diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index 904c92435d..eb2770037d 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -13,10 +13,10 @@ "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", "fork": false, "created_at": "2013-09-22T21:20:31Z", - "updated_at": "2022-06-13T17:25:44Z", + "updated_at": "2022-07-28T08:46:36Z", "pushed_at": "2017-04-24T14:16:56Z", - "stargazers_count": 341, - "watchers_count": 341, + "stargazers_count": 342, + "watchers_count": 342, "forks_count": 108, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 108, - "watchers": 341, + "watchers": 342, "score": 0 }, { diff --git a/2012/CVE-2012-1823.json b/2012/CVE-2012-1823.json index 5aaef10ecf..fe7124bb20 100644 --- a/2012/CVE-2012-1823.json +++ b/2012/CVE-2012-1823.json @@ -110,5 +110,33 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 518825284, + "name": "CVE-2012-1823", + "full_name": "theykillmeslowly\/CVE-2012-1823", + "owner": { + "login": "theykillmeslowly", + "id": 108249965, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108249965?v=4", + "html_url": "https:\/\/github.com\/theykillmeslowly" + }, + "html_url": "https:\/\/github.com\/theykillmeslowly\/CVE-2012-1823", + "description": "PHP CGI Argument Injection RCE", + "fork": false, + "created_at": "2022-07-28T11:51:03Z", + "updated_at": "2022-07-28T11:52:34Z", + "pushed_at": "2022-07-28T11:52:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-3153.json b/2014/CVE-2014-3153.json index c350f83bda..2774e06a8d 100644 --- a/2014/CVE-2014-3153.json +++ b/2014/CVE-2014-3153.json @@ -69,10 +69,10 @@ "description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86", "fork": false, "created_at": "2014-09-20T08:24:15Z", - "updated_at": "2022-05-18T08:32:47Z", + "updated_at": "2022-07-28T07:00:45Z", "pushed_at": "2014-10-25T10:45:32Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 22, "allow_forking": true, "is_template": false, @@ -80,7 +80,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 44, + "watchers": 43, "score": 0 }, { diff --git a/2016/CVE-2016-8655.json b/2016/CVE-2016-8655.json index 7642a54761..95a452d00b 100644 --- a/2016/CVE-2016-8655.json +++ b/2016/CVE-2016-8655.json @@ -125,10 +125,10 @@ "description": "Android attempt at PoC CVE-2016-8655", "fork": false, "created_at": "2016-12-17T19:14:01Z", - "updated_at": "2020-10-12T10:06:42Z", + "updated_at": "2022-07-28T08:49:02Z", "pushed_at": "2017-07-01T01:41:31Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 11, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index d83e313421..e4bc33172d 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -130,10 +130,10 @@ "description": "Scan\/Exploit Blueborne CVE-2017-0785", "fork": false, "created_at": "2017-10-04T20:41:12Z", - "updated_at": "2022-04-25T06:00:11Z", + "updated_at": "2022-07-28T11:11:02Z", "pushed_at": "2018-02-28T07:04:05Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 21, "allow_forking": true, "is_template": false, @@ -141,7 +141,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 32, + "watchers": 31, "score": 0 }, { diff --git a/2017/CVE-2017-5715.json b/2017/CVE-2017-5715.json index 17a2f6ea8c..bb3da0f9e5 100644 --- a/2017/CVE-2017-5715.json +++ b/2017/CVE-2017-5715.json @@ -1,4 +1,37 @@ [ + { + "id": 116768537, + "name": "exploit-cve-2017-5715", + "full_name": "opsxcq\/exploit-cve-2017-5715", + "owner": { + "login": "opsxcq", + "id": 16995025, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4", + "html_url": "https:\/\/github.com\/opsxcq" + }, + "html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715", + "description": "Spectre exploit", + "fork": false, + "created_at": "2018-01-09T05:06:12Z", + "updated_at": "2022-07-28T11:11:03Z", + "pushed_at": "2018-01-09T22:27:25Z", + "stargazers_count": 52, + "watchers_count": 52, + "forks_count": 19, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "exploit", + "intelbug", + "memory-leak", + "spectre" + ], + "visibility": "public", + "forks": 19, + "watchers": 52, + "score": 0 + }, { "id": 117425769, "name": "meltdown-spectre-bios-list", diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 23e23621d8..d6958f4308 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -439,10 +439,10 @@ "description": "SambaCry exploit (CVE-2017-7494) ", "fork": false, "created_at": "2022-05-07T11:42:40Z", - "updated_at": "2022-07-27T15:52:22Z", + "updated_at": "2022-07-28T09:20:51Z", "pushed_at": "2022-07-21T14:45:06Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "forks_count": 6, "allow_forking": true, "is_template": false, @@ -450,7 +450,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 40, + "watchers": 41, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-7529.json b/2017/CVE-2017-7529.json index 2d00b26c9e..f24eca27b8 100644 --- a/2017/CVE-2017-7529.json +++ b/2017/CVE-2017-7529.json @@ -41,10 +41,10 @@ "description": "CVE-2017-7529_PoC", "fork": false, "created_at": "2018-06-20T15:16:10Z", - "updated_at": "2022-07-19T03:16:08Z", + "updated_at": "2022-07-28T06:20:34Z", "pushed_at": "2018-06-20T15:16:39Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 26, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 17, + "watchers": 18, "score": 0 }, { diff --git a/2018/CVE-2018-1273.json b/2018/CVE-2018-1273.json index ae00f95be2..feccd90b99 100644 --- a/2018/CVE-2018-1273.json +++ b/2018/CVE-2018-1273.json @@ -41,10 +41,10 @@ "description": "POC for CVE-2018-1273", "fork": false, "created_at": "2018-04-17T13:41:00Z", - "updated_at": "2022-07-01T01:56:05Z", + "updated_at": "2022-07-28T09:24:17Z", "pushed_at": "2018-06-05T15:07:18Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -56,7 +56,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 23, + "watchers": 24, "score": 0 }, { diff --git a/2018/CVE-2018-15961.json b/2018/CVE-2018-15961.json index 3ced73b522..febce8b388 100644 --- a/2018/CVE-2018-15961.json +++ b/2018/CVE-2018-15961.json @@ -17,7 +17,7 @@ "pushed_at": "2018-12-11T16:06:39Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,7 +29,7 @@ "vulnerability" ], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 9, "score": 0 }, @@ -107,13 +107,13 @@ "pushed_at": "2021-06-30T08:27:22Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 1, "score": 0 }, diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json index 363de66a45..4aa68a8a11 100644 --- a/2019/CVE-2019-11358.json +++ b/2019/CVE-2019-11358.json @@ -121,13 +121,13 @@ "pushed_at": "2021-03-08T11:46:49Z", "stargazers_count": 26, "watchers_count": 26, - "forks_count": 26, + "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 26, + "forks": 25, "watchers": 26, "score": 0 }, diff --git a/2019/CVE-2019-15514.json b/2019/CVE-2019-15514.json index cc169ffcda..bc4a983616 100644 --- a/2019/CVE-2019-15514.json +++ b/2019/CVE-2019-15514.json @@ -17,7 +17,7 @@ "pushed_at": "2021-12-19T18:18:36Z", "stargazers_count": 58, "watchers_count": 58, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -34,7 +34,7 @@ "telethon" ], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 58, "score": 0 } diff --git a/2019/CVE-2019-7192.json b/2019/CVE-2019-7192.json index d39e545c4a..a1554167cf 100644 --- a/2019/CVE-2019-7192.json +++ b/2019/CVE-2019-7192.json @@ -13,10 +13,10 @@ "description": "Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)", "fork": false, "created_at": "2020-05-21T09:14:28Z", - "updated_at": "2022-04-18T19:30:41Z", + "updated_at": "2022-07-28T10:48:57Z", "pushed_at": "2021-06-10T07:24:54Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 5, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 9, + "watchers": 10, "score": 0 }, { @@ -41,10 +41,10 @@ "description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)", "fork": false, "created_at": "2020-05-24T15:44:29Z", - "updated_at": "2022-07-26T10:33:32Z", + "updated_at": "2022-07-28T10:46:28Z", "pushed_at": "2020-05-24T16:28:46Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 32, "allow_forking": true, "is_template": false, @@ -55,7 +55,7 @@ ], "visibility": "public", "forks": 32, - "watchers": 66, + "watchers": 67, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2509.json b/2020/CVE-2020-2509.json index f2db326e94..28f455f9d5 100644 --- a/2020/CVE-2020-2509.json +++ b/2020/CVE-2020-2509.json @@ -13,10 +13,10 @@ "description": "QNAP N-Day (Probably not CVE-2020-2509)", "fork": false, "created_at": "2022-07-27T19:58:40Z", - "updated_at": "2022-07-27T20:55:06Z", + "updated_at": "2022-07-28T10:52:56Z", "pushed_at": "2022-07-27T20:53:38Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 9e0a0c91dd..3088867782 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -178,10 +178,10 @@ "description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。", "fork": false, "created_at": "2020-05-16T03:01:32Z", - "updated_at": "2022-06-25T03:46:52Z", + "updated_at": "2022-07-28T07:25:00Z", "pushed_at": "2020-05-17T12:07:01Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 69, + "watchers_count": 69, "forks_count": 24, "allow_forking": true, "is_template": false, @@ -189,7 +189,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 68, + "watchers": 69, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index b6e3e7cd94..f7f3b468bd 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -102,10 +102,10 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2022-07-24T17:48:23Z", + "updated_at": "2022-07-28T06:38:43Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 412, - "watchers_count": 412, + "stargazers_count": 414, + "watchers_count": 414, "forks_count": 61, "allow_forking": true, "is_template": false, @@ -113,7 +113,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 412, + "watchers": 414, "score": 0 }, { diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index 30771e7405..064f4fc137 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -269,13 +269,13 @@ "pushed_at": "2021-02-10T00:01:45Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 3, "score": 0 }, diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json index 42818cbba8..6173b80dd6 100644 --- a/2021/CVE-2021-26943.json +++ b/2021/CVE-2021-26943.json @@ -13,10 +13,10 @@ "description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.", "fork": false, "created_at": "2020-12-31T16:30:02Z", - "updated_at": "2022-07-21T03:05:23Z", + "updated_at": "2022-07-28T12:15:35Z", "pushed_at": "2021-03-29T12:33:38Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 90, + "watchers_count": 90, "forks_count": 18, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 18, - "watchers": 89, + "watchers": 90, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-31805.json b/2021/CVE-2021-31805.json index 2f0d90525e..5d405fc282 100644 --- a/2021/CVE-2021-31805.json +++ b/2021/CVE-2021-31805.json @@ -13,10 +13,10 @@ "description": "远程代码执行S2-062 CVE-2021-31805验证POC", "fork": false, "created_at": "2022-04-15T01:50:14Z", - "updated_at": "2022-07-27T07:13:28Z", + "updated_at": "2022-07-28T09:56:34Z", "pushed_at": "2022-04-17T08:19:59Z", - "stargazers_count": 123, - "watchers_count": 123, + "stargazers_count": 124, + "watchers_count": 124, "forks_count": 56, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 123, + "watchers": 124, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index aef63c8a6e..9f225cbd52 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -1884,10 +1884,10 @@ "description": "Proof of concept for pwnkit vulnerability", "fork": false, "created_at": "2022-01-27T14:43:57Z", - "updated_at": "2022-07-27T21:08:09Z", + "updated_at": "2022-07-28T11:56:00Z", "pushed_at": "2022-04-19T12:33:32Z", - "stargazers_count": 291, - "watchers_count": 291, + "stargazers_count": 292, + "watchers_count": 292, "forks_count": 35, "allow_forking": true, "is_template": false, @@ -1895,7 +1895,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 291, + "watchers": 292, "score": 0 }, { diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index c334858fab..e49ee4f2f8 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -328,5 +328,33 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 518780226, + "name": "CVE-2021-42013", + "full_name": "theykillmeslowly\/CVE-2021-42013", + "owner": { + "login": "theykillmeslowly", + "id": 108249965, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108249965?v=4", + "html_url": "https:\/\/github.com\/theykillmeslowly" + }, + "html_url": "https:\/\/github.com\/theykillmeslowly\/CVE-2021-42013", + "description": "Apache 2.4.49-50 Remote Code Execution Exploit", + "fork": false, + "created_at": "2022-07-28T09:21:50Z", + "updated_at": "2022-07-28T09:24:11Z", + "pushed_at": "2022-07-28T09:53:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index c6bbdad00c..9b2c91fdad 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2022-07-27T11:38:11Z", + "updated_at": "2022-07-28T08:08:07Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 827, - "watchers_count": 827, + "stargazers_count": 828, + "watchers_count": 828, "forks_count": 176, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 176, - "watchers": 827, + "watchers": 828, "score": 0 }, { @@ -46,10 +46,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2022-07-27T03:12:46Z", + "updated_at": "2022-07-28T08:08:01Z", "pushed_at": "2022-04-25T07:53:41Z", - "stargazers_count": 367, - "watchers_count": 367, + "stargazers_count": 368, + "watchers_count": 368, "forks_count": 75, "allow_forking": true, "is_template": false, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 75, - "watchers": 367, + "watchers": 368, "score": 0 }, { diff --git a/2021/CVE-2021-43789.json b/2021/CVE-2021-43789.json index 38f7316f88..9df98cbbbe 100644 --- a/2021/CVE-2021-43789.json +++ b/2021/CVE-2021-43789.json @@ -13,10 +13,10 @@ "description": "Prestashop >= 1.7.5.0 < 1.7.8.2 - SQL injection", "fork": false, "created_at": "2022-01-28T00:26:40Z", - "updated_at": "2022-04-24T07:24:34Z", + "updated_at": "2022-07-28T09:56:20Z", "pushed_at": "2022-01-28T00:27:12Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index abf592b3f1..d31f381067 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -675,10 +675,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-07-26T12:20:59Z", + "updated_at": "2022-07-28T09:59:10Z", "pushed_at": "2022-06-02T02:16:13Z", - "stargazers_count": 460, - "watchers_count": 460, + "stargazers_count": 461, + "watchers_count": 461, "forks_count": 95, "allow_forking": true, "is_template": false, @@ -691,7 +691,7 @@ ], "visibility": "public", "forks": 95, - "watchers": 460, + "watchers": 461, "score": 0 }, { @@ -2580,34 +2580,6 @@ "watchers": 0, "score": 0 }, - { - "id": 438003225, - "name": "log4j-test", - "full_name": "strawhatasif\/log4j-test", - "owner": { - "login": "strawhatasif", - "id": 10750101, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4", - "html_url": "https:\/\/github.com\/strawhatasif" - }, - "html_url": "https:\/\/github.com\/strawhatasif\/log4j-test", - "description": "Demonstration of CVE-2021-44228 with a possible strategic fix.", - "fork": false, - "created_at": "2021-12-13T19:43:01Z", - "updated_at": "2021-12-13T20:26:40Z", - "pushed_at": "2021-12-13T20:26:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 438012376, "name": "nmap-log4shell", @@ -8536,7 +8508,7 @@ "fork": false, "created_at": "2022-02-12T11:19:41Z", "updated_at": "2022-07-13T00:54:21Z", - "pushed_at": "2022-07-27T14:19:04Z", + "pushed_at": "2022-07-28T09:48:15Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json index 4e62eb6f93..2e27184b9d 100644 --- a/2022/CVE-2022-0543.json +++ b/2022/CVE-2022-0543.json @@ -17,13 +17,13 @@ "pushed_at": "2022-07-23T23:14:02Z", "stargazers_count": 59, "watchers_count": 59, - "forks_count": 22, + "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 22, + "forks": 23, "watchers": 59, "score": 0 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index a16db878a7..825b714f1e 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -129,13 +129,13 @@ "pushed_at": "2022-03-08T06:20:05Z", "stargazers_count": 956, "watchers_count": 956, - "forks_count": 207, + "forks_count": 208, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 207, + "forks": 208, "watchers": 956, "score": 0 }, diff --git a/2022/CVE-2022-1421.json b/2022/CVE-2022-1421.json index 587946a1ac..51872b0429 100644 --- a/2022/CVE-2022-1421.json +++ b/2022/CVE-2022-1421.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-07-12T14:34:48Z", - "updated_at": "2022-07-13T05:56:52Z", + "updated_at": "2022-07-28T10:14:20Z", "pushed_at": "2022-07-12T14:42:21Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-2022.json b/2022/CVE-2022-2022.json new file mode 100644 index 0000000000..8dfe0594e0 --- /dev/null +++ b/2022/CVE-2022-2022.json @@ -0,0 +1,30 @@ +[ + { + "id": 430706849, + "name": "pxplan", + "full_name": "GREENHAT7\/pxplan", + "owner": { + "login": "GREENHAT7", + "id": 94844022, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94844022?v=4", + "html_url": "https:\/\/github.com\/GREENHAT7" + }, + "html_url": "https:\/\/github.com\/GREENHAT7\/pxplan", + "description": "CVE-2022-2022", + "fork": false, + "created_at": "2021-11-22T12:57:22Z", + "updated_at": "2022-07-28T12:23:44Z", + "pushed_at": "2022-07-27T07:01:33Z", + "stargazers_count": 70, + "watchers_count": 70, + "forks_count": 34, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 34, + "watchers": 70, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22536.json b/2022/CVE-2022-22536.json index 28412224da..1fa76c38c0 100644 --- a/2022/CVE-2022-22536.json +++ b/2022/CVE-2022-22536.json @@ -13,10 +13,10 @@ "description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.", "fork": false, "created_at": "2022-02-15T09:22:19Z", - "updated_at": "2022-07-14T12:13:25Z", + "updated_at": "2022-07-28T06:47:19Z", "pushed_at": "2022-02-21T08:58:22Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 13, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 46, + "watchers": 47, "score": 0 }, { diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 6d9d4fb4a8..c085a594e1 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -547,10 +547,10 @@ "description": "Spring Cloud Gateway远程代码执行漏洞POC,基于命令执行的基础上,增加了反弹shell操作", "fork": false, "created_at": "2022-03-07T07:24:13Z", - "updated_at": "2022-05-20T10:11:30Z", + "updated_at": "2022-07-28T06:28:47Z", "pushed_at": "2022-03-09T05:43:23Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -558,7 +558,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index b0bc272c6d..0626f36bb8 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -520,18 +520,18 @@ "description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960", "fork": false, "created_at": "2022-06-01T19:33:32Z", - "updated_at": "2022-06-26T09:49:47Z", + "updated_at": "2022-07-28T09:26:29Z", "pushed_at": "2022-06-01T23:50:18Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 3, + "stargazers_count": 21, + "watchers_count": 21, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 20, + "forks": 4, + "watchers": 21, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index c909c7d04b..65f8959caa 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -17,7 +17,7 @@ "pushed_at": "2022-07-14T14:55:24Z", "stargazers_count": 289, "watchers_count": 289, - "forks_count": 93, + "forks_count": 94, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -32,7 +32,7 @@ "tomcat" ], "visibility": "public", - "forks": 93, + "forks": 94, "watchers": 289, "score": 0 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index dbac576d8b..08a9f61ac1 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-07-28T05:08:27Z", - "pushed_at": "2022-07-28T02:55:10Z", - "stargazers_count": 541, - "watchers_count": 541, + "updated_at": "2022-07-28T10:31:16Z", + "pushed_at": "2022-07-28T11:12:35Z", + "stargazers_count": 544, + "watchers_count": 544, "forks_count": 97, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 97, - "watchers": 541, + "watchers": 544, "score": 0 }, { @@ -214,7 +214,7 @@ "pushed_at": "2022-06-06T20:24:06Z", "stargazers_count": 250, "watchers_count": 250, - "forks_count": 68, + "forks_count": 70, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -232,7 +232,7 @@ "vulnerability" ], "visibility": "public", - "forks": 68, + "forks": 70, "watchers": 250, "score": 0 }, diff --git a/2022/CVE-2022-26138.json b/2022/CVE-2022-26138.json index 786b8d6f1f..eb450614b8 100644 --- a/2022/CVE-2022-26138.json +++ b/2022/CVE-2022-26138.json @@ -88,5 +88,33 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 518788417, + "name": "Confluence-Question-CVE-2022-26138-", + "full_name": "Vulnmachines\/Confluence-Question-CVE-2022-26138-", + "owner": { + "login": "Vulnmachines", + "id": 79006904, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", + "html_url": "https:\/\/github.com\/Vulnmachines" + }, + "html_url": "https:\/\/github.com\/Vulnmachines\/Confluence-Question-CVE-2022-26138-", + "description": "Atlassian Confluence Server and Data Center: CVE-2022-26138", + "fork": false, + "created_at": "2022-07-28T09:48:21Z", + "updated_at": "2022-07-28T09:48:21Z", + "pushed_at": "2022-07-28T09:59:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index 57591ed3c8..a3f4171832 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -329,7 +329,7 @@ "pushed_at": "2022-05-22T14:08:38Z", "stargazers_count": 16, "watchers_count": 16, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -342,7 +342,7 @@ "windows" ], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 16, "score": 0 }, @@ -640,18 +640,18 @@ "description": "警惕 一种针对红队的新型溯源手段!", "fork": false, "created_at": "2022-07-27T15:48:19Z", - "updated_at": "2022-07-28T06:19:25Z", + "updated_at": "2022-07-28T12:29:21Z", "pushed_at": "2022-07-27T15:55:01Z", - "stargazers_count": 61, - "watchers_count": 61, - "forks_count": 11, + "stargazers_count": 109, + "watchers_count": 109, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, - "watchers": 61, + "forks": 17, + "watchers": 109, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27254.json b/2022/CVE-2022-27254.json index 3eb852580b..a7a75fb03b 100644 --- a/2022/CVE-2022-27254.json +++ b/2022/CVE-2022-27254.json @@ -13,10 +13,10 @@ "description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)", "fork": false, "created_at": "2022-03-23T15:03:09Z", - "updated_at": "2022-07-27T07:13:27Z", + "updated_at": "2022-07-28T12:05:42Z", "pushed_at": "2022-03-26T05:52:15Z", - "stargazers_count": 369, - "watchers_count": 369, + "stargazers_count": 370, + "watchers_count": 370, "forks_count": 50, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 369, + "watchers": 370, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 1f11773a5d..71dd04d19b 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -426,7 +426,7 @@ "fork": false, "created_at": "2022-06-01T11:37:08Z", "updated_at": "2022-07-25T16:16:05Z", - "pushed_at": "2022-06-07T08:35:35Z", + "pushed_at": "2022-07-28T10:56:46Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 4, diff --git a/2022/CVE-2022-31101.json b/2022/CVE-2022-31101.json index ef30023d78..8f516c9f64 100644 --- a/2022/CVE-2022-31101.json +++ b/2022/CVE-2022-31101.json @@ -13,10 +13,10 @@ "description": "Major Security Vulnerability on PrestaShop Websites - CVE-2022-31101", "fork": false, "created_at": "2022-07-24T21:50:13Z", - "updated_at": "2022-07-28T00:19:21Z", + "updated_at": "2022-07-28T12:17:23Z", "pushed_at": "2022-07-27T10:03:54Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 16, + "watchers": 17, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json index d49e6a91c0..e3ccabb90f 100644 --- a/2022/CVE-2022-34918.json +++ b/2022/CVE-2022-34918.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-07-19T12:46:45Z", - "updated_at": "2022-07-28T02:31:28Z", + "updated_at": "2022-07-28T10:13:29Z", "pushed_at": "2022-07-25T21:24:15Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "forks_count": 20, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 169, + "watchers": 170, "score": 0 }, { diff --git a/2022/CVE-2022-31181.json b/2022/CVE-2022-36408.json similarity index 76% rename from 2022/CVE-2022-31181.json rename to 2022/CVE-2022-36408.json index 6a5c3937ac..c5a097b5da 100644 --- a/2022/CVE-2022-31181.json +++ b/2022/CVE-2022-36408.json @@ -1,20 +1,20 @@ [ { "id": 517931760, - "name": "lblfixer_cve_2022_31181", - "full_name": "drkbcn\/lblfixer_cve_2022_31181", + "name": "lblfixer_cve_2022_36408", + "full_name": "drkbcn\/lblfixer_cve_2022_36408", "owner": { "login": "drkbcn", "id": 2090227, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2090227?v=4", "html_url": "https:\/\/github.com\/drkbcn" }, - "html_url": "https:\/\/github.com\/drkbcn\/lblfixer_cve_2022_31181", - "description": "Module for PrestaShop 1.6.1.X\/1.7.X to fix CVE-2022-31181 vulnerability (Chain SQL Injection)", + "html_url": "https:\/\/github.com\/drkbcn\/lblfixer_cve_2022_36408", + "description": "Module for PrestaShop 1.6.1.X\/1.7.X to fix CVE-2022-36408 \/ CVE-2022-31181 vulnerability (Chain SQL Injection)", "fork": false, "created_at": "2022-07-26T05:55:53Z", - "updated_at": "2022-07-27T06:58:05Z", - "pushed_at": "2022-07-27T06:42:32Z", + "updated_at": "2022-07-28T07:07:11Z", + "pushed_at": "2022-07-28T07:14:03Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2022/CVE-2022-36946.json b/2022/CVE-2022-36946.json new file mode 100644 index 0000000000..2a25c3f3bc --- /dev/null +++ b/2022/CVE-2022-36946.json @@ -0,0 +1,30 @@ +[ + { + "id": 518816810, + "name": "CVE-2022-36946", + "full_name": "Pwnzer0tt1\/CVE-2022-36946", + "owner": { + "login": "Pwnzer0tt1", + "id": 107208935, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107208935?v=4", + "html_url": "https:\/\/github.com\/Pwnzer0tt1" + }, + "html_url": "https:\/\/github.com\/Pwnzer0tt1\/CVE-2022-36946", + "description": null, + "fork": false, + "created_at": "2022-07-28T11:22:13Z", + "updated_at": "2022-07-28T11:50:57Z", + "pushed_at": "2022-07-28T11:22:14Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index a70f3bd489..065751c291 100644 --- a/README.md +++ b/README.md @@ -460,6 +460,14 @@ The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (ev ### CVE-2022-1972 - [randorisec/CVE-2022-1972-infoleak-PoC](https://github.com/randorisec/CVE-2022-1972-infoleak-PoC) +### CVE-2022-2022 (2022-06-07) + + +Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.7. + + +- [GREENHAT7/pxplan](https://github.com/GREENHAT7/pxplan) + ### CVE-2022-2097 (2022-07-05) @@ -1799,6 +1807,7 @@ The Atlassian Questions For Confluence app for Confluence Server and Data Center - [alcaparra/CVE-2022-26138](https://github.com/alcaparra/CVE-2022-26138) - [1mxml/CVE-2022-26138](https://github.com/1mxml/CVE-2022-26138) - [Daro1967/CVE-2022-26138-RCE](https://github.com/Daro1967/CVE-2022-26138-RCE) +- [Vulnmachines/Confluence-Question-CVE-2022-26138-](https://github.com/Vulnmachines/Confluence-Question-CVE-2022-26138-) ### CVE-2022-26155 (2022-02-28) @@ -2650,9 +2659,6 @@ mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an - [ly1g3/Mailcow-CVE-2022-31138](https://github.com/ly1g3/Mailcow-CVE-2022-31138) -### CVE-2022-31181 -- [drkbcn/lblfixer_cve_2022_31181](https://github.com/drkbcn/lblfixer_cve_2022_31181) - ### CVE-2022-31245 (2022-05-20) @@ -2935,6 +2941,22 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD - [AngeloPioAmirante/CVE-2022-35899](https://github.com/AngeloPioAmirante/CVE-2022-35899) +### CVE-2022-36408 (2022-07-22) + + +PrestaShop 1.6.0.10 through 1.7.x before 1.7.8.7 allows remote attackers to execute arbitrary code, aka a "previously unknown vulnerability chain" related to SQL injection and MySQL Smarty cache storage injection, as exploited in the wild in July 2022. + + +- [drkbcn/lblfixer_cve_2022_36408](https://github.com/drkbcn/lblfixer_cve_2022_36408) + +### CVE-2022-36946 (2022-07-27) + + +nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len. + + +- [Pwnzer0tt1/CVE-2022-36946](https://github.com/Pwnzer0tt1/CVE-2022-36946) + ## 2021 ### CVE-2021-0302 (2021-02-10) @@ -6332,6 +6354,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in - [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013) - [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013) - [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013) +- [theykillmeslowly/CVE-2021-42013](https://github.com/theykillmeslowly/CVE-2021-42013) ### CVE-2021-42056 (2022-06-24) @@ -6857,7 +6880,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [rodfer0x80/log4j2-prosecutor](https://github.com/rodfer0x80/log4j2-prosecutor) - [lfama/log4j_checker](https://github.com/lfama/log4j_checker) - [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info) -- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test) - [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell) - [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228) - [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example) @@ -20948,6 +20970,7 @@ Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletio Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. +- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715) - [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list) - [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment) - [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit) @@ -26245,6 +26268,7 @@ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured - [tardummy01/oscp_scripts-1](https://github.com/tardummy01/oscp_scripts-1) - [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2) - [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823) +- [theykillmeslowly/CVE-2012-1823](https://github.com/theykillmeslowly/CVE-2012-1823) ### CVE-2012-1870 (2012-07-10)