From 9be06f40d07cfab56c8bf3e73927d1c16f91f13f Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 18 Jul 2022 21:18:53 +0900 Subject: [PATCH] Auto Update 2022/07/18 12:18:53 --- 2008/CVE-2008-0166.json | 4 +-- 2014/CVE-2014-4210.json | 8 ++--- 2014/CVE-2014-6271.json | 28 +++++++++++++++++ 2016/CVE-2016-0638.json | 8 ++--- 2016/CVE-2016-4622.json | 8 ++--- 2017/CVE-2017-1000253.json | 8 ++--- 2017/CVE-2017-11882.json | 8 ++--- 2017/CVE-2017-3248.json | 8 ++--- 2018/CVE-2018-16763.json | 8 ++--- 2018/CVE-2018-18852.json | 8 ++--- 2018/CVE-2018-2628.json | 32 +++++++++---------- 2018/CVE-2018-2893.json | 12 +++---- 2018/CVE-2018-4233.json | 8 ++--- 2018/CVE-2018-5955.json | 4 +-- 2018/CVE-2018-8174.json | 8 ++--- 2019/CVE-2019-0193.json | 8 ++--- 2019/CVE-2019-0708.json | 12 +++---- 2019/CVE-2019-13272.json | 8 ++--- 2019/CVE-2019-17558.json | 12 +++---- 2019/CVE-2019-2618.json | 8 ++--- 2019/CVE-2019-5544.json | 16 +++++----- 2019/CVE-2019-5736.json | 8 ++--- 2020/CVE-2020-0796.json | 36 ++++++++++----------- 2020/CVE-2020-12695.json | 8 ++--- 2020/CVE-2020-14144.json | 8 ++--- 2020/CVE-2020-1472.json | 20 ++++++------ 2020/CVE-2020-14882.json | 12 +++---- 2020/CVE-2020-15368.json | 8 ++--- 2020/CVE-2020-16898.json | 8 ++--- 2020/CVE-2020-2546.json | 8 ++--- 2020/CVE-2020-2551.json | 8 ++--- 2020/CVE-2020-25540.json | 8 ++--- 2020/CVE-2020-3992.json | 16 +++++----- 2021/CVE-2021-20138.json | 30 ++++++++++++++++++ 2021/CVE-2021-22005.json | 8 ++--- 2021/CVE-2021-23017.json | 8 ++--- 2021/CVE-2021-3156.json | 8 ++--- 2021/CVE-2021-36955.json | 30 ++++++++++++++++++ 2021/CVE-2021-3929.json | 2 +- 2021/CVE-2021-4034.json | 20 ++++++------ 2021/CVE-2021-44228.json | 64 +++----------------------------------- 2022/CVE-2022-0847.json | 8 ++--- 2022/CVE-2022-20138.json | 28 +++++++++++++++++ 2022/CVE-2022-20699.json | 8 ++--- 2022/CVE-2022-22029.json | 30 ++++++++++++++++++ 2022/CVE-2022-22954.json | 8 ++--- 2022/CVE-2022-22965.json | 8 ++--- 2022/CVE-2022-22972.json | 8 ++--- 2022/CVE-2022-23614.json | 30 ++++++++++++++++++ 2022/CVE-2022-24706.json | 8 ++--- 2022/CVE-2022-25845.json | 8 ++--- 2022/CVE-2022-26133.json | 8 ++--- 2022/CVE-2022-26134.json | 14 ++++----- 2022/CVE-2022-26135.json | 8 ++--- 2022/CVE-2022-26937.json | 4 +-- 2022/CVE-2022-28346.json | 2 +- 2022/CVE-2022-29464.json | 20 ++++++------ 2022/CVE-2022-29593.json | 2 +- 2022/CVE-2022-30190.json | 8 ++--- 2022/CVE-2022-30780.json | 8 ++--- README.md | 36 +++++++++++++++++++-- 61 files changed, 474 insertions(+), 322 deletions(-) create mode 100644 2021/CVE-2021-20138.json create mode 100644 2021/CVE-2021-36955.json create mode 100644 2022/CVE-2022-22029.json create mode 100644 2022/CVE-2022-23614.json diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index 02cfd28b9d..529deb3579 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -75,13 +75,13 @@ "pushed_at": "2022-07-08T09:14:14Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index c1b1e70a0e..d965f56ccb 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -41,10 +41,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-18T06:04:07Z", + "updated_at": "2022-07-18T06:51:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1422, - "watchers_count": 1422, + "stargazers_count": 1423, + "watchers_count": 1423, "forks_count": 298, "allow_forking": true, "is_template": false, @@ -73,7 +73,7 @@ ], "visibility": "public", "forks": 298, - "watchers": 1422, + "watchers": 1423, "score": 0 }, { diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index 9f7c846e56..32a7cad3b6 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -755,6 +755,34 @@ "watchers": 1, "score": 0 }, + { + "id": 24589519, + "name": "RIS", + "full_name": "sch3m4\/RIS", + "owner": { + "login": "sch3m4", + "id": 607081, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/607081?v=4", + "html_url": "https:\/\/github.com\/sch3m4" + }, + "html_url": "https:\/\/github.com\/sch3m4\/RIS", + "description": "CVE-2014-6271 Remote Interactive Shell - PoC Exploit", + "fork": false, + "created_at": "2014-09-29T10:06:18Z", + "updated_at": "2019-08-13T15:51:47Z", + "pushed_at": "2014-09-29T10:09:16Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 + }, { "id": 24595830, "name": "CVE-2014-6271_Test", diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index d7a7da6a6e..a9ded9989e 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-18T06:04:07Z", + "updated_at": "2022-07-18T06:51:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1422, - "watchers_count": 1422, + "stargazers_count": 1423, + "watchers_count": 1423, "forks_count": 298, "allow_forking": true, "is_template": false, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 298, - "watchers": 1422, + "watchers": 1423, "score": 0 }, { diff --git a/2016/CVE-2016-4622.json b/2016/CVE-2016-4622.json index e528d3ff0d..84a0cb1542 100644 --- a/2016/CVE-2016-4622.json +++ b/2016/CVE-2016-4622.json @@ -44,10 +44,10 @@ "description": "My journey through WebKit CVE-2016-4622 Exploitation process", "fork": false, "created_at": "2020-04-07T00:46:19Z", - "updated_at": "2022-06-10T03:26:43Z", + "updated_at": "2022-07-18T06:29:54Z", "pushed_at": "2020-04-12T19:46:40Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 5, "allow_forking": true, "is_template": false, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 11, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-1000253.json b/2017/CVE-2017-1000253.json index 3ee479ec22..0f0c61ab32 100644 --- a/2017/CVE-2017-1000253.json +++ b/2017/CVE-2017-1000253.json @@ -13,10 +13,10 @@ "description": "Demo-ing CVE-2017-1000253 in a container", "fork": false, "created_at": "2018-06-18T15:22:01Z", - "updated_at": "2022-04-14T07:29:48Z", + "updated_at": "2022-07-18T11:45:10Z", "pushed_at": "2017-11-01T07:59:24Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 6, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index d6cfba3360..7cee0acec0 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -41,10 +41,10 @@ "description": "Proof-of-Concept exploits for CVE-2017-11882", "fork": false, "created_at": "2017-11-20T16:35:30Z", - "updated_at": "2022-07-04T16:25:56Z", + "updated_at": "2022-07-18T11:46:53Z", "pushed_at": "2017-11-29T16:13:23Z", - "stargazers_count": 492, - "watchers_count": 492, + "stargazers_count": 491, + "watchers_count": 491, "forks_count": 197, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 197, - "watchers": 492, + "watchers": 491, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 7945cdc123..78823681dc 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -41,10 +41,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-18T06:04:07Z", + "updated_at": "2022-07-18T06:51:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1422, - "watchers_count": 1422, + "stargazers_count": 1423, + "watchers_count": 1423, "forks_count": 298, "allow_forking": true, "is_template": false, @@ -73,7 +73,7 @@ ], "visibility": "public", "forks": 298, - "watchers": 1422, + "watchers": 1423, "score": 0 }, { diff --git a/2018/CVE-2018-16763.json b/2018/CVE-2018-16763.json index 282be12565..489e0d7856 100644 --- a/2018/CVE-2018-16763.json +++ b/2018/CVE-2018-16763.json @@ -329,10 +329,10 @@ "description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ", "fork": false, "created_at": "2022-05-31T15:31:37Z", - "updated_at": "2022-07-12T11:49:18Z", + "updated_at": "2022-07-18T09:34:00Z", "pushed_at": "2022-06-01T20:45:02Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -345,7 +345,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-18852.json b/2018/CVE-2018-18852.json index a452017c23..4c780bec33 100644 --- a/2018/CVE-2018-18852.json +++ b/2018/CVE-2018-18852.json @@ -13,10 +13,10 @@ "description": "CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.", "fork": false, "created_at": "2019-01-26T03:41:24Z", - "updated_at": "2022-06-19T14:31:20Z", + "updated_at": "2022-07-18T08:25:41Z", "pushed_at": "2019-01-26T03:49:09Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 16, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 48, + "watchers": 47, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 3e9b647d7e..dffa3124e2 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -237,18 +237,18 @@ "description": null, "fork": false, "created_at": "2018-04-20T01:24:17Z", - "updated_at": "2019-06-12T09:17:11Z", + "updated_at": "2022-07-18T10:31:35Z", "pushed_at": "2018-04-20T01:24:32Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 1, + "forks": 1, + "watchers": 2, "score": 0 }, { @@ -381,18 +381,18 @@ "description": "Weblogic 反序列化漏洞(CVE-2018-2628)", "fork": false, "created_at": "2018-06-05T11:00:40Z", - "updated_at": "2022-07-17T03:57:55Z", + "updated_at": "2022-07-18T10:25:43Z", "pushed_at": "2019-09-30T01:18:02Z", - "stargazers_count": 95, - "watchers_count": 95, - "forks_count": 40, + "stargazers_count": 96, + "watchers_count": 96, + "forks_count": 39, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 40, - "watchers": 95, + "forks": 39, + "watchers": 96, "score": 0 }, { @@ -549,10 +549,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-18T06:04:07Z", + "updated_at": "2022-07-18T06:51:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1422, - "watchers_count": 1422, + "stargazers_count": 1423, + "watchers_count": 1423, "forks_count": 298, "allow_forking": true, "is_template": false, @@ -581,7 +581,7 @@ ], "visibility": "public", "forks": 298, - "watchers": 1422, + "watchers": 1423, "score": 0 }, { diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json index 205eeeffaa..10195e3baf 100644 --- a/2018/CVE-2018-2893.json +++ b/2018/CVE-2018-2893.json @@ -125,18 +125,18 @@ "description": "可以直接反弹shell", "fork": false, "created_at": "2018-07-26T07:16:38Z", - "updated_at": "2022-06-13T07:35:43Z", + "updated_at": "2022-07-18T10:28:32Z", "pushed_at": "2018-07-26T07:50:15Z", - "stargazers_count": 44, - "watchers_count": 44, - "forks_count": 14, + "stargazers_count": 45, + "watchers_count": 45, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 44, + "forks": 13, + "watchers": 45, "score": 0 }, { diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index 21f680ad30..f016a1753d 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018", "fork": false, "created_at": "2018-08-08T14:41:20Z", - "updated_at": "2022-07-08T11:25:39Z", + "updated_at": "2022-07-18T06:31:08Z", "pushed_at": "2018-08-17T23:31:46Z", - "stargazers_count": 165, - "watchers_count": 165, + "stargazers_count": 166, + "watchers_count": 166, "forks_count": 33, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 165, + "watchers": 166, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 144ac97f8a..f32a3be126 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -17,13 +17,13 @@ "pushed_at": "2018-09-11T04:40:52Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0 }, diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json index d66522e1f0..b1d5a7d9fc 100644 --- a/2018/CVE-2018-8174.json +++ b/2018/CVE-2018-8174.json @@ -13,10 +13,10 @@ "description": "CVE-2018-8174 - VBScript memory corruption exploit.", "fork": false, "created_at": "2018-05-22T21:50:32Z", - "updated_at": "2022-06-14T13:06:11Z", + "updated_at": "2022-07-18T08:25:41Z", "pushed_at": "2018-05-23T20:43:58Z", - "stargazers_count": 168, - "watchers_count": 168, + "stargazers_count": 167, + "watchers_count": 167, "forks_count": 81, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 81, - "watchers": 168, + "watchers": 167, "score": 0 }, { diff --git a/2019/CVE-2019-0193.json b/2019/CVE-2019-0193.json index 800f6e5ff4..ecd1666647 100644 --- a/2019/CVE-2019-0193.json +++ b/2019/CVE-2019-0193.json @@ -41,10 +41,10 @@ "description": "Apache Solr DataImport Handler RCE", "fork": false, "created_at": "2019-08-09T06:27:39Z", - "updated_at": "2022-07-14T01:42:34Z", + "updated_at": "2022-07-18T11:50:41Z", "pushed_at": "2019-08-12T02:23:38Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "forks_count": 50, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 87, + "watchers": 88, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index c84ecb91b4..3914297799 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1766,18 +1766,18 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2022-07-18T01:12:23Z", + "updated_at": "2022-07-18T10:13:53Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1110, - "watchers_count": 1110, - "forks_count": 356, + "stargazers_count": 1111, + "watchers_count": 1111, + "forks_count": 355, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 356, - "watchers": 1110, + "forks": 355, + "watchers": 1111, "score": 0 }, { diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index b832af8e9a..7f4719d4f0 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -13,10 +13,10 @@ "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", - "updated_at": "2022-07-17T19:06:06Z", + "updated_at": "2022-07-18T06:27:47Z", "pushed_at": "2019-08-01T16:02:59Z", - "stargazers_count": 288, - "watchers_count": 288, + "stargazers_count": 289, + "watchers_count": 289, "forks_count": 110, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 110, - "watchers": 288, + "watchers": 289, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 4452a625a5..26f712ea16 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -41,11 +41,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-07-18T04:33:20Z", + "updated_at": "2022-07-18T08:51:01Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3433, - "watchers_count": 3433, - "forks_count": 1021, + "stargazers_count": 3434, + "watchers_count": 3434, + "forks_count": 1020, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -71,8 +71,8 @@ "webshell" ], "visibility": "public", - "forks": 1021, - "watchers": 3433, + "forks": 1020, + "watchers": 3434, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 490bede4d9..0730c8c040 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -181,10 +181,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-18T06:04:07Z", + "updated_at": "2022-07-18T06:51:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1422, - "watchers_count": 1422, + "stargazers_count": 1423, + "watchers_count": 1423, "forks_count": 298, "allow_forking": true, "is_template": false, @@ -213,7 +213,7 @@ ], "visibility": "public", "forks": 298, - "watchers": 1422, + "watchers": 1423, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5544.json b/2019/CVE-2019-5544.json index 153bc0f10b..8b47ee2500 100644 --- a/2019/CVE-2019-5544.json +++ b/2019/CVE-2019-5544.json @@ -13,10 +13,10 @@ "description": "Python \/ scapy module implementing SRVLOC\/SLP protocol and scans for enabled OpenSLP services.", "fork": false, "created_at": "2020-12-01T13:49:26Z", - "updated_at": "2022-06-15T19:58:20Z", + "updated_at": "2022-07-18T08:29:54Z", "pushed_at": "2020-12-07T00:12:21Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 31, + "watchers": 32, "score": 0 }, { @@ -47,10 +47,10 @@ "description": "CVE-2020-3992 & CVE-2019-5544", "fork": false, "created_at": "2021-02-04T15:15:22Z", - "updated_at": "2022-06-25T09:40:30Z", + "updated_at": "2022-07-18T08:29:51Z", "pushed_at": "2021-02-05T06:40:50Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "forks_count": 18, "allow_forking": true, "is_template": false, @@ -58,7 +58,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 40, + "watchers": 41, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index b54933e73e..1bde55f580 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -41,10 +41,10 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2022-07-15T09:27:13Z", + "updated_at": "2022-07-18T07:01:19Z", "pushed_at": "2022-01-05T04:09:42Z", - "stargazers_count": 594, - "watchers_count": 594, + "stargazers_count": 593, + "watchers_count": 593, "forks_count": 160, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 160, - "watchers": 594, + "watchers": 593, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 0d6c76d73b..144cba08bc 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -125,10 +125,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2022-07-03T15:31:25Z", + "updated_at": "2022-07-18T07:20:27Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 616, - "watchers_count": 616, + "stargazers_count": 617, + "watchers_count": 617, "forks_count": 203, "allow_forking": true, "is_template": false, @@ -138,7 +138,7 @@ ], "visibility": "public", "forks": 203, - "watchers": 616, + "watchers": 617, "score": 0 }, { @@ -1054,10 +1054,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2022-07-13T02:42:57Z", + "updated_at": "2022-07-18T07:17:08Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1204, - "watchers_count": 1204, + "stargazers_count": 1205, + "watchers_count": 1205, "forks_count": 373, "allow_forking": true, "is_template": false, @@ -1071,7 +1071,7 @@ ], "visibility": "public", "forks": 373, - "watchers": 1204, + "watchers": 1205, "score": 0 }, { @@ -1638,18 +1638,18 @@ "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "fork": false, "created_at": "2020-06-10T16:44:39Z", - "updated_at": "2022-07-11T13:16:54Z", + "updated_at": "2022-07-18T10:05:59Z", "pushed_at": "2022-03-30T14:02:04Z", - "stargazers_count": 182, - "watchers_count": 182, - "forks_count": 44, + "stargazers_count": 183, + "watchers_count": 183, + "forks_count": 43, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 44, - "watchers": 182, + "forks": 43, + "watchers": 183, "score": 0 }, { @@ -1783,10 +1783,10 @@ "description": null, "fork": false, "created_at": "2020-09-17T01:48:37Z", - "updated_at": "2022-06-10T04:53:58Z", + "updated_at": "2022-07-18T09:27:36Z", "pushed_at": "2020-09-17T01:55:48Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 65, + "watchers_count": 65, "forks_count": 19, "allow_forking": true, "is_template": false, @@ -1794,7 +1794,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 64, + "watchers": 65, "score": 0 }, { diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index afdd9448e3..54c4b20534 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,10 +13,10 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2022-06-18T00:42:35Z", + "updated_at": "2022-07-18T07:16:18Z", "pushed_at": "2021-08-07T16:48:55Z", - "stargazers_count": 385, - "watchers_count": 385, + "stargazers_count": 384, + "watchers_count": 384, "forks_count": 65, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 65, - "watchers": 385, + "watchers": 384, "score": 0 }, { diff --git a/2020/CVE-2020-14144.json b/2020/CVE-2020-14144.json index 89f9956f66..5bb5aa0106 100644 --- a/2020/CVE-2020-14144.json +++ b/2020/CVE-2020-14144.json @@ -13,10 +13,10 @@ "description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks", "fork": false, "created_at": "2022-03-08T17:14:27Z", - "updated_at": "2022-07-12T11:50:07Z", + "updated_at": "2022-07-18T09:34:18Z", "pushed_at": "2022-05-03T10:40:14Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index af79e5f55e..e042029613 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -164,13 +164,13 @@ "pushed_at": "2020-10-15T18:31:15Z", "stargazers_count": 439, "watchers_count": 439, - "forks_count": 127, + "forks_count": 128, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 127, + "forks": 128, "watchers": 439, "score": 0 }, @@ -1428,10 +1428,10 @@ "description": "Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR\/MS-RPRN and SMBv2 Signing.", "fork": false, "created_at": "2021-06-23T12:23:48Z", - "updated_at": "2022-07-09T12:44:04Z", + "updated_at": "2022-07-18T09:53:08Z", "pushed_at": "2022-04-09T12:01:43Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -1448,7 +1448,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 6, + "watchers": 7, "score": 0 }, { @@ -1633,10 +1633,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2022-06-23T07:18:17Z", - "updated_at": "2022-07-04T13:52:48Z", + "updated_at": "2022-07-18T08:43:42Z", "pushed_at": "2022-07-05T09:50:45Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -1644,7 +1644,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 337a4369e3..b23f354643 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,11 +13,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-07-18T04:33:20Z", + "updated_at": "2022-07-18T08:51:01Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3433, - "watchers_count": 3433, - "forks_count": 1021, + "stargazers_count": 3434, + "watchers_count": 3434, + "forks_count": 1020, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -43,8 +43,8 @@ "webshell" ], "visibility": "public", - "forks": 1021, - "watchers": 3433, + "forks": 1020, + "watchers": 3434, "score": 0 }, { diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index 87dfc98c83..8e9d145a5c 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -13,10 +13,10 @@ "description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"", "fork": false, "created_at": "2021-06-29T04:38:24Z", - "updated_at": "2022-07-10T22:30:41Z", + "updated_at": "2022-07-18T11:37:15Z", "pushed_at": "2022-04-14T03:17:44Z", - "stargazers_count": 330, - "watchers_count": 330, + "stargazers_count": 331, + "watchers_count": 331, "forks_count": 35, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 35, - "watchers": 330, + "watchers": 331, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index 733f2db027..ddb5a85532 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -340,10 +340,10 @@ "description": null, "fork": false, "created_at": "2020-10-17T13:52:08Z", - "updated_at": "2021-11-15T06:46:32Z", + "updated_at": "2022-07-18T09:15:16Z", "pushed_at": "2020-10-17T13:52:38Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 10, "allow_forking": true, "is_template": false, @@ -351,7 +351,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 16, + "watchers": 17, "score": 0 }, { diff --git a/2020/CVE-2020-2546.json b/2020/CVE-2020-2546.json index 7822853a58..41f688740c 100644 --- a/2020/CVE-2020-2546.json +++ b/2020/CVE-2020-2546.json @@ -13,10 +13,10 @@ "description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,", "fork": false, "created_at": "2020-03-02T15:54:46Z", - "updated_at": "2022-06-16T11:16:07Z", + "updated_at": "2022-07-18T08:25:42Z", "pushed_at": "2020-06-10T10:49:38Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 131, + "watchers_count": 131, "forks_count": 29, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 132, + "watchers": 131, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 339d9c56e2..8694472239 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-18T06:04:07Z", + "updated_at": "2022-07-18T06:51:00Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1422, - "watchers_count": 1422, + "stargazers_count": 1423, + "watchers_count": 1423, "forks_count": 298, "allow_forking": true, "is_template": false, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 298, - "watchers": 1422, + "watchers": 1423, "score": 0 }, { diff --git a/2020/CVE-2020-25540.json b/2020/CVE-2020-25540.json index 94a852da14..1b6aebd6d8 100644 --- a/2020/CVE-2020-25540.json +++ b/2020/CVE-2020-25540.json @@ -41,10 +41,10 @@ "description": "ThinkAdmin CVE-2020-25540 POC", "fork": false, "created_at": "2022-03-09T13:08:31Z", - "updated_at": "2022-03-12T03:50:25Z", + "updated_at": "2022-07-18T11:36:45Z", "pushed_at": "2022-03-09T13:10:40Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2020/CVE-2020-3992.json b/2020/CVE-2020-3992.json index 153bc0f10b..8b47ee2500 100644 --- a/2020/CVE-2020-3992.json +++ b/2020/CVE-2020-3992.json @@ -13,10 +13,10 @@ "description": "Python \/ scapy module implementing SRVLOC\/SLP protocol and scans for enabled OpenSLP services.", "fork": false, "created_at": "2020-12-01T13:49:26Z", - "updated_at": "2022-06-15T19:58:20Z", + "updated_at": "2022-07-18T08:29:54Z", "pushed_at": "2020-12-07T00:12:21Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 31, + "watchers": 32, "score": 0 }, { @@ -47,10 +47,10 @@ "description": "CVE-2020-3992 & CVE-2019-5544", "fork": false, "created_at": "2021-02-04T15:15:22Z", - "updated_at": "2022-06-25T09:40:30Z", + "updated_at": "2022-07-18T08:29:51Z", "pushed_at": "2021-02-05T06:40:50Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "forks_count": 18, "allow_forking": true, "is_template": false, @@ -58,7 +58,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 40, + "watchers": 41, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-20138.json b/2021/CVE-2021-20138.json new file mode 100644 index 0000000000..d0bf09c8ee --- /dev/null +++ b/2021/CVE-2021-20138.json @@ -0,0 +1,30 @@ +[ + { + "id": 515147295, + "name": "frameworks_base_AOSP10_r33_CVE-2021-20138", + "full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-20138", + "owner": { + "login": "ShaikUsaf", + "id": 100413972, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4", + "html_url": "https:\/\/github.com\/ShaikUsaf" + }, + "html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-20138", + "description": null, + "fork": false, + "created_at": "2022-07-18T11:01:39Z", + "updated_at": "2022-07-18T11:20:13Z", + "pushed_at": "2022-07-18T11:34:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index 483b4098be..9cc77cf534 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -13,10 +13,10 @@ "description": "VMware vCenter Server任意文件上传漏洞 \/ Code By:Jun_sheng", "fork": false, "created_at": "2021-10-27T08:36:21Z", - "updated_at": "2022-07-18T03:28:31Z", + "updated_at": "2022-07-18T07:48:24Z", "pushed_at": "2022-07-08T09:17:14Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2021/CVE-2021-23017.json b/2021/CVE-2021-23017.json index 7dfd728164..60300c4cde 100644 --- a/2021/CVE-2021-23017.json +++ b/2021/CVE-2021-23017.json @@ -41,10 +41,10 @@ "description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017", "fork": false, "created_at": "2022-06-30T04:39:58Z", - "updated_at": "2022-07-17T06:40:59Z", + "updated_at": "2022-07-18T10:50:11Z", "pushed_at": "2022-07-01T00:33:57Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -55,7 +55,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 8801dd33a9..35fa429e1b 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -384,10 +384,10 @@ "description": "PoC for CVE-2021-3156 (sudo heap overflow)", "fork": false, "created_at": "2021-01-30T03:22:04Z", - "updated_at": "2022-07-07T12:20:02Z", + "updated_at": "2022-07-18T11:41:52Z", "pushed_at": "2022-04-14T11:51:18Z", - "stargazers_count": 430, - "watchers_count": 430, + "stargazers_count": 429, + "watchers_count": 429, "forks_count": 120, "allow_forking": true, "is_template": false, @@ -395,7 +395,7 @@ "topics": [], "visibility": "public", "forks": 120, - "watchers": 430, + "watchers": 429, "score": 0 }, { diff --git a/2021/CVE-2021-36955.json b/2021/CVE-2021-36955.json new file mode 100644 index 0000000000..f4da9d2da9 --- /dev/null +++ b/2021/CVE-2021-36955.json @@ -0,0 +1,30 @@ +[ + { + "id": 515072694, + "name": "CVE-2021-36955-EXP", + "full_name": "JiaJinRong12138\/CVE-2021-36955-EXP", + "owner": { + "login": "JiaJinRong12138", + "id": 45488822, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45488822?v=4", + "html_url": "https:\/\/github.com\/JiaJinRong12138" + }, + "html_url": "https:\/\/github.com\/JiaJinRong12138\/CVE-2021-36955-EXP", + "description": "CVE-2021-36955", + "fork": false, + "created_at": "2022-07-18T07:08:56Z", + "updated_at": "2022-07-18T07:12:50Z", + "pushed_at": "2022-07-18T07:12:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3929.json b/2021/CVE-2021-3929.json index 079e734cd1..e13b109000 100644 --- a/2021/CVE-2021-3929.json +++ b/2021/CVE-2021-3929.json @@ -13,7 +13,7 @@ "description": "Recursive MMIO VM Escape PoC", "fork": false, "created_at": "2022-05-13T05:33:28Z", - "updated_at": "2022-07-12T14:22:33Z", + "updated_at": "2022-07-18T10:59:23Z", "pushed_at": "2022-05-13T05:37:41Z", "stargazers_count": 138, "watchers_count": 138, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index d8d2f57760..98694aadbb 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -75,10 +75,10 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-07-18T04:55:20Z", + "updated_at": "2022-07-18T11:00:37Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1609, - "watchers_count": 1609, + "stargazers_count": 1610, + "watchers_count": 1610, "forks_count": 472, "allow_forking": true, "is_template": false, @@ -86,7 +86,7 @@ "topics": [], "visibility": "public", "forks": 472, - "watchers": 1609, + "watchers": 1610, "score": 0 }, { @@ -163,7 +163,7 @@ "pushed_at": "2022-02-12T05:22:58Z", "stargazers_count": 884, "watchers_count": 884, - "forks_count": 287, + "forks_count": 288, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -173,7 +173,7 @@ "poc" ], "visibility": "public", - "forks": 287, + "forks": 288, "watchers": 884, "score": 0 }, @@ -275,10 +275,10 @@ "description": "PoC for CVE-2021-4034", "fork": false, "created_at": "2022-01-26T02:02:25Z", - "updated_at": "2022-07-10T12:26:09Z", + "updated_at": "2022-07-18T07:45:05Z", "pushed_at": "2022-01-26T02:27:53Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "forks_count": 40, "allow_forking": true, "is_template": false, @@ -286,7 +286,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 54, + "watchers": 55, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index e4b12be336..c0bdbffc4b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -737,10 +737,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-07-18T03:25:34Z", + "updated_at": "2022-07-18T08:41:17Z", "pushed_at": "2022-06-02T02:16:13Z", - "stargazers_count": 435, - "watchers_count": 435, + "stargazers_count": 437, + "watchers_count": 437, "forks_count": 93, "allow_forking": true, "is_template": false, @@ -753,7 +753,7 @@ ], "visibility": "public", "forks": 93, - "watchers": 435, + "watchers": 437, "score": 0 }, { @@ -2169,34 +2169,6 @@ "watchers": 1, "score": 0 }, - { - "id": 437795998, - "name": "Log4j-CVE-2021-44228", - "full_name": "JiuBanSec\/Log4j-CVE-2021-44228", - "owner": { - "login": "JiuBanSec", - "id": 57030243, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4", - "html_url": "https:\/\/github.com\/JiuBanSec" - }, - "html_url": "https:\/\/github.com\/JiuBanSec\/Log4j-CVE-2021-44228", - "description": "Log4j Remote Code Injection (Apache Log4j 2.x < 2.15.0-rc2)", - "fork": false, - "created_at": "2021-12-13T08:40:13Z", - "updated_at": "2021-12-13T10:29:05Z", - "pushed_at": "2021-12-13T12:01:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 437797086, "name": "Log4Shell-CVE-2021-44228-ENV", @@ -2309,34 +2281,6 @@ "watchers": 0, "score": 0 }, - { - "id": 437838249, - "name": "log4jScan", - "full_name": "sinakeshmiri\/log4jScan", - "owner": { - "login": "sinakeshmiri", - "id": 72389059, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72389059?v=4", - "html_url": "https:\/\/github.com\/sinakeshmiri" - }, - "html_url": "https:\/\/github.com\/sinakeshmiri\/log4jScan", - "description": "simple python scanner to check if your network is vulnerable to CVE-2021-44228", - "fork": false, - "created_at": "2021-12-13T10:59:50Z", - "updated_at": "2021-12-16T15:08:45Z", - "pushed_at": "2021-12-13T12:16:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 437840280, "name": "Log4J-Scanner", diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 0ed647b571..fe52f0af14 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1868,10 +1868,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-06-29T12:02:13Z", - "updated_at": "2022-06-30T02:19:17Z", + "updated_at": "2022-07-18T08:37:07Z", "pushed_at": "2022-07-18T05:21:16Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -1879,7 +1879,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2022/CVE-2022-20138.json b/2022/CVE-2022-20138.json index 8080902a14..b49c0fd118 100644 --- a/2022/CVE-2022-20138.json +++ b/2022/CVE-2022-20138.json @@ -26,5 +26,33 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 515158255, + "name": "ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138", + "full_name": "ShaikUsaf\/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138", + "owner": { + "login": "ShaikUsaf", + "id": 100413972, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4", + "html_url": "https:\/\/github.com\/ShaikUsaf" + }, + "html_url": "https:\/\/github.com\/ShaikUsaf\/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138", + "description": null, + "fork": false, + "created_at": "2022-07-18T11:36:28Z", + "updated_at": "2022-07-18T11:38:43Z", + "pushed_at": "2022-07-18T11:39:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-20699.json b/2022/CVE-2022-20699.json index 78f38dd971..43c600288b 100644 --- a/2022/CVE-2022-20699.json +++ b/2022/CVE-2022-20699.json @@ -13,10 +13,10 @@ "description": "Cisco Anyconnect VPN unauth RCE (rwx stack)", "fork": false, "created_at": "2022-02-07T15:53:21Z", - "updated_at": "2022-07-15T14:14:46Z", + "updated_at": "2022-07-18T11:39:12Z", "pushed_at": "2022-02-07T15:55:03Z", - "stargazers_count": 235, - "watchers_count": 235, + "stargazers_count": 234, + "watchers_count": 234, "forks_count": 43, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 235, + "watchers": 234, "score": 0 }, { diff --git a/2022/CVE-2022-22029.json b/2022/CVE-2022-22029.json new file mode 100644 index 0000000000..8dcf06fc4f --- /dev/null +++ b/2022/CVE-2022-22029.json @@ -0,0 +1,30 @@ +[ + { + "id": 515059719, + "name": "CVE-2022-22029-NFS-Server-", + "full_name": "mchoudhary15\/CVE-2022-22029-NFS-Server-", + "owner": { + "login": "mchoudhary15", + "id": 105639627, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105639627?v=4", + "html_url": "https:\/\/github.com\/mchoudhary15" + }, + "html_url": "https:\/\/github.com\/mchoudhary15\/CVE-2022-22029-NFS-Server-", + "description": null, + "fork": false, + "created_at": "2022-07-18T06:23:53Z", + "updated_at": "2022-07-18T08:21:24Z", + "pushed_at": "2022-07-18T06:28:35Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 7ba56ba4b5..fe72717fcc 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -44,10 +44,10 @@ "description": "POC for VMWARE CVE-2022-22954", "fork": false, "created_at": "2022-04-11T13:59:23Z", - "updated_at": "2022-07-13T19:46:57Z", + "updated_at": "2022-07-18T08:11:31Z", "pushed_at": "2022-04-13T06:15:11Z", - "stargazers_count": 270, - "watchers_count": 270, + "stargazers_count": 271, + "watchers_count": 271, "forks_count": 49, "allow_forking": true, "is_template": false, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 49, - "watchers": 270, + "watchers": 271, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index ad7e73b555..a046ffa905 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -122,10 +122,10 @@ "description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit", "fork": false, "created_at": "2022-03-31T00:24:28Z", - "updated_at": "2022-07-04T07:52:09Z", + "updated_at": "2022-07-18T09:02:47Z", "pushed_at": "2022-06-10T17:34:08Z", - "stargazers_count": 260, - "watchers_count": 260, + "stargazers_count": 259, + "watchers_count": 259, "forks_count": 204, "allow_forking": true, "is_template": false, @@ -133,7 +133,7 @@ "topics": [], "visibility": "public", "forks": 204, - "watchers": 260, + "watchers": 259, "score": 0 }, { diff --git a/2022/CVE-2022-22972.json b/2022/CVE-2022-22972.json index c96608340c..c53c3885e4 100644 --- a/2022/CVE-2022-22972.json +++ b/2022/CVE-2022-22972.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-05-24T20:19:55Z", - "updated_at": "2022-07-12T15:21:30Z", + "updated_at": "2022-07-18T08:23:48Z", "pushed_at": "2022-05-26T16:07:18Z", - "stargazers_count": 128, - "watchers_count": 128, + "stargazers_count": 130, + "watchers_count": 130, "forks_count": 27, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 128, + "watchers": 130, "score": 0 }, { diff --git a/2022/CVE-2022-23614.json b/2022/CVE-2022-23614.json new file mode 100644 index 0000000000..c463287323 --- /dev/null +++ b/2022/CVE-2022-23614.json @@ -0,0 +1,30 @@ +[ + { + "id": 515132707, + "name": "CVE-2022-23614", + "full_name": "davwwwx\/CVE-2022-23614", + "owner": { + "login": "davwwwx", + "id": 26136505, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26136505?v=4", + "html_url": "https:\/\/github.com\/davwwwx" + }, + "html_url": "https:\/\/github.com\/davwwwx\/CVE-2022-23614", + "description": "PoC for CVE-2022-23614 (Twig sort filter code execution)", + "fork": false, + "created_at": "2022-07-18T10:14:50Z", + "updated_at": "2022-07-18T10:14:50Z", + "pushed_at": "2022-07-18T10:14:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24706.json b/2022/CVE-2022-24706.json index b184308af1..8ec3436cfd 100644 --- a/2022/CVE-2022-24706.json +++ b/2022/CVE-2022-24706.json @@ -13,10 +13,10 @@ "description": "Apache CouchDB 3.2.1 - Remote Code Execution (RCE)", "fork": false, "created_at": "2022-05-20T04:28:51Z", - "updated_at": "2022-05-31T02:25:10Z", + "updated_at": "2022-07-18T09:30:49Z", "pushed_at": "2022-05-20T04:32:13Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 13, + "watchers": 14, "score": 0 }, { diff --git a/2022/CVE-2022-25845.json b/2022/CVE-2022-25845.json index 536d60c227..00c530a45e 100644 --- a/2022/CVE-2022-25845.json +++ b/2022/CVE-2022-25845.json @@ -13,10 +13,10 @@ "description": "Fastjson exploit", "fork": false, "created_at": "2022-07-09T21:56:10Z", - "updated_at": "2022-07-10T08:45:53Z", + "updated_at": "2022-07-18T12:00:48Z", "pushed_at": "2022-07-09T22:07:54Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -41,7 +41,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26133.json b/2022/CVE-2022-26133.json index a961353bd1..fd8e1e6a6d 100644 --- a/2022/CVE-2022-26133.json +++ b/2022/CVE-2022-26133.json @@ -13,10 +13,10 @@ "description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.", "fork": false, "created_at": "2022-05-09T12:07:51Z", - "updated_at": "2022-07-15T02:05:02Z", + "updated_at": "2022-07-18T06:39:31Z", "pushed_at": "2022-05-11T02:02:59Z", - "stargazers_count": 135, - "watchers_count": 135, + "stargazers_count": 136, + "watchers_count": 136, "forks_count": 34, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 135, + "watchers": 136, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 01b7f29e02..0dff209b63 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,11 +13,11 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-07-18T05:39:53Z", - "pushed_at": "2022-07-17T10:46:45Z", - "stargazers_count": 293, - "watchers_count": 293, - "forks_count": 58, + "updated_at": "2022-07-18T11:53:19Z", + "pushed_at": "2022-07-18T10:00:53Z", + "stargazers_count": 321, + "watchers_count": 321, + "forks_count": 66, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -43,8 +43,8 @@ "nday" ], "visibility": "public", - "forks": 58, - "watchers": 293, + "forks": 66, + "watchers": 321, "score": 0 }, { diff --git a/2022/CVE-2022-26135.json b/2022/CVE-2022-26135.json index 5484c116c8..df178399cb 100644 --- a/2022/CVE-2022-26135.json +++ b/2022/CVE-2022-26135.json @@ -13,10 +13,10 @@ "description": "Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)", "fork": false, "created_at": "2022-06-24T07:55:52Z", - "updated_at": "2022-07-16T13:12:54Z", + "updated_at": "2022-07-18T10:50:05Z", "pushed_at": "2022-07-05T21:13:44Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 76, + "watchers_count": 76, "forks_count": 10, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 75, + "watchers": 76, "score": 0 }, { diff --git a/2022/CVE-2022-26937.json b/2022/CVE-2022-26937.json index 79eb47905f..afc227eae3 100644 --- a/2022/CVE-2022-26937.json +++ b/2022/CVE-2022-26937.json @@ -17,13 +17,13 @@ "pushed_at": "2022-05-17T16:53:38Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 3, "score": 0 }, diff --git a/2022/CVE-2022-28346.json b/2022/CVE-2022-28346.json index 018e5499ad..183100fab4 100644 --- a/2022/CVE-2022-28346.json +++ b/2022/CVE-2022-28346.json @@ -13,7 +13,7 @@ "description": "SQL injection in QuerySet.annotate(), aggregate(), and extra()", "fork": false, "created_at": "2022-04-25T08:27:34Z", - "updated_at": "2022-07-06T02:49:01Z", + "updated_at": "2022-07-18T08:26:27Z", "pushed_at": "2022-04-25T11:18:12Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index cbd4a21496..98b2a97658 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2022-07-17T15:29:58Z", + "updated_at": "2022-07-18T08:17:15Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 291, - "watchers_count": 291, + "stargazers_count": 292, + "watchers_count": 292, "forks_count": 67, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 67, - "watchers": 291, + "watchers": 292, "score": 0 }, { @@ -75,13 +75,13 @@ "pushed_at": "2022-04-26T08:36:29Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 2, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 1, "watchers": 2, "score": 0 }, @@ -335,10 +335,10 @@ "description": "A bots loader for CVE-2022-29464 with multithreading", "fork": false, "created_at": "2022-05-15T08:51:16Z", - "updated_at": "2022-07-10T14:13:04Z", + "updated_at": "2022-07-18T07:43:46Z", "pushed_at": "2022-06-17T18:41:53Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -354,7 +354,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0 }, { diff --git a/2022/CVE-2022-29593.json b/2022/CVE-2022-29593.json index 9993d6eeba..5dd42613c2 100644 --- a/2022/CVE-2022-29593.json +++ b/2022/CVE-2022-29593.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-03-04T12:03:33Z", "updated_at": "2022-07-18T05:25:12Z", - "pushed_at": "2022-07-13T12:16:08Z", + "pushed_at": "2022-07-18T11:36:20Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 2, diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 23adb19467..c9d426ba63 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -772,10 +772,10 @@ "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。", "fork": false, "created_at": "2022-06-02T12:33:18Z", - "updated_at": "2022-07-16T12:32:30Z", + "updated_at": "2022-07-18T10:27:59Z", "pushed_at": "2022-06-06T07:19:53Z", - "stargazers_count": 308, - "watchers_count": 308, + "stargazers_count": 310, + "watchers_count": 310, "forks_count": 45, "allow_forking": true, "is_template": false, @@ -783,7 +783,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 308, + "watchers": 310, "score": 0 }, { diff --git a/2022/CVE-2022-30780.json b/2022/CVE-2022-30780.json index 966b9136e4..c100dfd196 100644 --- a/2022/CVE-2022-30780.json +++ b/2022/CVE-2022-30780.json @@ -13,10 +13,10 @@ "description": "CVE-2022-30780 - lighttpd remote denial of service", "fork": false, "created_at": "2022-05-18T12:01:17Z", - "updated_at": "2022-07-12T11:49:10Z", + "updated_at": "2022-07-18T09:33:58Z", "pushed_at": "2022-06-16T09:29:27Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 10, + "watchers": 11, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 56aca75575..59be8fcf7a 100644 --- a/README.md +++ b/README.md @@ -535,6 +535,7 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there - [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20138](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20138) +- [ShaikUsaf/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138](https://github.com/ShaikUsaf/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138) ### CVE-2022-20142 (2022-06-15) @@ -692,6 +693,14 @@ Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is uniqu - [ly4k/SpoolFool](https://github.com/ly4k/SpoolFool) +### CVE-2022-22029 (2022-07-12) + + +Windows Network File System Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22039. + + +- [mchoudhary15/CVE-2022-22029-NFS-Server-](https://github.com/mchoudhary15/CVE-2022-22029-NFS-Server-) + ### CVE-2022-22296 (2022-01-24) @@ -1149,6 +1158,14 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta - [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378) +### CVE-2022-23614 (2022-02-04) + + +Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade. + + +- [davwwwx/CVE-2022-23614](https://github.com/davwwwx/CVE-2022-23614) + ### CVE-2022-23642 (2022-02-18) @@ -3994,6 +4011,14 @@ A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_ - [jbaines-r7/badblood](https://github.com/jbaines-r7/badblood) +### CVE-2021-20138 (2021-12-09) + + +An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower router’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface. + + +- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138) + ### CVE-2021-20717 (2021-05-10) @@ -5743,6 +5768,14 @@ Windows Elevation of Privilege Vulnerability - [HuskyHacks/ShadowSteal](https://github.com/HuskyHacks/ShadowSteal) +### CVE-2021-36955 (2021-09-15) + + +Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36963, CVE-2021-38633. + + +- [JiaJinRong12138/CVE-2021-36955-EXP](https://github.com/JiaJinRong12138/CVE-2021-36955-EXP) + ### CVE-2021-37740 (2022-04-20) @@ -6638,12 +6671,10 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources) - [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832) - [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228) -- [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228) - [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV) - [avwolferen/Sitecore.Solr-log4j-mitigation](https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation) - [kek-Sec/log4j-scanner-CVE-2021-44228](https://github.com/kek-Sec/log4j-scanner-CVE-2021-44228) - [Camphul/log4shell-spring-framework-research](https://github.com/Camphul/log4shell-spring-framework-research) -- [sinakeshmiri/log4jScan](https://github.com/sinakeshmiri/log4jScan) - [0xDexter0us/Log4J-Scanner](https://github.com/0xDexter0us/Log4J-Scanner) - [LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228](https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228) - [0xsyr0/Log4Shell](https://github.com/0xsyr0/Log4Shell) @@ -25233,6 +25264,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th - [u20024804/bash-4.3-fixed-CVE-2014-6271](https://github.com/u20024804/bash-4.3-fixed-CVE-2014-6271) - [francisck/shellshock-cgi](https://github.com/francisck/shellshock-cgi) - [proclnas/ShellShock-CGI-Scan](https://github.com/proclnas/ShellShock-CGI-Scan) +- [sch3m4/RIS](https://github.com/sch3m4/RIS) - [ryeyao/CVE-2014-6271_Test](https://github.com/ryeyao/CVE-2014-6271_Test) - [cj1324/CGIShell](https://github.com/cj1324/CGIShell) - [renanvicente/puppet-shellshock](https://github.com/renanvicente/puppet-shellshock)