "stargazers_count": 48,
- "watchers_count": 48,
+ "stargazers_count": 49,
+ "watchers_count": 49,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
- "watchers": 48,
+ "watchers": 49,
"score": 0
},
{
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index a2e4e99eaf..9b6540c9f6 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -106,17 +106,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
- "updated_at": "2022-03-18T18:39:35Z",
+ "updated_at": "2022-03-19T16:46:59Z",
"pushed_at": "2022-01-30T14:22:23Z",
- "stargazers_count": 1416,
- "watchers_count": 1416,
+ "stargazers_count": 1417,
+ "watchers_count": 1417,
"forks_count": 414,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 414,
- "watchers": 1416,
+ "watchers": 1417,
"score": 0
},
{
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 7b01f221d6..e6f8b98598 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -120,6 +120,33 @@
"watchers": 4,
"score": 0
},
+ {
+ "id": 414878778,
+ "name": "CVE-2021-41773",
+ "full_name": "corelight\/CVE-2021-41773",
+ "owner": {
+ "login": "corelight",
+ "id": 21672558,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
+ "html_url": "https:\/\/github.com\/corelight"
+ },
+ "html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773",
+ "description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)",
+ "fork": false,
+ "created_at": "2021-10-08T06:54:27Z",
+ "updated_at": "2021-10-28T05:48:41Z",
+ "pushed_at": "2021-10-28T05:55:41Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0
+ },
{
"id": 420407065,
"name": "cve-2021-41773",
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 23a1eef3dc..c481a20b03 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
- "updated_at": "2022-03-18T18:00:49Z",
+ "updated_at": "2022-03-19T16:21:06Z",
"pushed_at": "2022-01-22T14:55:02Z",
- "stargazers_count": 1274,
- "watchers_count": 1274,
+ "stargazers_count": 1276,
+ "watchers_count": 1276,
"forks_count": 347,
"allow_forking": true,
"is_template": false,
@@ -922,7 +922,7 @@
],
"visibility": "public",
"forks": 347,
- "watchers": 1274,
+ "watchers": 1276,
"score": 0
},
{
@@ -1235,10 +1235,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
- "updated_at": "2022-03-19T04:54:18Z",
+ "updated_at": "2022-03-19T12:42:48Z",
"pushed_at": "2022-02-18T08:54:03Z",
- "stargazers_count": 259,
- "watchers_count": 259,
+ "stargazers_count": 260,
+ "watchers_count": 260,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
@@ -1250,7 +1250,7 @@
],
"visibility": "public",
"forks": 63,
- "watchers": 259,
+ "watchers": 260,
"score": 0
},
{
@@ -3148,10 +3148,10 @@
"description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell",
"fork": false,
"created_at": "2021-12-12T21:45:33Z",
- "updated_at": "2022-03-08T10:44:06Z",
+ "updated_at": "2022-03-19T16:17:33Z",
"pushed_at": "2022-01-18T08:18:21Z",
- "stargazers_count": 42,
- "watchers_count": 42,
+ "stargazers_count": 43,
+ "watchers_count": 43,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@@ -3164,7 +3164,7 @@
],
"visibility": "public",
"forks": 22,
- "watchers": 42,
+ "watchers": 43,
"score": 0
},
{
@@ -5214,10 +5214,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
- "updated_at": "2022-03-19T06:26:17Z",
+ "updated_at": "2022-03-19T17:46:22Z",
"pushed_at": "2021-12-27T15:12:20Z",
- "stargazers_count": 269,
- "watchers_count": 269,
+ "stargazers_count": 268,
+ "watchers_count": 268,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@@ -5230,7 +5230,7 @@
],
"visibility": "public",
"forks": 35,
- "watchers": 269,
+ "watchers": 268,
"score": 0
},
{
@@ -8395,17 +8395,17 @@
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
"fork": false,
"created_at": "2021-12-19T14:48:30Z",
- "updated_at": "2022-03-10T09:20:49Z",
+ "updated_at": "2022-03-19T13:53:18Z",
"pushed_at": "2021-12-22T15:56:21Z",
- "stargazers_count": 70,
- "watchers_count": 70,
- "forks_count": 15,
+ "stargazers_count": 71,
+ "watchers_count": 71,
+ "forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 15,
- "watchers": 70,
+ "forks": 16,
+ "watchers": 71,
"score": 0
},
{
diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json
index 2653a856f5..3a89721909 100644
--- a/2022/CVE-2022-0337.json
+++ b/2022/CVE-2022-0337.json
@@ -13,11 +13,11 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
- "updated_at": "2022-03-19T12:04:49Z",
+ "updated_at": "2022-03-19T18:03:11Z",
"pushed_at": "2022-03-19T12:01:26Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -38,8 +38,8 @@
"writeups"
],
"visibility": "public",
- "forks": 0,
- "watchers": 0,
+ "forks": 3,
+ "watchers": 21,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json
index b3f1af9697..c96f546b00 100644
--- a/2022/CVE-2022-0492.json
+++ b/2022/CVE-2022-0492.json
@@ -13,17 +13,17 @@
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-02-28T01:25:26Z",
- "updated_at": "2022-03-19T10:55:31Z",
+ "updated_at": "2022-03-19T16:50:15Z",
"pushed_at": "2022-03-09T00:09:46Z",
- "stargazers_count": 36,
- "watchers_count": 36,
+ "stargazers_count": 37,
+ "watchers_count": 37,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 36,
+ "watchers": 37,
"score": 0
},
{
diff --git a/2022/CVE-2022-0778.json b/2022/CVE-2022-0778.json
index ef93afc943..d8d88f1d6c 100644
--- a/2022/CVE-2022-0778.json
+++ b/2022/CVE-2022-0778.json
@@ -13,17 +13,17 @@
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
"fork": false,
"created_at": "2022-03-15T19:06:33Z",
- "updated_at": "2022-03-19T04:37:30Z",
+ "updated_at": "2022-03-19T17:53:52Z",
"pushed_at": "2022-03-15T21:12:46Z",
- "stargazers_count": 65,
- "watchers_count": 65,
- "forks_count": 19,
+ "stargazers_count": 75,
+ "watchers_count": 75,
+ "forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 19,
- "watchers": 65,
+ "forks": 20,
+ "watchers": 75,
"score": 0
},
{
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index cfee9c1003..09b8ddde58 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
- "updated_at": "2022-03-18T19:03:15Z",
+ "updated_at": "2022-03-19T16:02:48Z",
"pushed_at": "2022-03-08T06:20:05Z",
- "stargazers_count": 863,
- "watchers_count": 863,
+ "stargazers_count": 865,
+ "watchers_count": 865,
"forks_count": 175,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 175,
- "watchers": 863,
+ "watchers": 865,
"score": 0
},
{
@@ -337,17 +337,17 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
- "updated_at": "2022-03-17T16:08:55Z",
+ "updated_at": "2022-03-19T15:56:11Z",
"pushed_at": "2022-03-08T11:52:22Z",
- "stargazers_count": 28,
- "watchers_count": 28,
+ "stargazers_count": 29,
+ "watchers_count": 29,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 28,
+ "watchers": 29,
"score": 0
},
{
@@ -530,12 +530,12 @@
"pushed_at": "2022-03-18T09:32:30Z",
"stargazers_count": 22,
"watchers_count": 22,
- "forks_count": 6,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 6,
+ "forks": 7,
"watchers": 22,
"score": 0
},
diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json
index 9ad9167be6..a5901b3748 100644
--- a/2022/CVE-2022-21907.json
+++ b/2022/CVE-2022-21907.json
@@ -87,17 +87,17 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
- "updated_at": "2022-03-18T08:24:49Z",
+ "updated_at": "2022-03-19T15:03:35Z",
"pushed_at": "2022-01-20T02:07:59Z",
- "stargazers_count": 352,
- "watchers_count": 352,
+ "stargazers_count": 353,
+ "watchers_count": 353,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 96,
- "watchers": 352,
+ "watchers": 353,
"score": 0
},
{
diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json
index 3da6b2a625..4f1c2aee9d 100644
--- a/2022/CVE-2022-21971.json
+++ b/2022/CVE-2022-21971.json
@@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
- "updated_at": "2022-03-18T08:21:59Z",
+ "updated_at": "2022-03-19T17:24:02Z",
"pushed_at": "2022-02-26T20:45:19Z",
- "stargazers_count": 240,
- "watchers_count": 240,
+ "stargazers_count": 242,
+ "watchers_count": 242,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 48,
- "watchers": 240,
+ "watchers": 242,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json
index 8fbebc6692..85cd8581e0 100644
--- a/2022/CVE-2022-21999.json
+++ b/2022/CVE-2022-21999.json
@@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
- "updated_at": "2022-03-19T03:54:49Z",
+ "updated_at": "2022-03-19T13:28:53Z",
"pushed_at": "2022-02-09T16:54:09Z",
- "stargazers_count": 502,
- "watchers_count": 502,
- "forks_count": 97,
+ "stargazers_count": 505,
+ "watchers_count": 505,
+ "forks_count": 98,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -25,8 +25,8 @@
"cve-2022-22718"
],
"visibility": "public",
- "forks": 97,
- "watchers": 502,
+ "forks": 98,
+ "watchers": 505,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-22536.json b/2022/CVE-2022-22536.json
index ed5501e3d2..aed9bc5f83 100644
--- a/2022/CVE-2022-22536.json
+++ b/2022/CVE-2022-22536.json
@@ -13,17 +13,17 @@
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
"fork": false,
"created_at": "2022-02-15T09:22:19Z",
- "updated_at": "2022-03-14T01:13:46Z",
+ "updated_at": "2022-03-19T15:09:57Z",
"pushed_at": "2022-02-21T08:58:22Z",
- "stargazers_count": 35,
- "watchers_count": 35,
+ "stargazers_count": 36,
+ "watchers_count": 36,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 35,
+ "watchers": 36,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-22600.json b/2022/CVE-2022-22600.json
index 4dcb9a3084..eb5a22e3b2 100644
--- a/2022/CVE-2022-22600.json
+++ b/2022/CVE-2022-22600.json
@@ -13,17 +13,17 @@
"description": "CVE-2022-22600 Proof of Concept",
"fork": false,
"created_at": "2021-12-22T05:03:29Z",
- "updated_at": "2022-03-19T09:43:28Z",
+ "updated_at": "2022-03-19T14:10:04Z",
"pushed_at": "2022-03-19T04:17:26Z",
- "stargazers_count": 4,
- "watchers_count": 4,
- "forks_count": 2,
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 4,
+ "forks": 5,
+ "watchers": 5,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-23731.json b/2022/CVE-2022-23731.json
new file mode 100644
index 0000000000..d64d1c8dcb
--- /dev/null
+++ b/2022/CVE-2022-23731.json
@@ -0,0 +1,41 @@
+[
+ {
+ "id": 441808910,
+ "name": "WAMpage",
+ "full_name": "DavidBuchanan314\/WAMpage",
+ "owner": {
+ "login": "DavidBuchanan314",
+ "id": 13520633,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13520633?v=4",
+ "html_url": "https:\/\/github.com\/DavidBuchanan314"
+ },
+ "html_url": "https:\/\/github.com\/DavidBuchanan314\/WAMpage",
+ "description": "WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)",
+ "fork": false,
+ "created_at": "2021-12-26T04:29:09Z",
+ "updated_at": "2022-03-19T16:24:15Z",
+ "pushed_at": "2022-03-19T16:24:28Z",
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [
+ "arm",
+ "cve-2022-23731",
+ "exploit",
+ "javascript",
+ "lg-webos",
+ "lg-webos-tv",
+ "lpe",
+ "python",
+ "v8",
+ "webos",
+ "webos-tv"
+ ],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 34,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json
index e0c1e62e4e..cdf7d1299f 100644
--- a/2022/CVE-2022-25636.json
+++ b/2022/CVE-2022-25636.json
@@ -13,17 +13,17 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
- "updated_at": "2022-03-19T12:04:13Z",
+ "updated_at": "2022-03-19T17:01:07Z",
"pushed_at": "2022-03-07T17:18:19Z",
- "stargazers_count": 303,
- "watchers_count": 303,
+ "stargazers_count": 308,
+ "watchers_count": 308,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
- "watchers": 303,
+ "watchers": 308,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-25949.json b/2022/CVE-2022-25949.json
index 8c76269dcb..efc85cca1c 100644
--- a/2022/CVE-2022-25949.json
+++ b/2022/CVE-2022-25949.json
@@ -13,17 +13,17 @@
"description": "A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.",
"fork": false,
"created_at": "2022-03-16T14:42:21Z",
- "updated_at": "2022-03-18T16:34:46Z",
+ "updated_at": "2022-03-19T17:23:12Z",
"pushed_at": "2022-03-16T19:51:30Z",
- "stargazers_count": 26,
- "watchers_count": 26,
+ "stargazers_count": 27,
+ "watchers_count": 27,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 26,
+ "watchers": 27,
"score": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 3de963f14a..ba03869b93 100644
--- a/README.md
+++ b/README.md
@@ -458,6 +458,14 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta
- [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378)
+### CVE-2022-23731 (2022-03-11)
+
+
+V8 javascript engine (heap vulnerability) can cause privilege escalation ,which can impact on some webOS TV models.
+
+
+- [DavidBuchanan314/WAMpage](https://github.com/DavidBuchanan314/WAMpage)
+
### CVE-2022-23779 (2022-03-02)
@@ -3496,6 +3504,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
+- [corelight/CVE-2021-41773](https://github.com/corelight/CVE-2021-41773)
- [walnutsecurity/cve-2021-41773](https://github.com/walnutsecurity/cve-2021-41773)
- [Balgogan/CVE-2021-41773](https://github.com/Balgogan/CVE-2021-41773)
- [wolf1892/CVE-2021-41773](https://github.com/wolf1892/CVE-2021-41773)
@@ -5212,6 +5221,7 @@ A denial of service vulnerability exists when Microsoft Hyper-V on a host server
- [gerhart01/hyperv_local_dos_poc](https://github.com/gerhart01/hyperv_local_dos_poc)
+- [skasanagottu57gmailv/gerhart01](https://github.com/skasanagottu57gmailv/gerhart01)
### CVE-2020-0905 (2020-03-12)
@@ -16851,6 +16861,7 @@ Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows
- [4B5F5F4B/HyperV](https://github.com/4B5F5F4B/HyperV)
+- [belyakovvitagmailt/4B5F5F4Bp](https://github.com/belyakovvitagmailt/4B5F5F4Bp)
### CVE-2017-0100 (2017-03-16)