diff --git a/2009/CVE-2009-2698.json b/2009/CVE-2009-2698.json index 430e2db007..2fe4062871 100644 --- a/2009/CVE-2009-2698.json +++ b/2009/CVE-2009-2698.json @@ -13,17 +13,17 @@ "description": "CVE-2009-2698 compiled for CentOS 4.8", "fork": false, "created_at": "2018-02-16T16:17:24Z", - "updated_at": "2022-02-23T04:22:45Z", + "updated_at": "2022-03-19T14:43:34Z", "pushed_at": "2018-02-16T16:30:00Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0075.json b/2017/CVE-2017-0075.json index d0d2b6020a..76794a4c10 100644 --- a/2017/CVE-2017-0075.json +++ b/2017/CVE-2017-0075.json @@ -25,5 +25,32 @@ "forks": 16, "watchers": 35, "score": 0 + }, + { + "id": 471700783, + "name": "4B5F5F4Bp", + "full_name": "belyakovvitagmailt\/4B5F5F4Bp", + "owner": { + "login": "belyakovvitagmailt", + "id": 101933630, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101933630?v=4", + "html_url": "https:\/\/github.com\/belyakovvitagmailt" + }, + "html_url": "https:\/\/github.com\/belyakovvitagmailt\/4B5F5F4Bp", + "description": "PoC for CVE-2017-0075", + "fork": false, + "created_at": "2022-03-19T13:18:12Z", + "updated_at": "2022-03-19T13:18:12Z", + "pushed_at": "2022-03-19T13:18:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 67039b5777..87c8a5412c 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -523,17 +523,17 @@ "description": "OpenSSH 2.3 < 7.7 - Username Enumeration", "fork": false, "created_at": "2020-11-29T17:36:11Z", - "updated_at": "2022-03-11T12:11:07Z", + "updated_at": "2022-03-19T16:45:51Z", "pushed_at": "2020-11-29T17:48:55Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index d7adcbca39..4c607d3f9a 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -40,10 +40,10 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2022-03-18T08:39:43Z", + "updated_at": "2022-03-19T12:57:29Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 506, - "watchers_count": 506, + "stargazers_count": 507, + "watchers_count": 507, "forks_count": 114, "allow_forking": true, "is_template": false, @@ -63,7 +63,7 @@ ], "visibility": "public", "forks": 114, - "watchers": 506, + "watchers": 507, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-1821.json b/2019/CVE-2019-1821.json index bbec0bdfd7..3a5f56f439 100644 --- a/2019/CVE-2019-1821.json +++ b/2019/CVE-2019-1821.json @@ -13,11 +13,11 @@ "description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)", "fork": false, "created_at": "2019-05-21T12:42:54Z", - "updated_at": "2022-03-08T11:40:23Z", + "updated_at": "2022-03-19T15:41:44Z", "pushed_at": "2019-05-21T14:52:36Z", - "stargazers_count": 98, - "watchers_count": 98, - "forks_count": 53, + "stargazers_count": 99, + "watchers_count": 99, + "forks_count": 54, "allow_forking": true, "is_template": false, "topics": [ @@ -30,8 +30,8 @@ "rce" ], "visibility": "public", - "forks": 53, - "watchers": 98, + "forks": 54, + "watchers": 99, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 767b202b12..d628e12fa2 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -323,7 +323,7 @@ "fork": false, "created_at": "2022-02-28T02:34:31Z", "updated_at": "2022-02-28T16:22:18Z", - "pushed_at": "2022-02-28T03:54:44Z", + "pushed_at": "2022-03-19T14:07:35Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index 1dd04a91cd..a5242ae29f 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -130,12 +130,12 @@ "pushed_at": "2019-11-01T14:33:21Z", "stargazers_count": 132, "watchers_count": 132, - "forks_count": 60, + "forks_count": 61, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 60, + "forks": 61, "watchers": 132, "score": 0 }, diff --git a/2020/CVE-2020-0890.json b/2020/CVE-2020-0890.json index cd29a79aff..ac8aa1a67f 100644 --- a/2020/CVE-2020-0890.json +++ b/2020/CVE-2020-0890.json @@ -25,5 +25,32 @@ "forks": 9, "watchers": 32, "score": 0 + }, + { + "id": 471740268, + "name": "gerhart01", + "full_name": "skasanagottu57gmailv\/gerhart01", + "owner": { + "login": "skasanagottu57gmailv", + "id": 101940293, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101940293?v=4", + "html_url": "https:\/\/github.com\/skasanagottu57gmailv" + }, + "html_url": "https:\/\/github.com\/skasanagottu57gmailv\/gerhart01", + "description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code", + "fork": false, + "created_at": "2022-03-19T15:47:10Z", + "updated_at": "2022-03-19T15:47:10Z", + "pushed_at": "2022-03-19T15:47:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 0b4ef237e2..4041bb849a 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -121,10 +121,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2022-03-17T10:38:09Z", + "updated_at": "2022-03-19T13:38:14Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 922, - "watchers_count": 922, + "stargazers_count": 923, + "watchers_count": 923, "forks_count": 293, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 293, - "watchers": 922, + "watchers": 923, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 2e9c0d6c5b..0be99f388f 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -144,12 +144,12 @@ "pushed_at": "2021-02-25T16:05:02Z", "stargazers_count": 181, "watchers_count": 181, - "forks_count": 69, + "forks_count": 70, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 69, + "forks": 70, "watchers": 181, "score": 0 }, diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index cfe8a37ed2..54632dcb75 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -40,17 +40,17 @@ "description": null, "fork": false, "created_at": "2021-05-29T13:07:14Z", - "updated_at": "2022-03-11T11:54:11Z", + "updated_at": "2022-03-19T13:51:35Z", "pushed_at": "2022-01-16T04:17:08Z", - "stargazers_count": 192, - "watchers_count": 192, - "forks_count": 47, + "stargazers_count": 193, + "watchers_count": 193, + "forks_count": 48, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 47, - "watchers": 192, + "forks": 48, + "watchers": 193, "score": 0 }, { diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index 810f696f8d..2d028e7183 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -17,7 +17,7 @@ "pushed_at": "2021-05-20T21:42:43Z", "stargazers_count": 47, "watchers_count": 47, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [ @@ -25,7 +25,7 @@ "exiftool" ], "visibility": "public", - "forks": 16, + "forks": 17, "watchers": 47, "score": 0 }, diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 6f875bd34c..6b73109e09 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -94,17 +94,17 @@ "description": "Gitlab CE\/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205", "fork": false, "created_at": "2021-10-29T04:15:00Z", - "updated_at": "2022-03-11T04:47:52Z", + "updated_at": "2022-03-19T15:09:08Z", "pushed_at": "2021-11-04T02:17:54Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 6, + "watchers": 7, "score": 0 }, { diff --git a/2021/CVE-2021-22214.json b/2021/CVE-2021-22214.json index 266137b7a9..98a747e130 100644 --- a/2021/CVE-2021-22214.json +++ b/2021/CVE-2021-22214.json @@ -67,17 +67,17 @@ "description": "Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214", "fork": false, "created_at": "2021-11-01T04:04:42Z", - "updated_at": "2022-03-11T04:47:34Z", + "updated_at": "2022-03-19T15:09:12Z", "pushed_at": "2021-11-04T02:21:28Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 5be5ec2872..9ad19e44ba 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -121,10 +121,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2022-03-17T10:38:09Z", + "updated_at": "2022-03-19T13:38:14Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 922, - "watchers_count": 922, + "stargazers_count": 923, + "watchers_count": 923, "forks_count": 293, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 293, - "watchers": 922, + "watchers": 923, "score": 0 }, { diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 3966e6b1e9..c77c85f33c 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -202,17 +202,17 @@ "description": "POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.", "fork": false, "created_at": "2022-01-13T06:29:51Z", - "updated_at": "2022-03-11T04:47:30Z", + "updated_at": "2022-03-19T15:09:22Z", "pushed_at": "2022-01-14T04:21:27Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 1eab33e618..d139e32e53 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -1000,12 +1000,12 @@ "pushed_at": "2021-03-24T01:25:05Z", "stargazers_count": 39, "watchers_count": 39, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 13, + "forks": 14, "watchers": 39, "score": 0 }, diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json index 0385f43a70..79d35e5482 100644 --- a/2021/CVE-2021-30955.json +++ b/2021/CVE-2021-30955.json @@ -94,17 +94,17 @@ "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955", "fork": false, "created_at": "2022-03-01T12:41:03Z", - "updated_at": "2022-03-18T09:24:40Z", + "updated_at": "2022-03-19T17:24:44Z", "pushed_at": "2022-03-01T16:11:31Z", - "stargazers_count": 225, - "watchers_count": 225, - "forks_count": 38, + "stargazers_count": 226, + "watchers_count": 226, + "forks_count": 39, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 38, - "watchers": 225, + "forks": 39, + "watchers": 226, "score": 0 }, { @@ -179,12 +179,12 @@ "pushed_at": "2022-03-18T16:11:21Z", "stargazers_count": 12, "watchers_count": 12, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 12, "score": 0 } diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 529b49ce4b..ccc9e77c80 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -969,17 +969,17 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2022-03-17T04:13:40Z", + "updated_at": "2022-03-19T15:13:07Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 458, - "watchers_count": 458, + "stargazers_count": 459, + "watchers_count": 459, "forks_count": 124, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 124, - "watchers": 458, + "watchers": 459, "score": 0 }, { @@ -1401,17 +1401,17 @@ "description": "CVE-2021-3156", "fork": false, "created_at": "2022-03-18T00:05:48Z", - "updated_at": "2022-03-18T00:19:02Z", + "updated_at": "2022-03-19T12:58:55Z", "pushed_at": "2022-03-18T00:17:41Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json index e4ffb8e7ce..df9a9120f6 100644 --- a/2021/CVE-2021-3490.json +++ b/2021/CVE-2021-3490.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-06-24T18:50:17Z", - "updated_at": "2022-03-14T08:08:53Z", + "updated_at": "2022-03-19T17:56:08Z", "pushed_at": "2021-08-25T19:26:21Z", - "stargazers_count": 227, - "watchers_count": 227, + "stargazers_count": 229, + "watchers_count": 229, "forks_count": 47, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 47, - "watchers": 227, + "watchers": 229, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index f0394e8134..5e059afa91 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -184,17 +184,17 @@ "description": "Privilege escalation with polkit - CVE-2021-3560", "fork": false, "created_at": "2021-06-19T08:15:17Z", - "updated_at": "2022-03-18T21:39:10Z", + "updated_at": "2022-03-19T17:12:14Z", "pushed_at": "2021-06-20T07:38:13Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "forks_count": 29, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 29, - "watchers": 48, + "watchers": 49, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index a2e4e99eaf..9b6540c9f6 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -106,17 +106,17 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-03-18T18:39:35Z", + "updated_at": "2022-03-19T16:46:59Z", "pushed_at": "2022-01-30T14:22:23Z", - "stargazers_count": 1416, - "watchers_count": 1416, + "stargazers_count": 1417, + "watchers_count": 1417, "forks_count": 414, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 414, - "watchers": 1416, + "watchers": 1417, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 7b01f221d6..e6f8b98598 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -120,6 +120,33 @@ "watchers": 4, "score": 0 }, + { + "id": 414878778, + "name": "CVE-2021-41773", + "full_name": "corelight\/CVE-2021-41773", + "owner": { + "login": "corelight", + "id": 21672558, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", + "html_url": "https:\/\/github.com\/corelight" + }, + "html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773", + "description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)", + "fork": false, + "created_at": "2021-10-08T06:54:27Z", + "updated_at": "2021-10-28T05:48:41Z", + "pushed_at": "2021-10-28T05:55:41Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 + }, { "id": 420407065, "name": "cve-2021-41773", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 23a1eef3dc..c481a20b03 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-03-18T18:00:49Z", + "updated_at": "2022-03-19T16:21:06Z", "pushed_at": "2022-01-22T14:55:02Z", - "stargazers_count": 1274, - "watchers_count": 1274, + "stargazers_count": 1276, + "watchers_count": 1276, "forks_count": 347, "allow_forking": true, "is_template": false, @@ -922,7 +922,7 @@ ], "visibility": "public", "forks": 347, - "watchers": 1274, + "watchers": 1276, "score": 0 }, { @@ -1235,10 +1235,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-03-19T04:54:18Z", + "updated_at": "2022-03-19T12:42:48Z", "pushed_at": "2022-02-18T08:54:03Z", - "stargazers_count": 259, - "watchers_count": 259, + "stargazers_count": 260, + "watchers_count": 260, "forks_count": 63, "allow_forking": true, "is_template": false, @@ -1250,7 +1250,7 @@ ], "visibility": "public", "forks": 63, - "watchers": 259, + "watchers": 260, "score": 0 }, { @@ -3148,10 +3148,10 @@ "description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell", "fork": false, "created_at": "2021-12-12T21:45:33Z", - "updated_at": "2022-03-08T10:44:06Z", + "updated_at": "2022-03-19T16:17:33Z", "pushed_at": "2022-01-18T08:18:21Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 22, "allow_forking": true, "is_template": false, @@ -3164,7 +3164,7 @@ ], "visibility": "public", "forks": 22, - "watchers": 42, + "watchers": 43, "score": 0 }, { @@ -5214,10 +5214,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2022-03-19T06:26:17Z", + "updated_at": "2022-03-19T17:46:22Z", "pushed_at": "2021-12-27T15:12:20Z", - "stargazers_count": 269, - "watchers_count": 269, + "stargazers_count": 268, + "watchers_count": 268, "forks_count": 35, "allow_forking": true, "is_template": false, @@ -5230,7 +5230,7 @@ ], "visibility": "public", "forks": 35, - "watchers": 269, + "watchers": 268, "score": 0 }, { @@ -8395,17 +8395,17 @@ "description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ", "fork": false, "created_at": "2021-12-19T14:48:30Z", - "updated_at": "2022-03-10T09:20:49Z", + "updated_at": "2022-03-19T13:53:18Z", "pushed_at": "2021-12-22T15:56:21Z", - "stargazers_count": 70, - "watchers_count": 70, - "forks_count": 15, + "stargazers_count": 71, + "watchers_count": 71, + "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 15, - "watchers": 70, + "forks": 16, + "watchers": 71, "score": 0 }, { diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json index 2653a856f5..3a89721909 100644 --- a/2022/CVE-2022-0337.json +++ b/2022/CVE-2022-0337.json @@ -13,11 +13,11 @@ "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "fork": false, "created_at": "2022-03-19T08:10:46Z", - "updated_at": "2022-03-19T12:04:49Z", + "updated_at": "2022-03-19T18:03:11Z", "pushed_at": "2022-03-19T12:01:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, + "stargazers_count": 21, + "watchers_count": 21, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ @@ -38,8 +38,8 @@ "writeups" ], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 3, + "watchers": 21, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json index b3f1af9697..c96f546b00 100644 --- a/2022/CVE-2022-0492.json +++ b/2022/CVE-2022-0492.json @@ -13,17 +13,17 @@ "description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492", "fork": false, "created_at": "2022-02-28T01:25:26Z", - "updated_at": "2022-03-19T10:55:31Z", + "updated_at": "2022-03-19T16:50:15Z", "pushed_at": "2022-03-09T00:09:46Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, - "watchers": 36, + "watchers": 37, "score": 0 }, { diff --git a/2022/CVE-2022-0778.json b/2022/CVE-2022-0778.json index ef93afc943..d8d88f1d6c 100644 --- a/2022/CVE-2022-0778.json +++ b/2022/CVE-2022-0778.json @@ -13,17 +13,17 @@ "description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt", "fork": false, "created_at": "2022-03-15T19:06:33Z", - "updated_at": "2022-03-19T04:37:30Z", + "updated_at": "2022-03-19T17:53:52Z", "pushed_at": "2022-03-15T21:12:46Z", - "stargazers_count": 65, - "watchers_count": 65, - "forks_count": 19, + "stargazers_count": 75, + "watchers_count": 75, + "forks_count": 20, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 19, - "watchers": 65, + "forks": 20, + "watchers": 75, "score": 0 }, { diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index cfee9c1003..09b8ddde58 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -121,17 +121,17 @@ "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "fork": false, "created_at": "2022-03-07T18:55:20Z", - "updated_at": "2022-03-18T19:03:15Z", + "updated_at": "2022-03-19T16:02:48Z", "pushed_at": "2022-03-08T06:20:05Z", - "stargazers_count": 863, - "watchers_count": 863, + "stargazers_count": 865, + "watchers_count": 865, "forks_count": 175, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 175, - "watchers": 863, + "watchers": 865, "score": 0 }, { @@ -337,17 +337,17 @@ "description": "CVE-2022-0847 DirtyPipe Exploit.", "fork": false, "created_at": "2022-03-08T11:49:40Z", - "updated_at": "2022-03-17T16:08:55Z", + "updated_at": "2022-03-19T15:56:11Z", "pushed_at": "2022-03-08T11:52:22Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 13, - "watchers": 28, + "watchers": 29, "score": 0 }, { @@ -530,12 +530,12 @@ "pushed_at": "2022-03-18T09:32:30Z", "stargazers_count": 22, "watchers_count": 22, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 22, "score": 0 }, diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index 9ad9167be6..a5901b3748 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -87,17 +87,17 @@ "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "fork": false, "created_at": "2022-01-17T02:28:50Z", - "updated_at": "2022-03-18T08:24:49Z", + "updated_at": "2022-03-19T15:03:35Z", "pushed_at": "2022-01-20T02:07:59Z", - "stargazers_count": 352, - "watchers_count": 352, + "stargazers_count": 353, + "watchers_count": 353, "forks_count": 96, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 96, - "watchers": 352, + "watchers": 353, "score": 0 }, { diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json index 3da6b2a625..4f1c2aee9d 100644 --- a/2022/CVE-2022-21971.json +++ b/2022/CVE-2022-21971.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"", "fork": false, "created_at": "2022-02-26T20:37:42Z", - "updated_at": "2022-03-18T08:21:59Z", + "updated_at": "2022-03-19T17:24:02Z", "pushed_at": "2022-02-26T20:45:19Z", - "stargazers_count": 240, - "watchers_count": 240, + "stargazers_count": 242, + "watchers_count": 242, "forks_count": 48, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 48, - "watchers": 240, + "watchers": 242, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 8fbebc6692..85cd8581e0 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,11 +13,11 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-03-19T03:54:49Z", + "updated_at": "2022-03-19T13:28:53Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 502, - "watchers_count": 502, - "forks_count": 97, + "stargazers_count": 505, + "watchers_count": 505, + "forks_count": 98, "allow_forking": true, "is_template": false, "topics": [ @@ -25,8 +25,8 @@ "cve-2022-22718" ], "visibility": "public", - "forks": 97, - "watchers": 502, + "forks": 98, + "watchers": 505, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22536.json b/2022/CVE-2022-22536.json index ed5501e3d2..aed9bc5f83 100644 --- a/2022/CVE-2022-22536.json +++ b/2022/CVE-2022-22536.json @@ -13,17 +13,17 @@ "description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.", "fork": false, "created_at": "2022-02-15T09:22:19Z", - "updated_at": "2022-03-14T01:13:46Z", + "updated_at": "2022-03-19T15:09:57Z", "pushed_at": "2022-02-21T08:58:22Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 12, - "watchers": 35, + "watchers": 36, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22600.json b/2022/CVE-2022-22600.json index 4dcb9a3084..eb5a22e3b2 100644 --- a/2022/CVE-2022-22600.json +++ b/2022/CVE-2022-22600.json @@ -13,17 +13,17 @@ "description": "CVE-2022-22600 Proof of Concept", "fork": false, "created_at": "2021-12-22T05:03:29Z", - "updated_at": "2022-03-19T09:43:28Z", + "updated_at": "2022-03-19T14:10:04Z", "pushed_at": "2022-03-19T04:17:26Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 4, + "forks": 5, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23731.json b/2022/CVE-2022-23731.json new file mode 100644 index 0000000000..d64d1c8dcb --- /dev/null +++ b/2022/CVE-2022-23731.json @@ -0,0 +1,41 @@ +[ + { + "id": 441808910, + "name": "WAMpage", + "full_name": "DavidBuchanan314\/WAMpage", + "owner": { + "login": "DavidBuchanan314", + "id": 13520633, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13520633?v=4", + "html_url": "https:\/\/github.com\/DavidBuchanan314" + }, + "html_url": "https:\/\/github.com\/DavidBuchanan314\/WAMpage", + "description": "WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)", + "fork": false, + "created_at": "2021-12-26T04:29:09Z", + "updated_at": "2022-03-19T16:24:15Z", + "pushed_at": "2022-03-19T16:24:28Z", + "stargazers_count": 34, + "watchers_count": 34, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "topics": [ + "arm", + "cve-2022-23731", + "exploit", + "javascript", + "lg-webos", + "lg-webos-tv", + "lpe", + "python", + "v8", + "webos", + "webos-tv" + ], + "visibility": "public", + "forks": 4, + "watchers": 34, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json index e0c1e62e4e..cdf7d1299f 100644 --- a/2022/CVE-2022-25636.json +++ b/2022/CVE-2022-25636.json @@ -13,17 +13,17 @@ "description": "CVE-2022-25636", "fork": false, "created_at": "2022-03-07T13:38:41Z", - "updated_at": "2022-03-19T12:04:13Z", + "updated_at": "2022-03-19T17:01:07Z", "pushed_at": "2022-03-07T17:18:19Z", - "stargazers_count": 303, - "watchers_count": 303, + "stargazers_count": 308, + "watchers_count": 308, "forks_count": 61, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 61, - "watchers": 303, + "watchers": 308, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-25949.json b/2022/CVE-2022-25949.json index 8c76269dcb..efc85cca1c 100644 --- a/2022/CVE-2022-25949.json +++ b/2022/CVE-2022-25949.json @@ -13,17 +13,17 @@ "description": "A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.", "fork": false, "created_at": "2022-03-16T14:42:21Z", - "updated_at": "2022-03-18T16:34:46Z", + "updated_at": "2022-03-19T17:23:12Z", "pushed_at": "2022-03-16T19:51:30Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, - "watchers": 26, + "watchers": 27, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 3de963f14a..ba03869b93 100644 --- a/README.md +++ b/README.md @@ -458,6 +458,14 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta - [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378) +### CVE-2022-23731 (2022-03-11) + + +V8 javascript engine (heap vulnerability) can cause privilege escalation ,which can impact on some webOS TV models. + + +- [DavidBuchanan314/WAMpage](https://github.com/DavidBuchanan314/WAMpage) + ### CVE-2022-23779 (2022-03-02) @@ -3496,6 +3504,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773) - [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013) - [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773) +- [corelight/CVE-2021-41773](https://github.com/corelight/CVE-2021-41773) - [walnutsecurity/cve-2021-41773](https://github.com/walnutsecurity/cve-2021-41773) - [Balgogan/CVE-2021-41773](https://github.com/Balgogan/CVE-2021-41773) - [wolf1892/CVE-2021-41773](https://github.com/wolf1892/CVE-2021-41773) @@ -5212,6 +5221,7 @@ A denial of service vulnerability exists when Microsoft Hyper-V on a host server - [gerhart01/hyperv_local_dos_poc](https://github.com/gerhart01/hyperv_local_dos_poc) +- [skasanagottu57gmailv/gerhart01](https://github.com/skasanagottu57gmailv/gerhart01) ### CVE-2020-0905 (2020-03-12) @@ -16851,6 +16861,7 @@ Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows - [4B5F5F4B/HyperV](https://github.com/4B5F5F4B/HyperV) +- [belyakovvitagmailt/4B5F5F4Bp](https://github.com/belyakovvitagmailt/4B5F5F4Bp) ### CVE-2017-0100 (2017-03-16)