diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 5deb5eb63c..84ff8fd1a4 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -41,7 +41,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-14T11:40:01Z", + "updated_at": "2022-09-15T09:48:12Z", "pushed_at": "2022-07-17T12:41:46Z", "stargazers_count": 1506, "watchers_count": 1506, diff --git a/2015/CVE-2015-3306.json b/2015/CVE-2015-3306.json index 9a50304f7c..bc6e6472fe 100644 --- a/2015/CVE-2015-3306.json +++ b/2015/CVE-2015-3306.json @@ -73,7 +73,7 @@ "pushed_at": "2018-04-07T01:10:06Z", "stargazers_count": 97, "watchers_count": 97, - "forks_count": 48, + "forks_count": 49, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -86,7 +86,7 @@ "vulnerable-container" ], "visibility": "public", - "forks": 48, + "forks": 49, "watchers": 97, "score": 0 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 9f078674b0..9b9ede88de 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,7 +13,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-14T11:40:01Z", + "updated_at": "2022-09-15T09:48:12Z", "pushed_at": "2022-07-17T12:41:46Z", "stargazers_count": 1506, "watchers_count": 1506, diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index 023924deaf..cddeaaa3e6 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -444,10 +444,10 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-08-30T01:48:12Z", + "updated_at": "2022-09-15T10:16:45Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 354, - "watchers_count": 354, + "stargazers_count": 355, + "watchers_count": 355, "forks_count": 115, "allow_forking": true, "is_template": false, @@ -455,7 +455,7 @@ "topics": [], "visibility": "public", "forks": 115, - "watchers": 354, + "watchers": 355, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 5535be25a3..f37dbc166f 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -41,7 +41,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-14T11:40:01Z", + "updated_at": "2022-09-15T09:48:12Z", "pushed_at": "2022-07-17T12:41:46Z", "stargazers_count": 1506, "watchers_count": 1506, diff --git a/2018/CVE-2018-14463.json b/2018/CVE-2018-14463.json new file mode 100644 index 0000000000..85c4285edb --- /dev/null +++ b/2018/CVE-2018-14463.json @@ -0,0 +1,58 @@ +[ + { + "id": 536924455, + "name": "external_tcpdump_AOSP_10_r33_CVE-2018-14463", + "full_name": "nidhi7598\/external_tcpdump_AOSP_10_r33_CVE-2018-14463", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/external_tcpdump_AOSP_10_r33_CVE-2018-14463", + "description": null, + "fork": false, + "created_at": "2022-09-15T08:03:36Z", + "updated_at": "2022-09-15T08:46:41Z", + "pushed_at": "2022-09-15T08:47:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 536972325, + "name": "external_tcpdump-4.9.2_AOSP_10_r33_CVE-2018-14463", + "full_name": "nidhi7598\/external_tcpdump-4.9.2_AOSP_10_r33_CVE-2018-14463", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/external_tcpdump-4.9.2_AOSP_10_r33_CVE-2018-14463", + "description": null, + "fork": false, + "created_at": "2022-09-15T10:21:14Z", + "updated_at": "2022-09-15T10:26:25Z", + "pushed_at": "2022-09-15T10:26:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index 2fc2f63f80..f8d80a48d8 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -181,10 +181,10 @@ "description": "Laravel RCE exploit. CVE-2018-15133", "fork": false, "created_at": "2020-12-21T22:02:08Z", - "updated_at": "2022-09-06T06:40:58Z", + "updated_at": "2022-09-15T08:50:22Z", "pushed_at": "2022-03-22T17:56:41Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 10, "allow_forking": true, "is_template": false, @@ -192,7 +192,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 27, + "watchers": 28, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 20ac542dc6..21ce41a27f 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -549,7 +549,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-14T11:40:01Z", + "updated_at": "2022-09-15T09:48:12Z", "pushed_at": "2022-07-17T12:41:46Z", "stargazers_count": 1506, "watchers_count": 1506, diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json index da4256ff30..c791d6c766 100644 --- a/2019/CVE-2019-1405.json +++ b/2019/CVE-2019-1405.json @@ -13,10 +13,10 @@ "description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322", "fork": false, "created_at": "2019-11-13T16:34:03Z", - "updated_at": "2022-09-02T19:56:14Z", + "updated_at": "2022-09-15T09:40:12Z", "pushed_at": "2019-11-14T14:16:54Z", - "stargazers_count": 298, - "watchers_count": 298, + "stargazers_count": 299, + "watchers_count": 299, "forks_count": 75, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 75, - "watchers": 298, + "watchers": 299, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 65141cb40c..12cb2f6556 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -41,10 +41,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-09-14T10:12:42Z", + "updated_at": "2022-09-15T09:00:33Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3538, - "watchers_count": 3538, + "stargazers_count": 3539, + "watchers_count": 3539, "forks_count": 1038, "allow_forking": true, "is_template": false, @@ -72,7 +72,7 @@ ], "visibility": "public", "forks": 1038, - "watchers": 3538, + "watchers": 3539, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 65d08fe933..d1b5af3252 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -97,10 +97,10 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2022-09-10T07:17:19Z", + "updated_at": "2022-09-15T06:35:11Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 834, - "watchers_count": 834, + "stargazers_count": 835, + "watchers_count": 835, "forks_count": 173, "allow_forking": true, "is_template": false, @@ -108,7 +108,7 @@ "topics": [], "visibility": "public", "forks": 173, - "watchers": 834, + "watchers": 835, "score": 0 }, { @@ -181,7 +181,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-14T11:40:01Z", + "updated_at": "2022-09-15T09:48:12Z", "pushed_at": "2022-07-17T12:41:46Z", "stargazers_count": 1506, "watchers_count": 1506, diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 8fe3826a32..154440be33 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,10 +13,10 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-08-30T01:48:12Z", + "updated_at": "2022-09-15T10:16:45Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 354, - "watchers_count": 354, + "stargazers_count": 355, + "watchers_count": 355, "forks_count": 115, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 115, - "watchers": 354, + "watchers": 355, "score": 0 }, { diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index bf86397fdd..16607c18ba 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -17,13 +17,13 @@ "pushed_at": "2020-09-11T07:38:22Z", "stargazers_count": 636, "watchers_count": 636, - "forks_count": 166, + "forks_count": 167, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 166, + "forks": 167, "watchers": 636, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 07ca1b7846..51d1d1280c 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-09-14T10:12:42Z", + "updated_at": "2022-09-15T09:00:33Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3538, - "watchers_count": 3538, + "stargazers_count": 3539, + "watchers_count": 3539, "forks_count": 1038, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 1038, - "watchers": 3538, + "watchers": 3539, "score": 0 }, { diff --git a/2020/CVE-2020-1948.json b/2020/CVE-2020-1948.json index 9ab10d9c20..28f565e6f9 100644 --- a/2020/CVE-2020-1948.json +++ b/2020/CVE-2020-1948.json @@ -97,10 +97,10 @@ "description": "[CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE", "fork": false, "created_at": "2020-07-14T02:42:41Z", - "updated_at": "2022-04-14T08:25:21Z", + "updated_at": "2022-09-15T08:31:33Z", "pushed_at": "2022-09-09T18:13:30Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 5, "allow_forking": true, "is_template": false, @@ -108,7 +108,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 12, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index d7a2c83edc..728292f735 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,7 +13,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-09-14T11:40:01Z", + "updated_at": "2022-09-15T09:48:12Z", "pushed_at": "2022-07-17T12:41:46Z", "stargazers_count": 1506, "watchers_count": 1506, @@ -90,10 +90,10 @@ "description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP", "fork": false, "created_at": "2020-01-19T13:01:32Z", - "updated_at": "2022-09-14T07:03:38Z", + "updated_at": "2022-09-15T11:57:02Z", "pushed_at": "2021-12-18T20:52:39Z", - "stargazers_count": 190, - "watchers_count": 190, + "stargazers_count": 191, + "watchers_count": 191, "forks_count": 45, "allow_forking": true, "is_template": false, @@ -101,7 +101,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 190, + "watchers": 191, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 20213db980..9e607139a4 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -102,10 +102,10 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2022-09-14T08:33:55Z", + "updated_at": "2022-09-15T09:39:42Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 432, - "watchers_count": 432, + "stargazers_count": 433, + "watchers_count": 433, "forks_count": 61, "allow_forking": true, "is_template": false, @@ -113,7 +113,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 432, + "watchers": 433, "score": 0 }, { diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 290dc150fb..6f1df38920 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,10 +13,10 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2022-09-02T19:56:33Z", + "updated_at": "2022-09-15T10:24:53Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 388, - "watchers_count": 388, + "stargazers_count": 389, + "watchers_count": 389, "forks_count": 120, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 120, - "watchers": 388, + "watchers": 389, "score": 0 }, { diff --git a/2021/CVE-2021-1961.json b/2021/CVE-2021-1961.json index 7dcd602dcb..bde0d3b384 100644 --- a/2021/CVE-2021-1961.json +++ b/2021/CVE-2021-1961.json @@ -13,18 +13,18 @@ "description": "Exploit code for CVE-2021-1961", "fork": false, "created_at": "2022-09-03T13:31:13Z", - "updated_at": "2022-09-15T06:12:51Z", + "updated_at": "2022-09-15T12:07:14Z", "pushed_at": "2022-09-07T11:47:56Z", - "stargazers_count": 40, - "watchers_count": 40, - "forks_count": 3, + "stargazers_count": 51, + "watchers_count": 51, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 40, + "forks": 4, + "watchers": 51, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index b79551b1ab..ed455c8432 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -86,10 +86,10 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2022-09-14T06:46:45Z", + "updated_at": "2022-09-15T11:55:40Z", "pushed_at": "2021-12-30T12:26:11Z", - "stargazers_count": 404, - "watchers_count": 404, + "stargazers_count": 405, + "watchers_count": 405, "forks_count": 140, "allow_forking": true, "is_template": false, @@ -99,7 +99,7 @@ ], "visibility": "public", "forks": 140, - "watchers": 404, + "watchers": 405, "score": 0 }, { diff --git a/2021/CVE-2021-26708.json b/2021/CVE-2021-26708.json index b0adab8f16..7f811c134c 100644 --- a/2021/CVE-2021-26708.json +++ b/2021/CVE-2021-26708.json @@ -13,10 +13,10 @@ "description": "Investigating the bug behind CVE-2021-26708", "fork": false, "created_at": "2021-02-15T20:27:06Z", - "updated_at": "2022-05-14T00:28:52Z", + "updated_at": "2022-09-15T10:27:33Z", "pushed_at": "2021-02-16T03:03:54Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 23, + "watchers": 24, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 883c492b51..f4c6e119d0 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -752,10 +752,10 @@ "description": "Root shell PoC for CVE-2021-3156", "fork": false, "created_at": "2021-02-03T19:57:56Z", - "updated_at": "2022-08-21T18:49:38Z", + "updated_at": "2022-09-15T08:50:20Z", "pushed_at": "2022-02-13T12:21:53Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 111, + "watchers_count": 111, "forks_count": 44, "allow_forking": true, "is_template": false, @@ -763,7 +763,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 110, + "watchers": 111, "score": 0 }, { diff --git a/2021/CVE-2021-39174.json b/2021/CVE-2021-39174.json index d1bae0b7ba..414d6d7000 100644 --- a/2021/CVE-2021-39174.json +++ b/2021/CVE-2021-39174.json @@ -13,10 +13,10 @@ "description": "Cachet configuration leak dumper. CVE-2021-39174 PoC.", "fork": false, "created_at": "2022-05-03T20:17:23Z", - "updated_at": "2022-07-27T06:59:16Z", + "updated_at": "2022-09-15T10:16:40Z", "pushed_at": "2022-05-03T20:17:59Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index b306193151..781012c958 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -75,7 +75,7 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-09-12T23:36:37Z", + "updated_at": "2022-09-15T07:17:37Z", "pushed_at": "2022-06-08T04:00:28Z", "stargazers_count": 1643, "watchers_count": 1643, @@ -878,11 +878,11 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2022-09-15T03:37:57Z", + "updated_at": "2022-09-15T09:53:18Z", "pushed_at": "2022-06-21T14:52:05Z", - "stargazers_count": 614, - "watchers_count": 614, - "forks_count": 128, + "stargazers_count": 615, + "watchers_count": 615, + "forks_count": 129, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -890,8 +890,8 @@ "cve-2021-4034" ], "visibility": "public", - "forks": 128, - "watchers": 614, + "forks": 129, + "watchers": 615, "score": 0 }, { @@ -3241,10 +3241,10 @@ "description": "CVE-2021-4034 centos8可用版本", "fork": false, "created_at": "2022-02-15T02:34:48Z", - "updated_at": "2022-09-07T14:01:41Z", + "updated_at": "2022-09-15T09:34:13Z", "pushed_at": "2022-02-15T02:39:28Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -3252,7 +3252,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 13, + "watchers": 14, "score": 0 }, { diff --git a/2021/CVE-2021-40346.json b/2021/CVE-2021-40346.json index bfd3b65479..b6731f061f 100644 --- a/2021/CVE-2021-40346.json +++ b/2021/CVE-2021-40346.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2021-11-08T11:53:45Z", "updated_at": "2021-12-06T15:10:02Z", - "pushed_at": "2022-07-26T05:22:32Z", + "pushed_at": "2022-09-15T10:31:50Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 0, diff --git a/2021/CVE-2021-41073.json b/2021/CVE-2021-41073.json index 50efb241ee..f00a7a712c 100644 --- a/2021/CVE-2021-41073.json +++ b/2021/CVE-2021-41073.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-03-02T19:07:37Z", - "updated_at": "2022-09-09T11:42:03Z", + "updated_at": "2022-09-15T06:36:27Z", "pushed_at": "2022-03-08T15:37:34Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "forks_count": 17, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 80, + "watchers": 81, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 07f91c768c..03a63ad2ba 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -758,5 +758,173 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 536947281, + "name": "cve-2021-41773", + "full_name": "mightysai1997\/cve-2021-41773", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773", + "description": null, + "fork": false, + "created_at": "2022-09-15T09:08:58Z", + "updated_at": "2022-09-15T09:09:16Z", + "pushed_at": "2022-09-15T09:09:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 536953912, + "name": "CVE-2021-41773h", + "full_name": "mightysai1997\/CVE-2021-41773h", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773h", + "description": null, + "fork": false, + "created_at": "2022-09-15T09:27:04Z", + "updated_at": "2022-09-15T09:27:22Z", + "pushed_at": "2022-09-15T09:27:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 536957144, + "name": "cve-2021-41773-v-", + "full_name": "mightysai1997\/cve-2021-41773-v-", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773-v-", + "description": null, + "fork": false, + "created_at": "2022-09-15T09:36:17Z", + "updated_at": "2022-09-15T09:36:35Z", + "pushed_at": "2022-09-15T09:36:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 536957769, + "name": "CVE-2021-41773-i-", + "full_name": "mightysai1997\/CVE-2021-41773-i-", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-i-", + "description": null, + "fork": false, + "created_at": "2022-09-15T09:38:04Z", + "updated_at": "2022-09-15T09:38:16Z", + "pushed_at": "2022-09-15T09:38:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 536968315, + "name": "CVE-2021-41773-L-", + "full_name": "mightysai1997\/CVE-2021-41773-L-", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-L-", + "description": null, + "fork": false, + "created_at": "2022-09-15T10:08:36Z", + "updated_at": "2022-09-15T10:08:51Z", + "pushed_at": "2022-09-15T10:08:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 536985771, + "name": "CVE-2021-41773-PoC", + "full_name": "mightysai1997\/CVE-2021-41773-PoC", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-PoC", + "description": null, + "fork": false, + "created_at": "2022-09-15T11:01:45Z", + "updated_at": "2022-09-15T11:02:07Z", + "pushed_at": "2022-09-15T11:02:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index b386dd5469..9352f26407 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -356,5 +356,89 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 536994874, + "name": "cve-2021-42013", + "full_name": "mightysai1997\/cve-2021-42013", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013", + "description": null, + "fork": false, + "created_at": "2022-09-15T11:28:39Z", + "updated_at": "2022-09-15T11:28:51Z", + "pushed_at": "2022-09-15T11:28:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 536997164, + "name": "cve-2021-42013L", + "full_name": "mightysai1997\/cve-2021-42013L", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013L", + "description": null, + "fork": false, + "created_at": "2022-09-15T11:35:00Z", + "updated_at": "2022-09-15T11:35:00Z", + "pushed_at": "2022-09-15T11:35:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 537011231, + "name": "cve-2021-42013.get", + "full_name": "mightysai1997\/cve-2021-42013.get", + "owner": { + "login": "mightysai1997", + "id": 110396758, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", + "html_url": "https:\/\/github.com\/mightysai1997" + }, + "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013.get", + "description": null, + "fork": false, + "created_at": "2022-09-15T12:15:00Z", + "updated_at": "2022-09-15T12:15:18Z", + "pushed_at": "2022-09-15T12:15:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 06743b362b..89a148d744 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -426,11 +426,11 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-09-14T09:13:19Z", + "updated_at": "2022-09-15T06:22:34Z", "pushed_at": "2022-03-20T16:33:49Z", - "stargazers_count": 1470, - "watchers_count": 1470, - "forks_count": 406, + "stargazers_count": 1471, + "watchers_count": 1471, + "forks_count": 407, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -441,8 +441,8 @@ "security" ], "visibility": "public", - "forks": 406, - "watchers": 1470, + "forks": 407, + "watchers": 1471, "score": 0 }, { @@ -523,10 +523,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-09-12T17:06:28Z", + "updated_at": "2022-09-15T09:35:57Z", "pushed_at": "2022-08-31T05:56:13Z", - "stargazers_count": 506, - "watchers_count": 506, + "stargazers_count": 508, + "watchers_count": 508, "forks_count": 94, "allow_forking": true, "is_template": false, @@ -539,7 +539,7 @@ ], "visibility": "public", "forks": 94, - "watchers": 506, + "watchers": 508, "score": 0 }, { @@ -953,62 +953,6 @@ "watchers": 179, "score": 0 }, - { - "id": 437439106, - "name": "Log4Shell_CVE-2021-44228_related_attacks_IOCs", - "full_name": "RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs", - "owner": { - "login": "RedDrip7", - "id": 51360411, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51360411?v=4", - "html_url": "https:\/\/github.com\/RedDrip7" - }, - "html_url": "https:\/\/github.com\/RedDrip7\/Log4Shell_CVE-2021-44228_related_attacks_IOCs", - "description": null, - "fork": false, - "created_at": "2021-12-12T02:59:54Z", - "updated_at": "2022-02-18T16:03:05Z", - "pushed_at": "2021-12-15T10:19:51Z", - "stargazers_count": 44, - "watchers_count": 44, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 8, - "watchers": 44, - "score": 0 - }, - { - "id": 437451451, - "name": "vcenter-log4j", - "full_name": "blake-fm\/vcenter-log4j", - "owner": { - "login": "blake-fm", - "id": 89286531, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89286531?v=4", - "html_url": "https:\/\/github.com\/blake-fm" - }, - "html_url": "https:\/\/github.com\/blake-fm\/vcenter-log4j", - "description": "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228", - "fork": false, - "created_at": "2021-12-12T04:23:10Z", - "updated_at": "2022-08-17T05:28:16Z", - "pushed_at": "2021-12-15T12:17:19Z", - "stargazers_count": 16, - "watchers_count": 16, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 16, - "score": 0 - }, { "id": 437526168, "name": "Log4JShell-Bytecode-Detector", @@ -1539,13 +1483,13 @@ "pushed_at": "2022-01-07T14:25:33Z", "stargazers_count": 37, "watchers_count": 37, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 37, "score": 0 }, @@ -1563,10 +1507,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-09-14T01:29:36Z", + "updated_at": "2022-09-15T09:00:17Z", "pushed_at": "2022-09-11T03:55:38Z", - "stargazers_count": 3047, - "watchers_count": 3047, + "stargazers_count": 3048, + "watchers_count": 3048, "forks_count": 727, "allow_forking": true, "is_template": false, @@ -1574,7 +1518,7 @@ "topics": [], "visibility": "public", "forks": 727, - "watchers": 3047, + "watchers": 3048, "score": 0 }, { @@ -1745,34 +1689,6 @@ "watchers": 2, "score": 0 }, - { - "id": 437816961, - "name": "log4shell-spring-framework-research", - "full_name": "Camphul\/log4shell-spring-framework-research", - "owner": { - "login": "Camphul", - "id": 23475815, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23475815?v=4", - "html_url": "https:\/\/github.com\/Camphul" - }, - "html_url": "https:\/\/github.com\/Camphul\/log4shell-spring-framework-research", - "description": "Research into the implications of CVE-2021-44228 in Spring based applications.", - "fork": false, - "created_at": "2021-12-13T09:48:04Z", - "updated_at": "2021-12-15T10:33:35Z", - "pushed_at": "2021-12-15T10:33:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 437840280, "name": "Log4J-Scanner", @@ -2570,34 +2486,6 @@ "watchers": 1, "score": 0 }, - { - "id": 438406090, - "name": "CVE-2021-44228_PoC", - "full_name": "ab0x90\/CVE-2021-44228_PoC", - "owner": { - "login": "ab0x90", - "id": 36925640, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36925640?v=4", - "html_url": "https:\/\/github.com\/ab0x90" - }, - "html_url": "https:\/\/github.com\/ab0x90\/CVE-2021-44228_PoC", - "description": null, - "fork": false, - "created_at": "2021-12-14T21:32:42Z", - "updated_at": "2022-06-03T02:36:42Z", - "pushed_at": "2021-12-15T11:23:38Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 9, - "score": 0 - }, { "id": 438409343, "name": "log4j-remediation-tools", @@ -2892,37 +2780,6 @@ "watchers": 0, "score": 0 }, - { - "id": 438541418, - "name": "log4j-log4shell-playground", - "full_name": "rgl\/log4j-log4shell-playground", - "owner": { - "login": "rgl", - "id": 43356, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43356?v=4", - "html_url": "https:\/\/github.com\/rgl" - }, - "html_url": "https:\/\/github.com\/rgl\/log4j-log4shell-playground", - "description": "A playground for poking at the Log4Shell (CVE-2021-44228) vulnerability mitigations", - "fork": false, - "created_at": "2021-12-15T07:51:12Z", - "updated_at": "2021-12-16T11:59:53Z", - "pushed_at": "2021-12-15T08:44:16Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "log4j", - "log4shell" - ], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 438541504, "name": "how-to-check-patch-secure-log4j-CVE-2021-44228", @@ -3011,34 +2868,6 @@ "watchers": 7, "score": 0 }, - { - "id": 438600716, - "name": "logpresso-CVE-2021-44228-Scanner", - "full_name": "jyotisahu98\/logpresso-CVE-2021-44228-Scanner", - "owner": { - "login": "jyotisahu98", - "id": 96179721, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96179721?v=4", - "html_url": "https:\/\/github.com\/jyotisahu98" - }, - "html_url": "https:\/\/github.com\/jyotisahu98\/logpresso-CVE-2021-44228-Scanner", - "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", - "fork": false, - "created_at": "2021-12-15T11:15:25Z", - "updated_at": "2021-12-27T14:28:30Z", - "pushed_at": "2021-12-15T11:15:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 438605924, "name": "log4j-resources", @@ -3186,34 +3015,6 @@ "watchers": 0, "score": 0 }, - { - "id": 438680847, - "name": "jmeter-fix-cve-2021-44228-windows", - "full_name": "sebiboga\/jmeter-fix-cve-2021-44228-windows", - "owner": { - "login": "sebiboga", - "id": 41440889, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41440889?v=4", - "html_url": "https:\/\/github.com\/sebiboga" - }, - "html_url": "https:\/\/github.com\/sebiboga\/jmeter-fix-cve-2021-44228-windows", - "description": "fix cve 44228 for windows", - "fork": false, - "created_at": "2021-12-15T15:34:19Z", - "updated_at": "2021-12-15T15:50:19Z", - "pushed_at": "2021-12-15T15:51:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - }, { "id": 438683307, "name": "log4shell-cloud-scanner", diff --git a/2021/CVE-2021-45043.json b/2021/CVE-2021-45043.json deleted file mode 100644 index be4af030ea..0000000000 --- a/2021/CVE-2021-45043.json +++ /dev/null @@ -1,30 +0,0 @@ -[ - { - "id": 438670323, - "name": "cve-2021-45043", - "full_name": "crypt0g30rgy\/cve-2021-45043", - "owner": { - "login": "crypt0g30rgy", - "id": 72516596, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72516596?v=4", - "html_url": "https:\/\/github.com\/crypt0g30rgy" - }, - "html_url": "https:\/\/github.com\/crypt0g30rgy\/cve-2021-45043", - "description": "HD-Network Real-time Monitoring System 2.0 allows ..\/ directory traversal to read \/etc\/shadow via the \/language\/lang s_Language parameter.", - "fork": false, - "created_at": "2021-12-15T15:01:31Z", - "updated_at": "2021-12-16T10:22:56Z", - "pushed_at": "2021-12-15T15:07:00Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-45046.json b/2021/CVE-2021-45046.json index 02fc045f25..77b014a680 100644 --- a/2021/CVE-2021-45046.json +++ b/2021/CVE-2021-45046.json @@ -55,34 +55,6 @@ "watchers": 21, "score": 0 }, - { - "id": 438561965, - "name": "CVE-2021-45046-Info", - "full_name": "BobTheShoplifter\/CVE-2021-45046-Info", - "owner": { - "login": "BobTheShoplifter", - "id": 22559547, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22559547?v=4", - "html_url": "https:\/\/github.com\/BobTheShoplifter" - }, - "html_url": "https:\/\/github.com\/BobTheShoplifter\/CVE-2021-45046-Info", - "description": "Oh no another one", - "fork": false, - "created_at": "2021-12-15T09:01:37Z", - "updated_at": "2022-04-27T16:17:02Z", - "pushed_at": "2022-04-07T19:07:20Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0 - }, { "id": 438697866, "name": "CVE-2021-45046", diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 2b0fbff27b..2dd7da85a5 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -657,11 +657,11 @@ "description": "CVE-2022-0847", "fork": false, "created_at": "2022-03-09T02:47:08Z", - "updated_at": "2022-09-12T09:06:49Z", + "updated_at": "2022-09-15T07:14:09Z", "pushed_at": "2022-03-09T02:47:32Z", - "stargazers_count": 28, - "watchers_count": 28, - "forks_count": 10, + "stargazers_count": 29, + "watchers_count": 29, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -669,8 +669,8 @@ "cve-2022-0847" ], "visibility": "public", - "forks": 10, - "watchers": 28, + "forks": 11, + "watchers": 29, "score": 0 }, { diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index a46bc17a76..9cfde174a2 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -1139,10 +1139,10 @@ "description": "An Improved Proof of Concept for CVE-2022-1388 w\/ an Interactive Shell", "fork": false, "created_at": "2022-05-15T03:58:21Z", - "updated_at": "2022-08-24T09:57:21Z", + "updated_at": "2022-09-15T08:34:26Z", "pushed_at": "2022-05-15T16:34:54Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -1150,7 +1150,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 9, + "watchers": 10, "score": 0 }, { diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index d93b0759dc..4c5c3e828a 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -13,10 +13,10 @@ "description": "win32k LPE ", "fork": false, "created_at": "2022-01-27T03:44:10Z", - "updated_at": "2022-09-06T12:13:01Z", + "updated_at": "2022-09-15T10:01:30Z", "pushed_at": "2022-01-27T04:18:18Z", - "stargazers_count": 430, - "watchers_count": 430, + "stargazers_count": 431, + "watchers_count": 431, "forks_count": 136, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 136, - "watchers": 430, + "watchers": 431, "score": 0 }, { @@ -97,10 +97,10 @@ "description": "lpe poc for cve-2022-21882 ", "fork": false, "created_at": "2022-02-07T03:45:36Z", - "updated_at": "2022-09-02T20:48:05Z", + "updated_at": "2022-09-15T10:19:14Z", "pushed_at": "2022-02-07T03:49:37Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "forks_count": 16, "allow_forking": true, "is_template": false, @@ -112,7 +112,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 38, + "watchers": 39, "score": 0 }, { diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 55b872b15c..ea56b6ac53 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-09-12T03:08:10Z", + "updated_at": "2022-09-15T11:44:53Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 635, - "watchers_count": 635, + "stargazers_count": 636, + "watchers_count": 636, "forks_count": 134, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 134, - "watchers": 635, + "watchers": 636, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-25845.json b/2022/CVE-2022-25845.json index 41aaf5fae4..d6fe14d6a1 100644 --- a/2022/CVE-2022-25845.json +++ b/2022/CVE-2022-25845.json @@ -62,13 +62,13 @@ "pushed_at": "2022-09-02T11:00:28Z", "stargazers_count": 51, "watchers_count": 51, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 51, "score": 0 } diff --git a/2022/CVE-2022-2639.json b/2022/CVE-2022-2639.json index 06db9ee2d6..ddc09e64f9 100644 --- a/2022/CVE-2022-2639.json +++ b/2022/CVE-2022-2639.json @@ -17,13 +17,13 @@ "pushed_at": "2022-09-05T14:25:17Z", "stargazers_count": 46, "watchers_count": 46, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 46, "score": 0 } diff --git a/2022/CVE-2022-26923.json b/2022/CVE-2022-26923.json index 9f9727e3a8..198121f98e 100644 --- a/2022/CVE-2022-26923.json +++ b/2022/CVE-2022-26923.json @@ -69,10 +69,10 @@ "description": "A powershell poc to load and automatically run Certify and Rubeus from memory.", "fork": false, "created_at": "2022-08-17T21:13:49Z", - "updated_at": "2022-09-10T20:30:20Z", + "updated_at": "2022-09-15T09:41:30Z", "pushed_at": "2022-08-17T21:25:20Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -80,7 +80,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29154.json b/2022/CVE-2022-29154.json index ef72e2ab20..51058e6475 100644 --- a/2022/CVE-2022-29154.json +++ b/2022/CVE-2022-29154.json @@ -13,10 +13,10 @@ "description": "HIP2022 presentation materials.", "fork": false, "created_at": "2022-09-14T13:59:21Z", - "updated_at": "2022-09-15T02:03:30Z", + "updated_at": "2022-09-15T08:07:17Z", "pushed_at": "2022-09-14T14:19:43Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29856.json b/2022/CVE-2022-29856.json new file mode 100644 index 0000000000..8ad1378393 --- /dev/null +++ b/2022/CVE-2022-29856.json @@ -0,0 +1,30 @@ +[ + { + "id": 536933243, + "name": "CVE-2022-29856-PoC", + "full_name": "Flo451\/CVE-2022-29856-PoC", + "owner": { + "login": "Flo451", + "id": 79860728, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79860728?v=4", + "html_url": "https:\/\/github.com\/Flo451" + }, + "html_url": "https:\/\/github.com\/Flo451\/CVE-2022-29856-PoC", + "description": "Minimal PoC for CVE-2022-29856", + "fork": false, + "created_at": "2022-09-15T08:29:15Z", + "updated_at": "2022-09-15T08:33:56Z", + "pushed_at": "2022-09-15T08:32:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30781.json b/2022/CVE-2022-30781.json index e5f83a429c..3899c8e770 100644 --- a/2022/CVE-2022-30781.json +++ b/2022/CVE-2022-30781.json @@ -13,10 +13,10 @@ "description": "🍵 Gitea repository migration remote command execution exploit.", "fork": false, "created_at": "2022-05-22T05:15:58Z", - "updated_at": "2022-08-10T07:46:55Z", + "updated_at": "2022-09-15T06:35:46Z", "pushed_at": "2022-05-26T11:32:21Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 70, + "watchers": 71, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-31101.json b/2022/CVE-2022-31101.json index a76495353f..cecbd376e5 100644 --- a/2022/CVE-2022-31101.json +++ b/2022/CVE-2022-31101.json @@ -13,11 +13,11 @@ "description": "Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)", "fork": false, "created_at": "2022-08-09T10:29:48Z", - "updated_at": "2022-09-02T01:35:01Z", + "updated_at": "2022-09-15T07:52:25Z", "pushed_at": "2022-08-09T14:55:35Z", - "stargazers_count": 22, - "watchers_count": 22, - "forks_count": 7, + "stargazers_count": 23, + "watchers_count": 23, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,8 +28,8 @@ "prestashop" ], "visibility": "public", - "forks": 7, - "watchers": 22, + "forks": 8, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-37201.json b/2022/CVE-2022-37201.json new file mode 100644 index 0000000000..f22668426b --- /dev/null +++ b/2022/CVE-2022-37201.json @@ -0,0 +1,30 @@ +[ + { + "id": 536951837, + "name": "CVE-2022-37201", + "full_name": "AgainstTheLight\/CVE-2022-37201", + "owner": { + "login": "AgainstTheLight", + "id": 108649390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108649390?v=4", + "html_url": "https:\/\/github.com\/AgainstTheLight" + }, + "html_url": "https:\/\/github.com\/AgainstTheLight\/CVE-2022-37201", + "description": "CVE-2022-37201 POC", + "fork": false, + "created_at": "2022-09-15T09:21:30Z", + "updated_at": "2022-09-15T09:21:30Z", + "pushed_at": "2022-09-15T09:23:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37202.json b/2022/CVE-2022-37202.json new file mode 100644 index 0000000000..6eeb3ed340 --- /dev/null +++ b/2022/CVE-2022-37202.json @@ -0,0 +1,30 @@ +[ + { + "id": 536954849, + "name": "CVE-2022-37202", + "full_name": "AgainstTheLight\/CVE-2022-37202", + "owner": { + "login": "AgainstTheLight", + "id": 108649390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108649390?v=4", + "html_url": "https:\/\/github.com\/AgainstTheLight" + }, + "html_url": "https:\/\/github.com\/AgainstTheLight\/CVE-2022-37202", + "description": "CVE-2022-37202 POC", + "fork": false, + "created_at": "2022-09-15T09:29:39Z", + "updated_at": "2022-09-15T09:29:39Z", + "pushed_at": "2022-09-15T09:31:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37203.json b/2022/CVE-2022-37203.json new file mode 100644 index 0000000000..cd7283ab8a --- /dev/null +++ b/2022/CVE-2022-37203.json @@ -0,0 +1,30 @@ +[ + { + "id": 536958064, + "name": "CVE-2022-37203", + "full_name": "AgainstTheLight\/CVE-2022-37203", + "owner": { + "login": "AgainstTheLight", + "id": 108649390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108649390?v=4", + "html_url": "https:\/\/github.com\/AgainstTheLight" + }, + "html_url": "https:\/\/github.com\/AgainstTheLight\/CVE-2022-37203", + "description": "CVE-2022-37203 POC", + "fork": false, + "created_at": "2022-09-15T09:38:52Z", + "updated_at": "2022-09-15T09:38:52Z", + "pushed_at": "2022-09-15T09:40:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37204.json b/2022/CVE-2022-37204.json new file mode 100644 index 0000000000..13b7a6a16d --- /dev/null +++ b/2022/CVE-2022-37204.json @@ -0,0 +1,30 @@ +[ + { + "id": 536959702, + "name": "CVE-2022-37204", + "full_name": "AgainstTheLight\/CVE-2022-37204", + "owner": { + "login": "AgainstTheLight", + "id": 108649390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108649390?v=4", + "html_url": "https:\/\/github.com\/AgainstTheLight" + }, + "html_url": "https:\/\/github.com\/AgainstTheLight\/CVE-2022-37204", + "description": "CVE-2022-37204 POC", + "fork": false, + "created_at": "2022-09-15T09:43:39Z", + "updated_at": "2022-09-15T09:43:39Z", + "pushed_at": "2022-09-15T09:44:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37205.json b/2022/CVE-2022-37205.json new file mode 100644 index 0000000000..134247ea45 --- /dev/null +++ b/2022/CVE-2022-37205.json @@ -0,0 +1,30 @@ +[ + { + "id": 536960585, + "name": "CVE-2022-37205", + "full_name": "AgainstTheLight\/CVE-2022-37205", + "owner": { + "login": "AgainstTheLight", + "id": 108649390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108649390?v=4", + "html_url": "https:\/\/github.com\/AgainstTheLight" + }, + "html_url": "https:\/\/github.com\/AgainstTheLight\/CVE-2022-37205", + "description": "CVE-2022-37205 POC", + "fork": false, + "created_at": "2022-09-15T09:46:06Z", + "updated_at": "2022-09-15T09:46:06Z", + "pushed_at": "2022-09-15T09:46:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37206.json b/2022/CVE-2022-37206.json new file mode 100644 index 0000000000..b836fcb6c2 --- /dev/null +++ b/2022/CVE-2022-37206.json @@ -0,0 +1,30 @@ +[ + { + "id": 536961405, + "name": "CVE-2022-37206", + "full_name": "AgainstTheLight\/CVE-2022-37206", + "owner": { + "login": "AgainstTheLight", + "id": 108649390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108649390?v=4", + "html_url": "https:\/\/github.com\/AgainstTheLight" + }, + "html_url": "https:\/\/github.com\/AgainstTheLight\/CVE-2022-37206", + "description": "CVE-2022-37206 POC", + "fork": false, + "created_at": "2022-09-15T09:48:18Z", + "updated_at": "2022-09-15T09:48:18Z", + "pushed_at": "2022-09-15T09:49:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37207.json b/2022/CVE-2022-37207.json new file mode 100644 index 0000000000..172e68bf1c --- /dev/null +++ b/2022/CVE-2022-37207.json @@ -0,0 +1,30 @@ +[ + { + "id": 536963041, + "name": "CVE-2022-37207", + "full_name": "AgainstTheLight\/CVE-2022-37207", + "owner": { + "login": "AgainstTheLight", + "id": 108649390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108649390?v=4", + "html_url": "https:\/\/github.com\/AgainstTheLight" + }, + "html_url": "https:\/\/github.com\/AgainstTheLight\/CVE-2022-37207", + "description": "CVE-2022-37207 POC", + "fork": false, + "created_at": "2022-09-15T09:53:06Z", + "updated_at": "2022-09-15T09:53:06Z", + "pushed_at": "2022-09-15T09:54:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37208.json b/2022/CVE-2022-37208.json new file mode 100644 index 0000000000..79615cf821 --- /dev/null +++ b/2022/CVE-2022-37208.json @@ -0,0 +1,30 @@ +[ + { + "id": 536963955, + "name": "CVE-2022-37208", + "full_name": "AgainstTheLight\/CVE-2022-37208", + "owner": { + "login": "AgainstTheLight", + "id": 108649390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108649390?v=4", + "html_url": "https:\/\/github.com\/AgainstTheLight" + }, + "html_url": "https:\/\/github.com\/AgainstTheLight\/CVE-2022-37208", + "description": "CVE-2022-37208", + "fork": false, + "created_at": "2022-09-15T09:55:49Z", + "updated_at": "2022-09-15T09:57:01Z", + "pushed_at": "2022-09-15T09:56:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37706.json b/2022/CVE-2022-37706.json index a119df5f84..ba17141b14 100644 --- a/2022/CVE-2022-37706.json +++ b/2022/CVE-2022-37706.json @@ -13,10 +13,10 @@ "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "fork": false, "created_at": "2022-09-12T19:22:44Z", - "updated_at": "2022-09-15T05:58:47Z", + "updated_at": "2022-09-15T12:14:30Z", "pushed_at": "2022-09-14T07:45:40Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 74, + "watchers_count": 74, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 54, + "watchers": 74, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-40297.json b/2022/CVE-2022-40297.json index d1509f40d3..4e042a0e92 100644 --- a/2022/CVE-2022-40297.json +++ b/2022/CVE-2022-40297.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-09-04T13:05:58Z", "updated_at": "2022-09-09T12:30:44Z", - "pushed_at": "2022-09-09T12:29:46Z", + "pushed_at": "2022-09-15T09:34:35Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, diff --git a/README.md b/README.md index 0b98c6ad5d..1ce823ab7f 100644 --- a/README.md +++ b/README.md @@ -2679,6 +2679,14 @@ An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to - [TyeYeah/DIR-890L-1.20-RCE](https://github.com/TyeYeah/DIR-890L-1.20-RCE) +### CVE-2022-29856 (2022-04-29) + +<code> +A hardcoded cryptographic key in Automation360 22 allows an attacker to decrypt exported RPA packages. +</code> + +- [Flo451/CVE-2022-29856-PoC](https://github.com/Flo451/CVE-2022-29856-PoC) + ### CVE-2022-29885 (2022-05-12) <code> @@ -3497,6 +3505,30 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit - [JC175/CVE-2022-37177](https://github.com/JC175/CVE-2022-37177) +### CVE-2022-37201 +- [AgainstTheLight/CVE-2022-37201](https://github.com/AgainstTheLight/CVE-2022-37201) + +### CVE-2022-37202 +- [AgainstTheLight/CVE-2022-37202](https://github.com/AgainstTheLight/CVE-2022-37202) + +### CVE-2022-37203 +- [AgainstTheLight/CVE-2022-37203](https://github.com/AgainstTheLight/CVE-2022-37203) + +### CVE-2022-37204 +- [AgainstTheLight/CVE-2022-37204](https://github.com/AgainstTheLight/CVE-2022-37204) + +### CVE-2022-37205 +- [AgainstTheLight/CVE-2022-37205](https://github.com/AgainstTheLight/CVE-2022-37205) + +### CVE-2022-37206 +- [AgainstTheLight/CVE-2022-37206](https://github.com/AgainstTheLight/CVE-2022-37206) + +### CVE-2022-37207 +- [AgainstTheLight/CVE-2022-37207](https://github.com/AgainstTheLight/CVE-2022-37207) + +### CVE-2022-37208 +- [AgainstTheLight/CVE-2022-37208](https://github.com/AgainstTheLight/CVE-2022-37208) + ### CVE-2022-37434 (2022-08-05) <code> @@ -3519,7 +3551,12 @@ In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUI ### CVE-2022-38766 - [AUTOCRYPT-IVS-VnV/CVE-2022-38766](https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766) -### CVE-2022-38789 +### CVE-2022-38789 (-) + +<code> +An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference. +</code> + - [ProxyStaffy/Airties-CVE-2022-38789](https://github.com/ProxyStaffy/Airties-CVE-2022-38789) ### CVE-2022-39196 (2022-09-04) @@ -7040,6 +7077,12 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [pwn3z/CVE-2021-41773-Apache-RCE](https://github.com/pwn3z/CVE-2021-41773-Apache-RCE) - [EkamSinghWalia/Mitigation-Apache-CVE-2021-41773-](https://github.com/EkamSinghWalia/Mitigation-Apache-CVE-2021-41773-) - [Plunder283/CVE-2021-41773](https://github.com/Plunder283/CVE-2021-41773) +- [mightysai1997/cve-2021-41773](https://github.com/mightysai1997/cve-2021-41773) +- [mightysai1997/CVE-2021-41773h](https://github.com/mightysai1997/CVE-2021-41773h) +- [mightysai1997/cve-2021-41773-v-](https://github.com/mightysai1997/cve-2021-41773-v-) +- [mightysai1997/CVE-2021-41773-i-](https://github.com/mightysai1997/CVE-2021-41773-i-) +- [mightysai1997/CVE-2021-41773-L-](https://github.com/mightysai1997/CVE-2021-41773-L-) +- [mightysai1997/CVE-2021-41773-PoC](https://github.com/mightysai1997/CVE-2021-41773-PoC) ### CVE-2021-41946 (2022-05-18) @@ -7083,6 +7126,9 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in - [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013) - [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013) - [theykillmeslowly/CVE-2021-42013](https://github.com/theykillmeslowly/CVE-2021-42013) +- [mightysai1997/cve-2021-42013](https://github.com/mightysai1997/cve-2021-42013) +- [mightysai1997/cve-2021-42013L](https://github.com/mightysai1997/cve-2021-42013L) +- [mightysai1997/cve-2021-42013.get](https://github.com/mightysai1997/cve-2021-42013.get) ### CVE-2021-42056 (2022-06-24) @@ -7579,8 +7625,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [mergebase/log4j-detector](https://github.com/mergebase/log4j-detector) - [corretto/hotpatch-for-apache-log4j2](https://github.com/corretto/hotpatch-for-apache-log4j2) - [alexandre-lavoie/python-log4rce](https://github.com/alexandre-lavoie/python-log4rce) -- [RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs) -- [blake-fm/vcenter-log4j](https://github.com/blake-fm/vcenter-log4j) - [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector) - [dtact/divd-2021-00038--log4j-scanner](https://github.com/dtact/divd-2021-00038--log4j-scanner) - [Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228](https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228) @@ -7606,7 +7650,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832) - [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228) - [avwolferen/Sitecore.Solr-log4j-mitigation](https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation) -- [Camphul/log4shell-spring-framework-research](https://github.com/Camphul/log4shell-spring-framework-research) - [0xDexter0us/Log4J-Scanner](https://github.com/0xDexter0us/Log4J-Scanner) - [LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228](https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228) - [0xsyr0/Log4Shell](https://github.com/0xsyr0/Log4Shell) @@ -7633,7 +7676,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [BinaryDefense/log4j-honeypot-flask](https://github.com/BinaryDefense/log4j-honeypot-flask) - [MalwareTech/Log4jTools](https://github.com/MalwareTech/Log4jTools) - [guerzon/log4shellpoc](https://github.com/guerzon/log4shellpoc) -- [ab0x90/CVE-2021-44228_PoC](https://github.com/ab0x90/CVE-2021-44228_PoC) - [stripe/log4j-remediation-tools](https://github.com/stripe/log4j-remediation-tools) - [razz0r/CVE-2021-44228-Mass-RCE](https://github.com/razz0r/CVE-2021-44228-Mass-RCE) - [xsultan/log4jshield](https://github.com/xsultan/log4jshield) @@ -7643,17 +7685,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [jeremyrsellars/CVE-2021-44228_scanner](https://github.com/jeremyrsellars/CVE-2021-44228_scanner) - [JustinDPerkins/C1-WS-LOG4SHELL](https://github.com/JustinDPerkins/C1-WS-LOG4SHELL) - [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul) -- [rgl/log4j-log4shell-playground](https://github.com/rgl/log4j-log4shell-playground) - [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228) - [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1) - [kubearmor/log4j-CVE-2021-44228](https://github.com/kubearmor/log4j-CVE-2021-44228) -- [jyotisahu98/logpresso-CVE-2021-44228-Scanner](https://github.com/jyotisahu98/logpresso-CVE-2021-44228-Scanner) - [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources) - [redhuntlabs/Log4JHunt](https://github.com/redhuntlabs/Log4JHunt) - [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect) - [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228) - [MeterianHQ/log4j-vuln-coverage-check](https://github.com/MeterianHQ/log4j-vuln-coverage-check) -- [sebiboga/jmeter-fix-cve-2021-44228-windows](https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows) - [mitiga/log4shell-cloud-scanner](https://github.com/mitiga/log4shell-cloud-scanner) - [isuruwa/Log4j](https://github.com/isuruwa/Log4j) - [honeynet/log4shell-data](https://github.com/honeynet/log4shell-data) @@ -7944,14 +7983,6 @@ SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection v - [manuelz120/CVE-2021-45041](https://github.com/manuelz120/CVE-2021-45041) -### CVE-2021-45043 (2021-12-15) - -<code> -HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter. -</code> - -- [crypt0g30rgy/cve-2021-45043](https://github.com/crypt0g30rgy/cve-2021-45043) - ### CVE-2021-45046 (2021-12-14) <code> @@ -7960,7 +7991,6 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i - [X1pe0/Log4J-Scan-Win](https://github.com/X1pe0/Log4J-Scan-Win) - [cckuailong/Log4j_CVE-2021-45046](https://github.com/cckuailong/Log4j_CVE-2021-45046) -- [BobTheShoplifter/CVE-2021-45046-Info](https://github.com/BobTheShoplifter/CVE-2021-45046-Info) - [tejas-nagchandi/CVE-2021-45046](https://github.com/tejas-nagchandi/CVE-2021-45046) - [pravin-pp/log4j2-CVE-2021-45046](https://github.com/pravin-pp/log4j2-CVE-2021-45046) - [mergebase/log4j-samples](https://github.com/mergebase/log4j-samples) @@ -20048,6 +20078,15 @@ Foxit Reader before 9.2 and PhantomPDF before 9.2 have a Use-After-Free that lea - [payatu/CVE-2018-14442](https://github.com/payatu/CVE-2018-14442) - [sharmasandeepkr/PS-2018-002---CVE-2018-14442](https://github.com/sharmasandeepkr/PS-2018-002---CVE-2018-14442) +### CVE-2018-14463 (2019-10-03) + +<code> +The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167. +</code> + +- [nidhi7598/external_tcpdump_AOSP_10_r33_CVE-2018-14463](https://github.com/nidhi7598/external_tcpdump_AOSP_10_r33_CVE-2018-14463) +- [nidhi7598/external_tcpdump-4.9.2_AOSP_10_r33_CVE-2018-14463](https://github.com/nidhi7598/external_tcpdump-4.9.2_AOSP_10_r33_CVE-2018-14463) + ### CVE-2018-14634 (2018-09-25) <code>