diff --git a/2016/CVE-2016-9920.json b/2016/CVE-2016-9920.json index c18e2fb39f..bde08e4468 100644 --- a/2016/CVE-2016-9920.json +++ b/2016/CVE-2016-9920.json @@ -13,10 +13,10 @@ "description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-06T17:55:44Z", - "updated_at": "2022-02-27T13:21:49Z", + "updated_at": "2022-03-24T08:20:14Z", "pushed_at": "2017-01-06T23:34:03Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 17, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 41, + "watchers": 42, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 08a0eb7044..99265f5693 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -371,17 +371,17 @@ "description": "PoC for CVE-2018-0802 And CVE-2017-11882", "fork": false, "created_at": "2018-01-12T11:38:33Z", - "updated_at": "2022-01-27T22:03:12Z", + "updated_at": "2022-03-24T08:52:33Z", "pushed_at": "2018-01-12T11:42:29Z", - "stargazers_count": 162, - "watchers_count": 162, - "forks_count": 64, + "stargazers_count": 163, + "watchers_count": 163, + "forks_count": 65, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 64, - "watchers": 162, + "forks": 65, + "watchers": 163, "score": 0 }, { diff --git a/2017/CVE-2017-8890.json b/2017/CVE-2017-8890.json index 22661553ba..0d5f3634d9 100644 --- a/2017/CVE-2017-8890.json +++ b/2017/CVE-2017-8890.json @@ -17,12 +17,12 @@ "pushed_at": "2018-08-25T16:09:21Z", "stargazers_count": 22, "watchers_count": 22, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 22, "score": 0 }, diff --git a/2017/CVE-2017-9841.json b/2017/CVE-2017-9841.json index 14114fa933..a035820319 100644 --- a/2017/CVE-2017-9841.json +++ b/2017/CVE-2017-9841.json @@ -159,14 +159,14 @@ "pushed_at": "2022-03-20T07:35:11Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve-2017-9841" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2018/CVE-2018-0802.json b/2018/CVE-2018-0802.json index af42af97a8..2514f31a50 100644 --- a/2018/CVE-2018-0802.json +++ b/2018/CVE-2018-0802.json @@ -67,17 +67,17 @@ "description": "PoC for CVE-2018-0802 And CVE-2017-11882", "fork": false, "created_at": "2018-01-12T11:38:33Z", - "updated_at": "2022-01-27T22:03:12Z", + "updated_at": "2022-03-24T08:52:33Z", "pushed_at": "2018-01-12T11:42:29Z", - "stargazers_count": 162, - "watchers_count": 162, - "forks_count": 64, + "stargazers_count": 163, + "watchers_count": 163, + "forks_count": 65, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 64, - "watchers": 162, + "forks": 65, + "watchers": 163, "score": 0 }, { diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 77b333a796..0da1cdfa9e 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -17,12 +17,12 @@ "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 462, "watchers_count": 462, - "forks_count": 451, + "forks_count": 453, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 451, + "forks": 453, "watchers": 462, "score": 0 }, diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index c161837401..0726ce60aa 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -523,17 +523,17 @@ "description": "OpenSSH 2.3 < 7.7 - Username Enumeration", "fork": false, "created_at": "2020-11-29T17:36:11Z", - "updated_at": "2022-03-19T16:45:51Z", + "updated_at": "2022-03-24T10:44:09Z", "pushed_at": "2020-11-29T17:48:55Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 10, + "watchers": 11, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index fe6768b9c0..db0656d8f6 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -40,10 +40,10 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2022-03-22T11:16:55Z", + "updated_at": "2022-03-24T06:44:32Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 523, - "watchers_count": 523, + "stargazers_count": 524, + "watchers_count": 524, "forks_count": 117, "allow_forking": true, "is_template": false, @@ -63,7 +63,7 @@ ], "visibility": "public", "forks": 117, - "watchers": 523, + "watchers": 524, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6574.json b/2018/CVE-2018-6574.json index 88145ca501..68bdcbdd96 100644 --- a/2018/CVE-2018-6574.json +++ b/2018/CVE-2018-6574.json @@ -1834,5 +1834,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 473521612, + "name": "CVE-2018-6574", + "full_name": "the-valluvarsploit\/CVE-2018-6574", + "owner": { + "login": "the-valluvarsploit", + "id": 94351646, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94351646?v=4", + "html_url": "https:\/\/github.com\/the-valluvarsploit" + }, + "html_url": "https:\/\/github.com\/the-valluvarsploit\/CVE-2018-6574", + "description": null, + "fork": false, + "created_at": "2022-03-24T08:40:42Z", + "updated_at": "2022-03-24T08:41:39Z", + "pushed_at": "2022-03-24T08:41:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-12815.json b/2019/CVE-2019-12815.json index 2539a0ff2a..d8c660dddd 100644 --- a/2019/CVE-2019-12815.json +++ b/2019/CVE-2019-12815.json @@ -13,17 +13,17 @@ "description": "ProFTPd mod_copy - arbitrary file copy without authentication", "fork": false, "created_at": "2019-07-27T21:26:06Z", - "updated_at": "2022-01-04T07:03:52Z", + "updated_at": "2022-03-24T10:50:19Z", "pushed_at": "2019-09-24T02:06:40Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index e74eeaf48e..02af82586b 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -13,17 +13,17 @@ "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", - "updated_at": "2022-03-24T05:45:55Z", + "updated_at": "2022-03-24T06:52:30Z", "pushed_at": "2019-08-01T16:02:59Z", - "stargazers_count": 275, - "watchers_count": 275, + "stargazers_count": 276, + "watchers_count": 276, "forks_count": 107, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 107, - "watchers": 275, + "watchers": 276, "score": 0 }, { diff --git a/2019/CVE-2019-16278.json b/2019/CVE-2019-16278.json index e4f98fff08..7dcc1d650e 100644 --- a/2019/CVE-2019-16278.json +++ b/2019/CVE-2019-16278.json @@ -271,5 +271,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 473589212, + "name": "CVE-2019-16278", + "full_name": "alexander-fernandes\/CVE-2019-16278", + "owner": { + "login": "alexander-fernandes", + "id": 82245105, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4", + "html_url": "https:\/\/github.com\/alexander-fernandes" + }, + "html_url": "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278", + "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.", + "fork": false, + "created_at": "2022-03-24T12:06:55Z", + "updated_at": "2022-03-24T12:06:55Z", + "pushed_at": "2022-03-24T12:06:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 94263e16c5..cc05b1e74c 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -40,17 +40,17 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2022-03-21T02:23:38Z", + "updated_at": "2022-03-24T11:58:34Z", "pushed_at": "2022-01-05T04:09:42Z", - "stargazers_count": 575, - "watchers_count": 575, + "stargazers_count": 576, + "watchers_count": 576, "forks_count": 155, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 155, - "watchers": 575, + "watchers": 576, "score": 0 }, { diff --git a/2020/CVE-2020-1034.json b/2020/CVE-2020-1034.json index 902f5ecf1c..b313eca0ae 100644 --- a/2020/CVE-2020-1034.json +++ b/2020/CVE-2020-1034.json @@ -13,17 +13,17 @@ "description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation", "fork": false, "created_at": "2020-11-23T10:24:07Z", - "updated_at": "2022-03-20T15:46:06Z", + "updated_at": "2022-03-24T06:38:17Z", "pushed_at": "2021-03-16T13:53:37Z", - "stargazers_count": 95, - "watchers_count": 95, + "stargazers_count": 96, + "watchers_count": 96, "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 33, - "watchers": 95, + "watchers": 96, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-10713.json b/2020/CVE-2020-10713.json index 7a0f22a403..198f9ee6a0 100644 --- a/2020/CVE-2020-10713.json +++ b/2020/CVE-2020-10713.json @@ -17,12 +17,12 @@ "pushed_at": "2020-08-24T23:16:38Z", "stargazers_count": 54, "watchers_count": 54, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 54, "score": 0 } diff --git a/2020/CVE-2020-11113.json b/2020/CVE-2020-11113.json index 986d790e0e..9975cdc397 100644 --- a/2020/CVE-2020-11113.json +++ b/2020/CVE-2020-11113.json @@ -17,7 +17,7 @@ "pushed_at": "2021-12-09T22:26:47Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ @@ -26,7 +26,7 @@ "rce" ], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 3, "score": 0 } diff --git a/2020/CVE-2020-14195.json b/2020/CVE-2020-14195.json index 24482546ad..66c692425d 100644 --- a/2020/CVE-2020-14195.json +++ b/2020/CVE-2020-14195.json @@ -17,7 +17,7 @@ "pushed_at": "2021-12-09T22:25:16Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ @@ -25,7 +25,7 @@ "fasterxml-jackson-databind" ], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 3, "score": 0 } diff --git a/2020/CVE-2020-24616.json b/2020/CVE-2020-24616.json index 58dd85c7a8..6bc28618f2 100644 --- a/2020/CVE-2020-24616.json +++ b/2020/CVE-2020-24616.json @@ -17,12 +17,12 @@ "pushed_at": "2020-09-07T06:22:50Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 3, "score": 0 } diff --git a/2020/CVE-2020-24750.json b/2020/CVE-2020-24750.json index 749cbd2a28..94a76f5952 100644 --- a/2020/CVE-2020-24750.json +++ b/2020/CVE-2020-24750.json @@ -17,14 +17,14 @@ "pushed_at": "2021-12-09T22:26:54Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "cve-2020-24750" ], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 3, "score": 0 } diff --git a/2020/CVE-2020-28502.json b/2020/CVE-2020-28502.json index 2e81687622..e5a77c9db9 100644 --- a/2020/CVE-2020-28502.json +++ b/2020/CVE-2020-28502.json @@ -17,7 +17,7 @@ "pushed_at": "2021-05-12T12:18:50Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ @@ -27,7 +27,7 @@ "xmlhttprequest" ], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 4, "score": 0 }, diff --git a/2020/CVE-2020-3580.json b/2020/CVE-2020-3580.json index 2b4a69b799..2d470c3b8a 100644 --- a/2020/CVE-2020-3580.json +++ b/2020/CVE-2020-3580.json @@ -59,5 +59,32 @@ "forks": 1, "watchers": 8, "score": 0 + }, + { + "id": 473539890, + "name": "CVE-2020-3580", + "full_name": "nxtexploit\/CVE-2020-3580", + "owner": { + "login": "nxtexploit", + "id": 72358603, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72358603?v=4", + "html_url": "https:\/\/github.com\/nxtexploit" + }, + "html_url": "https:\/\/github.com\/nxtexploit\/CVE-2020-3580", + "description": null, + "fork": false, + "created_at": "2022-03-24T09:34:04Z", + "updated_at": "2022-03-24T10:07:15Z", + "pushed_at": "2022-03-24T10:07:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-4464.json b/2020/CVE-2020-4464.json index 62bf73db90..18e2ed5c47 100644 --- a/2020/CVE-2020-4464.json +++ b/2020/CVE-2020-4464.json @@ -13,17 +13,17 @@ "description": "CVE-2020-4464 \/ CVE-2020-4450", "fork": false, "created_at": "2021-08-17T08:44:49Z", - "updated_at": "2022-01-17T14:26:44Z", + "updated_at": "2022-03-24T10:38:17Z", "pushed_at": "2021-08-24T15:02:19Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7247.json b/2020/CVE-2020-7247.json index 6ce71a0f58..dcd6f38a3a 100644 --- a/2020/CVE-2020-7247.json +++ b/2020/CVE-2020-7247.json @@ -235,7 +235,7 @@ "fork": false, "created_at": "2022-02-07T10:59:36Z", "updated_at": "2022-02-07T12:49:21Z", - "pushed_at": "2022-03-23T20:33:39Z", + "pushed_at": "2022-03-24T11:38:37Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-8163.json b/2020/CVE-2020-8163.json index b77119d8e0..37ae5946fa 100644 --- a/2020/CVE-2020-8163.json +++ b/2020/CVE-2020-8163.json @@ -52,5 +52,32 @@ "forks": 2, "watchers": 6, "score": 0 + }, + { + "id": 473487121, + "name": "CVE-2020-8163", + "full_name": "TKLinux966\/CVE-2020-8163", + "owner": { + "login": "TKLinux966", + "id": 74335372, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74335372?v=4", + "html_url": "https:\/\/github.com\/TKLinux966" + }, + "html_url": "https:\/\/github.com\/TKLinux966\/CVE-2020-8163", + "description": "This is a exploit code for CVE-202-8163", + "fork": false, + "created_at": "2022-03-24T06:43:39Z", + "updated_at": "2022-03-24T06:46:51Z", + "pushed_at": "2022-03-24T06:45:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21315.json b/2021/CVE-2021-21315.json index 83bdebd8c0..a76dffb6c9 100644 --- a/2021/CVE-2021-21315.json +++ b/2021/CVE-2021-21315.json @@ -17,7 +17,7 @@ "pushed_at": "2021-06-09T13:27:20Z", "stargazers_count": 146, "watchers_count": 146, - "forks_count": 24, + "forks_count": 25, "allow_forking": true, "is_template": false, "topics": [ @@ -35,7 +35,7 @@ "vulnerability" ], "visibility": "public", - "forks": 24, + "forks": 25, "watchers": 146, "score": 0 }, diff --git a/2021/CVE-2021-21341.json b/2021/CVE-2021-21341.json index ed3094b5ae..0b3bbed69c 100644 --- a/2021/CVE-2021-21341.json +++ b/2021/CVE-2021-21341.json @@ -17,12 +17,12 @@ "pushed_at": "2021-05-09T06:48:26Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 }, diff --git a/2021/CVE-2021-2394.json b/2021/CVE-2021-2394.json index fae7e337ff..05407eb935 100644 --- a/2021/CVE-2021-2394.json +++ b/2021/CVE-2021-2394.json @@ -1,31 +1,4 @@ [ - { - "id": 391792707, - "name": "CVE-2021-2394", - "full_name": "lz2y\/CVE-2021-2394", - "owner": { - "login": "lz2y", - "id": 55266300, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55266300?v=4", - "html_url": "https:\/\/github.com\/lz2y" - }, - "html_url": "https:\/\/github.com\/lz2y\/CVE-2021-2394", - "description": "POC of CVE-2021-2394", - "fork": false, - "created_at": "2021-08-02T02:22:04Z", - "updated_at": "2022-01-18T15:14:59Z", - "pushed_at": "2021-10-28T14:32:31Z", - "stargazers_count": 23, - "watchers_count": 23, - "forks_count": 14, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 14, - "watchers": 23, - "score": 0 - }, { "id": 438692076, "name": "CVE-2021-2394", diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 59a4372548..5fee8a7c72 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -40,17 +40,17 @@ "description": "CVE-2021-26084 Remote Code Execution on Confluence Servers", "fork": false, "created_at": "2021-09-01T09:50:26Z", - "updated_at": "2022-02-10T11:38:49Z", + "updated_at": "2022-03-24T06:27:25Z", "pushed_at": "2022-02-10T11:38:46Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "forks_count": 30, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 30, - "watchers": 45, + "watchers": 46, "score": 0 }, { diff --git a/2021/CVE-2021-30682.json b/2021/CVE-2021-30682.json index af54fa06a9..0e605cf019 100644 --- a/2021/CVE-2021-30682.json +++ b/2021/CVE-2021-30682.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2021-10-15T08:10:02Z", "updated_at": "2022-01-30T13:21:34Z", - "pushed_at": "2021-11-14T07:29:00Z", + "pushed_at": "2022-03-24T07:38:41Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 1, diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json index 6a69c52921..371421788a 100644 --- a/2021/CVE-2021-30955.json +++ b/2021/CVE-2021-30955.json @@ -125,12 +125,12 @@ "pushed_at": "2022-03-14T07:58:37Z", "stargazers_count": 41, "watchers_count": 41, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 41, "score": 0 }, @@ -152,12 +152,12 @@ "pushed_at": "2022-03-15T13:51:44Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 1, "score": 0 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 73376ed1bc..eca33a00b5 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -969,17 +969,17 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2022-03-24T05:47:43Z", + "updated_at": "2022-03-24T09:03:44Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 463, - "watchers_count": 463, + "stargazers_count": 466, + "watchers_count": 466, "forks_count": 124, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 124, - "watchers": 463, + "watchers": 466, "score": 0 }, { diff --git a/2021/CVE-2021-35587.json b/2021/CVE-2021-35587.json index 7c3cbb233d..247d8d1196 100644 --- a/2021/CVE-2021-35587.json +++ b/2021/CVE-2021-35587.json @@ -17,12 +17,12 @@ "pushed_at": "2022-03-14T05:07:01Z", "stargazers_count": 27, "watchers_count": 27, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 27, "score": 0 } diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 05abb5c299..009f0d2b09 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -73,17 +73,17 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-03-24T05:38:39Z", + "updated_at": "2022-03-24T07:55:11Z", "pushed_at": "2022-01-30T14:22:23Z", - "stargazers_count": 1427, - "watchers_count": 1427, + "stargazers_count": 1428, + "watchers_count": 1428, "forks_count": 420, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 420, - "watchers": 1427, + "watchers": 1428, "score": 0 }, { diff --git a/2021/CVE-2021-40373.json b/2021/CVE-2021-40373.json new file mode 100644 index 0000000000..f80eb96fc9 --- /dev/null +++ b/2021/CVE-2021-40373.json @@ -0,0 +1,29 @@ +[ + { + "id": 401705362, + "name": "CVE-2021-40373", + "full_name": "maikroservice\/CVE-2021-40373", + "owner": { + "login": "maikroservice", + "id": 20245897, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20245897?v=4", + "html_url": "https:\/\/github.com\/maikroservice" + }, + "html_url": "https:\/\/github.com\/maikroservice\/CVE-2021-40373", + "description": "CVE-2021-40373 - remote code execution", + "fork": false, + "created_at": "2021-08-31T13:03:10Z", + "updated_at": "2022-03-24T09:34:07Z", + "pushed_at": "2022-03-24T09:34:04Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41073.json b/2021/CVE-2021-41073.json index 5de78b5124..b3b4b559b8 100644 --- a/2021/CVE-2021-41073.json +++ b/2021/CVE-2021-41073.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-03-02T19:07:37Z", - "updated_at": "2022-03-15T16:06:21Z", + "updated_at": "2022-03-24T09:37:55Z", "pushed_at": "2022-03-08T15:37:34Z", - "stargazers_count": 64, - "watchers_count": 64, - "forks_count": 16, + "stargazers_count": 65, + "watchers_count": 65, + "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 16, - "watchers": 64, + "forks": 17, + "watchers": 65, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 42f12bf111..6af5c83692 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2022-03-23T15:54:38Z", + "updated_at": "2022-03-24T07:04:21Z", "pushed_at": "2022-03-18T16:32:13Z", - "stargazers_count": 761, - "watchers_count": 761, + "stargazers_count": 762, + "watchers_count": 762, "forks_count": 167, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 761, + "watchers": 762, "score": 0 }, { diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 1df5cd6406..e6fc27d5c7 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,17 +13,17 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2022-03-23T17:02:02Z", + "updated_at": "2022-03-24T08:36:54Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1054, - "watchers_count": 1054, + "stargazers_count": 1055, + "watchers_count": 1055, "forks_count": 282, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 282, - "watchers": 1054, + "watchers": 1055, "score": 0 }, { diff --git a/2021/CVE-2021-43008.json b/2021/CVE-2021-43008.json index 1a3a90fa49..713d464601 100644 --- a/2021/CVE-2021-43008.json +++ b/2021/CVE-2021-43008.json @@ -13,11 +13,11 @@ "description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ", "fork": false, "created_at": "2021-12-13T17:26:49Z", - "updated_at": "2022-03-24T05:21:15Z", + "updated_at": "2022-03-24T09:39:42Z", "pushed_at": "2022-03-16T09:35:04Z", - "stargazers_count": 32, - "watchers_count": 32, - "forks_count": 5, + "stargazers_count": 33, + "watchers_count": 33, + "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [ @@ -34,8 +34,8 @@ "vulnerability" ], "visibility": "public", - "forks": 5, - "watchers": 32, + "forks": 7, + "watchers": 33, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 258c8c556e..8b0ad00401 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -121,17 +121,17 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2022-03-23T01:43:25Z", + "updated_at": "2022-03-24T09:06:58Z", "pushed_at": "2022-01-18T12:01:52Z", - "stargazers_count": 351, - "watchers_count": 351, + "stargazers_count": 352, + "watchers_count": 352, "forks_count": 107, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 107, - "watchers": 351, + "watchers": 352, "score": 0 }, { @@ -864,7 +864,7 @@ "pushed_at": "2022-01-15T16:18:44Z", "stargazers_count": 710, "watchers_count": 710, - "forks_count": 113, + "forks_count": 114, "allow_forking": true, "is_template": false, "topics": [ @@ -889,7 +889,7 @@ "writeups" ], "visibility": "public", - "forks": 113, + "forks": 114, "watchers": 710, "score": 0 }, @@ -1894,10 +1894,10 @@ "description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!", "fork": false, "created_at": "2021-12-12T00:29:03Z", - "updated_at": "2022-03-22T16:51:32Z", + "updated_at": "2022-03-24T08:33:05Z", "pushed_at": "2022-03-10T18:44:50Z", - "stargazers_count": 622, - "watchers_count": 622, + "stargazers_count": 621, + "watchers_count": 621, "forks_count": 99, "allow_forking": true, "is_template": false, @@ -1916,7 +1916,7 @@ ], "visibility": "public", "forks": 99, - "watchers": 622, + "watchers": 621, "score": 0 }, { @@ -2022,10 +2022,10 @@ "description": "An All-In-One Pure Python PoC for CVE-2021-44228", "fork": false, "created_at": "2021-12-12T02:57:49Z", - "updated_at": "2022-03-22T05:49:01Z", + "updated_at": "2022-03-24T06:59:40Z", "pushed_at": "2021-12-16T18:34:46Z", - "stargazers_count": 185, - "watchers_count": 185, + "stargazers_count": 186, + "watchers_count": 186, "forks_count": 32, "allow_forking": true, "is_template": false, @@ -2038,7 +2038,7 @@ ], "visibility": "public", "forks": 32, - "watchers": 185, + "watchers": 186, "score": 0 }, { @@ -5127,17 +5127,17 @@ "description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!", "fork": false, "created_at": "2021-12-14T05:24:52Z", - "updated_at": "2022-03-08T20:58:27Z", + "updated_at": "2022-03-24T07:01:14Z", "pushed_at": "2021-12-21T19:48:57Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json index eaeabb8326..5cb4854f32 100644 --- a/2022/CVE-2022-0337.json +++ b/2022/CVE-2022-0337.json @@ -13,11 +13,11 @@ "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "fork": false, "created_at": "2022-03-19T08:10:46Z", - "updated_at": "2022-03-24T05:15:15Z", + "updated_at": "2022-03-24T09:55:19Z", "pushed_at": "2022-03-19T12:01:26Z", - "stargazers_count": 211, - "watchers_count": 211, - "forks_count": 30, + "stargazers_count": 213, + "watchers_count": 213, + "forks_count": 31, "allow_forking": true, "is_template": false, "topics": [ @@ -38,8 +38,8 @@ "writeups" ], "visibility": "public", - "forks": 30, - "watchers": 211, + "forks": 31, + "watchers": 213, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0778.json b/2022/CVE-2022-0778.json index 421fca5513..47b69c5f54 100644 --- a/2022/CVE-2022-0778.json +++ b/2022/CVE-2022-0778.json @@ -13,17 +13,17 @@ "description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt", "fork": false, "created_at": "2022-03-15T19:06:33Z", - "updated_at": "2022-03-24T04:36:27Z", + "updated_at": "2022-03-24T09:25:14Z", "pushed_at": "2022-03-21T12:12:16Z", - "stargazers_count": 125, - "watchers_count": 125, + "stargazers_count": 126, + "watchers_count": 126, "forks_count": 34, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 34, - "watchers": 125, + "watchers": 126, "score": 0 }, { diff --git a/2022/CVE-2022-0824.json b/2022/CVE-2022-0824.json index c026faac68..9446aaf52a 100644 --- a/2022/CVE-2022-0824.json +++ b/2022/CVE-2022-0824.json @@ -46,7 +46,7 @@ "fork": false, "created_at": "2022-03-22T03:49:51Z", "updated_at": "2022-03-24T04:54:09Z", - "pushed_at": "2022-03-24T05:06:18Z", + "pushed_at": "2022-03-24T07:15:28Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index a4ba2b42b5..09a403fe8c 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -125,12 +125,12 @@ "pushed_at": "2022-03-08T06:20:05Z", "stargazers_count": 880, "watchers_count": 880, - "forks_count": 180, + "forks_count": 181, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 180, + "forks": 181, "watchers": 880, "score": 0 }, @@ -341,12 +341,12 @@ "pushed_at": "2022-03-08T11:52:22Z", "stargazers_count": 31, "watchers_count": 31, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 17, "watchers": 31, "score": 0 }, @@ -557,12 +557,12 @@ "pushed_at": "2022-03-08T20:41:15Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 }, @@ -1074,17 +1074,17 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2022-03-23T16:42:35Z", + "updated_at": "2022-03-24T09:12:07Z", "pushed_at": "2022-03-15T00:26:45Z", - "stargazers_count": 177, - "watchers_count": 177, + "stargazers_count": 178, + "watchers_count": 178, "forks_count": 31, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 31, - "watchers": 177, + "watchers": 178, "score": 0 }, { diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 5b1ed19ce5..ad574ae392 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,11 +13,11 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-03-24T03:37:59Z", + "updated_at": "2022-03-24T11:52:02Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 533, - "watchers_count": 533, - "forks_count": 104, + "stargazers_count": 535, + "watchers_count": 535, + "forks_count": 105, "allow_forking": true, "is_template": false, "topics": [ @@ -25,8 +25,8 @@ "cve-2022-22718" ], "visibility": "public", - "forks": 104, - "watchers": 533, + "forks": 105, + "watchers": 535, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 95eed8f845..6c0345b246 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -952,20 +952,20 @@ }, { "id": 472548304, - "name": "cve-2022-22947-springcloud-gateway", - "full_name": "Enokiy\/cve-2022-22947-springcloud-gateway", + "name": "cve-2022-22947-spring-cloud-gateway", + "full_name": "Enokiy\/cve-2022-22947-spring-cloud-gateway", "owner": { "login": "Enokiy", "id": 33446650, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33446650?v=4", "html_url": "https:\/\/github.com\/Enokiy" }, - "html_url": "https:\/\/github.com\/Enokiy\/cve-2022-22947-springcloud-gateway", + "html_url": "https:\/\/github.com\/Enokiy\/cve-2022-22947-spring-cloud-gateway", "description": null, "fork": false, "created_at": "2022-03-21T23:37:20Z", - "updated_at": "2022-03-21T23:37:20Z", - "pushed_at": "2022-03-21T23:37:21Z", + "updated_at": "2022-03-24T11:13:04Z", + "pushed_at": "2022-03-24T11:13:00Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2022/CVE-2022-24990.json b/2022/CVE-2022-24990.json index e9128d3116..02a291b9d6 100644 --- a/2022/CVE-2022-24990.json +++ b/2022/CVE-2022-24990.json @@ -121,17 +121,17 @@ "description": "CVE-2022-24990信息泄露+RCE 一条龙", "fork": false, "created_at": "2022-03-20T05:21:08Z", - "updated_at": "2022-03-23T09:54:11Z", + "updated_at": "2022-03-24T09:30:38Z", "pushed_at": "2022-03-20T05:23:57Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, - "watchers": 27, + "watchers": 28, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json index c7c61cf195..83b556bdd3 100644 --- a/2022/CVE-2022-25636.json +++ b/2022/CVE-2022-25636.json @@ -13,17 +13,44 @@ "description": "CVE-2022-25636", "fork": false, "created_at": "2022-03-07T13:38:41Z", - "updated_at": "2022-03-24T06:16:44Z", + "updated_at": "2022-03-24T11:35:09Z", "pushed_at": "2022-03-07T17:18:19Z", - "stargazers_count": 325, - "watchers_count": 325, + "stargazers_count": 326, + "watchers_count": 326, "forks_count": 64, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 64, - "watchers": 325, + "watchers": 326, + "score": 0 + }, + { + "id": 473492971, + "name": "CVE-2022-25636", + "full_name": "chenaotian\/CVE-2022-25636", + "owner": { + "login": "chenaotian", + "id": 86546351, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4", + "html_url": "https:\/\/github.com\/chenaotian" + }, + "html_url": "https:\/\/github.com\/chenaotian\/CVE-2022-25636", + "description": "CVE-2022-0185 analysis write up", + "fork": false, + "created_at": "2022-03-24T07:04:55Z", + "updated_at": "2022-03-24T07:39:25Z", + "pushed_at": "2022-03-24T07:10:23Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-25943.json b/2022/CVE-2022-25943.json index 17b8fc5e11..f44bf91a71 100644 --- a/2022/CVE-2022-25943.json +++ b/2022/CVE-2022-25943.json @@ -13,17 +13,17 @@ "description": "CVE-2022-25943", "fork": false, "created_at": "2021-07-09T23:34:57Z", - "updated_at": "2022-03-21T01:20:28Z", + "updated_at": "2022-03-24T09:38:11Z", "pushed_at": "2022-03-09T08:26:45Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 7, + "stargazers_count": 21, + "watchers_count": 21, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 20, + "forks": 8, + "watchers": 21, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27254.json b/2022/CVE-2022-27254.json index 417ae5302c..b282b59729 100644 --- a/2022/CVE-2022-27254.json +++ b/2022/CVE-2022-27254.json @@ -13,17 +13,17 @@ "description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)", "fork": false, "created_at": "2022-03-23T15:03:09Z", - "updated_at": "2022-03-24T04:42:21Z", + "updated_at": "2022-03-24T10:30:54Z", "pushed_at": "2022-03-23T15:19:21Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 4ff9beca7a..9fa0006f51 100644 --- a/README.md +++ b/README.md @@ -423,7 +423,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v - [bysinks/CVE-2022-22947](https://github.com/bysinks/CVE-2022-22947) - [Wrin9/CVE-2022-22947](https://github.com/Wrin9/CVE-2022-22947) - [viemsr/spring_cloud_gateway_memshell](https://github.com/viemsr/spring_cloud_gateway_memshell) -- [Enokiy/cve-2022-22947-springcloud-gateway](https://github.com/Enokiy/cve-2022-22947-springcloud-gateway) +- [Enokiy/cve-2022-22947-spring-cloud-gateway](https://github.com/Enokiy/cve-2022-22947-spring-cloud-gateway) ### CVE-2022-23046 (2022-01-19) @@ -717,6 +717,7 @@ net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows loca - [Bonfee/CVE-2022-25636](https://github.com/Bonfee/CVE-2022-25636) +- [chenaotian/CVE-2022-25636](https://github.com/chenaotian/CVE-2022-25636) ### CVE-2022-25640 (2022-02-23) @@ -1010,7 +1011,6 @@ Vulnerability in the Database Vault component of Oracle Database Server. Support Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). -- [lz2y/CVE-2021-2394](https://github.com/lz2y/CVE-2021-2394) - [fasanhlieu/CVE-2021-2394](https://github.com/fasanhlieu/CVE-2021-2394) ### CVE-2021-2471 (2021-10-20) @@ -3334,6 +3334,14 @@ An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can - [Vulnmachines/HAProxy_CVE-2021-40346](https://github.com/Vulnmachines/HAProxy_CVE-2021-40346) - [alexOarga/CVE-2021-40346](https://github.com/alexOarga/CVE-2021-40346) +### CVE-2021-40373 (2021-09-10) + + +playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the #tabs-information-page of core_main_config, and then executing that code via the index.php?app=main&inc=core_welcome URI. + + +- [maikroservice/CVE-2021-40373](https://github.com/maikroservice/CVE-2021-40373) + ### CVE-2021-40374 - [DCKento/CVE-2021-40374](https://github.com/DCKento/CVE-2021-40374) @@ -5820,6 +5828,7 @@ Multiple vulnerabilities in the web services interface of Cisco Adaptive Securit - [Hudi233/CVE-2020-3580](https://github.com/Hudi233/CVE-2020-3580) - [adarshvs/CVE-2020-3580](https://github.com/adarshvs/CVE-2020-3580) +- [nxtexploit/CVE-2020-3580](https://github.com/nxtexploit/CVE-2020-3580) ### CVE-2020-3766 (2020-03-25) @@ -6434,6 +6443,7 @@ The is a code injection vulnerability in versions of Rails prior to 5.0.1 that w - [lucasallan/CVE-2020-8163](https://github.com/lucasallan/CVE-2020-8163) - [h4ms1k/CVE-2020-8163](https://github.com/h4ms1k/CVE-2020-8163) +- [TKLinux966/CVE-2020-8163](https://github.com/TKLinux966/CVE-2020-8163) ### CVE-2020-8165 (2020-06-19) @@ -12758,6 +12768,7 @@ Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 - [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278) - [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278) - [k4u5h41/CVE-2019-16278](https://github.com/k4u5h41/CVE-2019-16278) +- [alexander-fernandes/CVE-2019-16278](https://github.com/alexander-fernandes/CVE-2019-16278) ### CVE-2019-16279 (2019-10-14) @@ -14622,6 +14633,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r - [twseptian/cve-2018-6574](https://github.com/twseptian/cve-2018-6574) - [frarinha/CVE-2018-6574](https://github.com/frarinha/CVE-2018-6574) - [dmlino/cve-2018-6574](https://github.com/dmlino/cve-2018-6574) +- [the-valluvarsploit/CVE-2018-6574](https://github.com/the-valluvarsploit/CVE-2018-6574) ### CVE-2018-6622 (2018-08-17)