diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json
index 904c92435d..eb2770037d 100644
--- a/2008/CVE-2008-0166.json
+++ b/2008/CVE-2008-0166.json
@@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
- "updated_at": "2022-06-13T17:25:44Z",
+ "updated_at": "2022-07-28T08:46:36Z",
"pushed_at": "2017-04-24T14:16:56Z",
- "stargazers_count": 341,
- "watchers_count": 341,
+ "stargazers_count": 342,
+ "watchers_count": 342,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
@@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 108,
- "watchers": 341,
+ "watchers": 342,
"score": 0
},
{
diff --git a/2012/CVE-2012-1823.json b/2012/CVE-2012-1823.json
index 5aaef10ecf..fe7124bb20 100644
--- a/2012/CVE-2012-1823.json
+++ b/2012/CVE-2012-1823.json
@@ -110,5 +110,33 @@
"forks": 1,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 518825284,
+ "name": "CVE-2012-1823",
+ "full_name": "theykillmeslowly\/CVE-2012-1823",
+ "owner": {
+ "login": "theykillmeslowly",
+ "id": 108249965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108249965?v=4",
+ "html_url": "https:\/\/github.com\/theykillmeslowly"
+ },
+ "html_url": "https:\/\/github.com\/theykillmeslowly\/CVE-2012-1823",
+ "description": "PHP CGI Argument Injection RCE",
+ "fork": false,
+ "created_at": "2022-07-28T11:51:03Z",
+ "updated_at": "2022-07-28T11:52:34Z",
+ "pushed_at": "2022-07-28T11:52:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2014/CVE-2014-3153.json b/2014/CVE-2014-3153.json
index c350f83bda..2774e06a8d 100644
--- a/2014/CVE-2014-3153.json
+++ b/2014/CVE-2014-3153.json
@@ -69,10 +69,10 @@
"description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86",
"fork": false,
"created_at": "2014-09-20T08:24:15Z",
- "updated_at": "2022-05-18T08:32:47Z",
+ "updated_at": "2022-07-28T07:00:45Z",
"pushed_at": "2014-10-25T10:45:32Z",
- "stargazers_count": 44,
- "watchers_count": 44,
+ "stargazers_count": 43,
+ "watchers_count": 43,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
- "watchers": 44,
+ "watchers": 43,
"score": 0
},
{
diff --git a/2016/CVE-2016-8655.json b/2016/CVE-2016-8655.json
index 7642a54761..95a452d00b 100644
--- a/2016/CVE-2016-8655.json
+++ b/2016/CVE-2016-8655.json
@@ -125,10 +125,10 @@
"description": "Android attempt at PoC CVE-2016-8655",
"fork": false,
"created_at": "2016-12-17T19:14:01Z",
- "updated_at": "2020-10-12T10:06:42Z",
+ "updated_at": "2022-07-28T08:49:02Z",
"pushed_at": "2017-07-01T01:41:31Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 11,
+ "watchers": 12,
"score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json
index d83e313421..e4bc33172d 100644
--- a/2017/CVE-2017-0785.json
+++ b/2017/CVE-2017-0785.json
@@ -130,10 +130,10 @@
"description": "Scan\/Exploit Blueborne CVE-2017-0785",
"fork": false,
"created_at": "2017-10-04T20:41:12Z",
- "updated_at": "2022-04-25T06:00:11Z",
+ "updated_at": "2022-07-28T11:11:02Z",
"pushed_at": "2018-02-28T07:04:05Z",
- "stargazers_count": 32,
- "watchers_count": 32,
+ "stargazers_count": 31,
+ "watchers_count": 31,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
- "watchers": 32,
+ "watchers": 31,
"score": 0
},
{
diff --git a/2017/CVE-2017-5715.json b/2017/CVE-2017-5715.json
index 17a2f6ea8c..bb3da0f9e5 100644
--- a/2017/CVE-2017-5715.json
+++ b/2017/CVE-2017-5715.json
@@ -1,4 +1,37 @@
[
+ {
+ "id": 116768537,
+ "name": "exploit-cve-2017-5715",
+ "full_name": "opsxcq\/exploit-cve-2017-5715",
+ "owner": {
+ "login": "opsxcq",
+ "id": 16995025,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
+ "html_url": "https:\/\/github.com\/opsxcq"
+ },
+ "html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
+ "description": "Spectre exploit",
+ "fork": false,
+ "created_at": "2018-01-09T05:06:12Z",
+ "updated_at": "2022-07-28T11:11:03Z",
+ "pushed_at": "2018-01-09T22:27:25Z",
+ "stargazers_count": 52,
+ "watchers_count": 52,
+ "forks_count": 19,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploit",
+ "intelbug",
+ "memory-leak",
+ "spectre"
+ ],
+ "visibility": "public",
+ "forks": 19,
+ "watchers": 52,
+ "score": 0
+ },
{
"id": 117425769,
"name": "meltdown-spectre-bios-list",
diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json
index 23e23621d8..d6958f4308 100644
--- a/2017/CVE-2017-7494.json
+++ b/2017/CVE-2017-7494.json
@@ -439,10 +439,10 @@
"description": "SambaCry exploit (CVE-2017-7494) ",
"fork": false,
"created_at": "2022-05-07T11:42:40Z",
- "updated_at": "2022-07-27T15:52:22Z",
+ "updated_at": "2022-07-28T09:20:51Z",
"pushed_at": "2022-07-21T14:45:06Z",
- "stargazers_count": 40,
- "watchers_count": 40,
+ "stargazers_count": 41,
+ "watchers_count": 41,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@@ -450,7 +450,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 40,
+ "watchers": 41,
"score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-7529.json b/2017/CVE-2017-7529.json
index 2d00b26c9e..f24eca27b8 100644
--- a/2017/CVE-2017-7529.json
+++ b/2017/CVE-2017-7529.json
@@ -41,10 +41,10 @@
"description": "CVE-2017-7529_PoC",
"fork": false,
"created_at": "2018-06-20T15:16:10Z",
- "updated_at": "2022-07-19T03:16:08Z",
+ "updated_at": "2022-07-28T06:20:34Z",
"pushed_at": "2018-06-20T15:16:39Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
- "watchers": 17,
+ "watchers": 18,
"score": 0
},
{
diff --git a/2018/CVE-2018-1273.json b/2018/CVE-2018-1273.json
index ae00f95be2..feccd90b99 100644
--- a/2018/CVE-2018-1273.json
+++ b/2018/CVE-2018-1273.json
@@ -41,10 +41,10 @@
"description": "POC for CVE-2018-1273",
"fork": false,
"created_at": "2018-04-17T13:41:00Z",
- "updated_at": "2022-07-01T01:56:05Z",
+ "updated_at": "2022-07-28T09:24:17Z",
"pushed_at": "2018-06-05T15:07:18Z",
- "stargazers_count": 23,
- "watchers_count": 23,
+ "stargazers_count": 24,
+ "watchers_count": 24,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@@ -56,7 +56,7 @@
],
"visibility": "public",
"forks": 9,
- "watchers": 23,
+ "watchers": 24,
"score": 0
},
{
diff --git a/2018/CVE-2018-15961.json b/2018/CVE-2018-15961.json
index 3ced73b522..febce8b388 100644
--- a/2018/CVE-2018-15961.json
+++ b/2018/CVE-2018-15961.json
@@ -17,7 +17,7 @@
"pushed_at": "2018-12-11T16:06:39Z",
"stargazers_count": 9,
"watchers_count": 9,
- "forks_count": 5,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -29,7 +29,7 @@
"vulnerability"
],
"visibility": "public",
- "forks": 5,
+ "forks": 6,
"watchers": 9,
"score": 0
},
@@ -107,13 +107,13 @@
"pushed_at": "2021-06-30T08:27:22Z",
"stargazers_count": 1,
"watchers_count": 1,
- "forks_count": 3,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 3,
+ "forks": 4,
"watchers": 1,
"score": 0
},
diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json
index 363de66a45..4aa68a8a11 100644
--- a/2019/CVE-2019-11358.json
+++ b/2019/CVE-2019-11358.json
@@ -121,13 +121,13 @@
"pushed_at": "2021-03-08T11:46:49Z",
"stargazers_count": 26,
"watchers_count": 26,
- "forks_count": 26,
+ "forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 26,
+ "forks": 25,
"watchers": 26,
"score": 0
},
diff --git a/2019/CVE-2019-15514.json b/2019/CVE-2019-15514.json
index cc169ffcda..bc4a983616 100644
--- a/2019/CVE-2019-15514.json
+++ b/2019/CVE-2019-15514.json
@@ -17,7 +17,7 @@
"pushed_at": "2021-12-19T18:18:36Z",
"stargazers_count": 58,
"watchers_count": 58,
- "forks_count": 12,
+ "forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -34,7 +34,7 @@
"telethon"
],
"visibility": "public",
- "forks": 12,
+ "forks": 13,
"watchers": 58,
"score": 0
}
diff --git a/2019/CVE-2019-7192.json b/2019/CVE-2019-7192.json
index d39e545c4a..a1554167cf 100644
--- a/2019/CVE-2019-7192.json
+++ b/2019/CVE-2019-7192.json
@@ -13,10 +13,10 @@
"description": "Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)",
"fork": false,
"created_at": "2020-05-21T09:14:28Z",
- "updated_at": "2022-04-18T19:30:41Z",
+ "updated_at": "2022-07-28T10:48:57Z",
"pushed_at": "2021-06-10T07:24:54Z",
- "stargazers_count": 9,
- "watchers_count": 9,
+ "stargazers_count": 10,
+ "watchers_count": 10,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 9,
+ "watchers": 10,
"score": 0
},
{
@@ -41,10 +41,10 @@
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
"fork": false,
"created_at": "2020-05-24T15:44:29Z",
- "updated_at": "2022-07-26T10:33:32Z",
+ "updated_at": "2022-07-28T10:46:28Z",
"pushed_at": "2020-05-24T16:28:46Z",
- "stargazers_count": 66,
- "watchers_count": 66,
+ "stargazers_count": 67,
+ "watchers_count": 67,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@@ -55,7 +55,7 @@
],
"visibility": "public",
"forks": 32,
- "watchers": 66,
+ "watchers": 67,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-2509.json b/2020/CVE-2020-2509.json
index f2db326e94..28f455f9d5 100644
--- a/2020/CVE-2020-2509.json
+++ b/2020/CVE-2020-2509.json
@@ -13,10 +13,10 @@
"description": "QNAP N-Day (Probably not CVE-2020-2509)",
"fork": false,
"created_at": "2022-07-27T19:58:40Z",
- "updated_at": "2022-07-27T20:55:06Z",
+ "updated_at": "2022-07-28T10:52:56Z",
"pushed_at": "2022-07-27T20:53:38Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 5,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 9e0a0c91dd..3088867782 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -178,10 +178,10 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
- "updated_at": "2022-06-25T03:46:52Z",
+ "updated_at": "2022-07-28T07:25:00Z",
"pushed_at": "2020-05-17T12:07:01Z",
- "stargazers_count": 68,
- "watchers_count": 68,
+ "stargazers_count": 69,
+ "watchers_count": 69,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@@ -189,7 +189,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
- "watchers": 68,
+ "watchers": 69,
"score": 0
},
{
diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json
index b6e3e7cd94..f7f3b468bd 100644
--- a/2020/CVE-2020-2883.json
+++ b/2020/CVE-2020-2883.json
@@ -102,10 +102,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
- "updated_at": "2022-07-24T17:48:23Z",
+ "updated_at": "2022-07-28T06:38:43Z",
"pushed_at": "2020-08-25T03:17:32Z",
- "stargazers_count": 412,
- "watchers_count": 412,
+ "stargazers_count": 414,
+ "watchers_count": 414,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
@@ -113,7 +113,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
- "watchers": 412,
+ "watchers": 414,
"score": 0
},
{
diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json
index 30771e7405..064f4fc137 100644
--- a/2020/CVE-2020-9484.json
+++ b/2020/CVE-2020-9484.json
@@ -269,13 +269,13 @@
"pushed_at": "2021-02-10T00:01:45Z",
"stargazers_count": 3,
"watchers_count": 3,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 3,
"score": 0
},
diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json
index 42818cbba8..6173b80dd6 100644
--- a/2021/CVE-2021-26943.json
+++ b/2021/CVE-2021-26943.json
@@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
- "updated_at": "2022-07-21T03:05:23Z",
+ "updated_at": "2022-07-28T12:15:35Z",
"pushed_at": "2021-03-29T12:33:38Z",
- "stargazers_count": 89,
- "watchers_count": 89,
+ "stargazers_count": 90,
+ "watchers_count": 90,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 18,
- "watchers": 89,
+ "watchers": 90,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-31805.json b/2021/CVE-2021-31805.json
index 2f0d90525e..5d405fc282 100644
--- a/2021/CVE-2021-31805.json
+++ b/2021/CVE-2021-31805.json
@@ -13,10 +13,10 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
- "updated_at": "2022-07-27T07:13:28Z",
+ "updated_at": "2022-07-28T09:56:34Z",
"pushed_at": "2022-04-17T08:19:59Z",
- "stargazers_count": 123,
- "watchers_count": 123,
+ "stargazers_count": 124,
+ "watchers_count": 124,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
- "watchers": 123,
+ "watchers": 124,
"score": 0
},
{
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index aef63c8a6e..9f225cbd52 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -1884,10 +1884,10 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
- "updated_at": "2022-07-27T21:08:09Z",
+ "updated_at": "2022-07-28T11:56:00Z",
"pushed_at": "2022-04-19T12:33:32Z",
- "stargazers_count": 291,
- "watchers_count": 291,
+ "stargazers_count": 292,
+ "watchers_count": 292,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@@ -1895,7 +1895,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
- "watchers": 291,
+ "watchers": 292,
"score": 0
},
{
diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json
index c334858fab..e49ee4f2f8 100644
--- a/2021/CVE-2021-42013.json
+++ b/2021/CVE-2021-42013.json
@@ -328,5 +328,33 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 518780226,
+ "name": "CVE-2021-42013",
+ "full_name": "theykillmeslowly\/CVE-2021-42013",
+ "owner": {
+ "login": "theykillmeslowly",
+ "id": 108249965,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108249965?v=4",
+ "html_url": "https:\/\/github.com\/theykillmeslowly"
+ },
+ "html_url": "https:\/\/github.com\/theykillmeslowly\/CVE-2021-42013",
+ "description": "Apache 2.4.49-50 Remote Code Execution Exploit",
+ "fork": false,
+ "created_at": "2022-07-28T09:21:50Z",
+ "updated_at": "2022-07-28T09:24:11Z",
+ "pushed_at": "2022-07-28T09:53:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json
index c6bbdad00c..9b2c91fdad 100644
--- a/2021/CVE-2021-42278.json
+++ b/2021/CVE-2021-42278.json
@@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
- "updated_at": "2022-07-27T11:38:11Z",
+ "updated_at": "2022-07-28T08:08:07Z",
"pushed_at": "2022-07-10T22:23:13Z",
- "stargazers_count": 827,
- "watchers_count": 827,
+ "stargazers_count": 828,
+ "watchers_count": 828,
"forks_count": 176,
"allow_forking": true,
"is_template": false,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 176,
- "watchers": 827,
+ "watchers": 828,
"score": 0
},
{
@@ -46,10 +46,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
- "updated_at": "2022-07-27T03:12:46Z",
+ "updated_at": "2022-07-28T08:08:01Z",
"pushed_at": "2022-04-25T07:53:41Z",
- "stargazers_count": 367,
- "watchers_count": 367,
+ "stargazers_count": 368,
+ "watchers_count": 368,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
- "watchers": 367,
+ "watchers": 368,
"score": 0
},
{
diff --git a/2021/CVE-2021-43789.json b/2021/CVE-2021-43789.json
index 38f7316f88..9df98cbbbe 100644
--- a/2021/CVE-2021-43789.json
+++ b/2021/CVE-2021-43789.json
@@ -13,10 +13,10 @@
"description": "Prestashop >= 1.7.5.0 < 1.7.8.2 - SQL injection",
"fork": false,
"created_at": "2022-01-28T00:26:40Z",
- "updated_at": "2022-04-24T07:24:34Z",
+ "updated_at": "2022-07-28T09:56:20Z",
"pushed_at": "2022-01-28T00:27:12Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 5,
+ "watchers": 6,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index abf592b3f1..d31f381067 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -675,10 +675,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
- "updated_at": "2022-07-26T12:20:59Z",
+ "updated_at": "2022-07-28T09:59:10Z",
"pushed_at": "2022-06-02T02:16:13Z",
- "stargazers_count": 460,
- "watchers_count": 460,
+ "stargazers_count": 461,
+ "watchers_count": 461,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
@@ -691,7 +691,7 @@
],
"visibility": "public",
"forks": 95,
- "watchers": 460,
+ "watchers": 461,
"score": 0
},
{
@@ -2580,34 +2580,6 @@
"watchers": 0,
"score": 0
},
- {
- "id": 438003225,
- "name": "log4j-test",
- "full_name": "strawhatasif\/log4j-test",
- "owner": {
- "login": "strawhatasif",
- "id": 10750101,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
- "html_url": "https:\/\/github.com\/strawhatasif"
- },
- "html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
- "description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
- "fork": false,
- "created_at": "2021-12-13T19:43:01Z",
- "updated_at": "2021-12-13T20:26:40Z",
- "pushed_at": "2021-12-13T20:26:37Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 438012376,
"name": "nmap-log4shell",
@@ -8536,7 +8508,7 @@
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-07-13T00:54:21Z",
- "pushed_at": "2022-07-27T14:19:04Z",
+ "pushed_at": "2022-07-28T09:48:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json
index 4e62eb6f93..2e27184b9d 100644
--- a/2022/CVE-2022-0543.json
+++ b/2022/CVE-2022-0543.json
@@ -17,13 +17,13 @@
"pushed_at": "2022-07-23T23:14:02Z",
"stargazers_count": 59,
"watchers_count": 59,
- "forks_count": 22,
+ "forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 22,
+ "forks": 23,
"watchers": 59,
"score": 0
},
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index a16db878a7..825b714f1e 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -129,13 +129,13 @@
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 956,
"watchers_count": 956,
- "forks_count": 207,
+ "forks_count": 208,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 207,
+ "forks": 208,
"watchers": 956,
"score": 0
},
diff --git a/2022/CVE-2022-1421.json b/2022/CVE-2022-1421.json
index 587946a1ac..51872b0429 100644
--- a/2022/CVE-2022-1421.json
+++ b/2022/CVE-2022-1421.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-12T14:34:48Z",
- "updated_at": "2022-07-13T05:56:52Z",
+ "updated_at": "2022-07-28T10:14:20Z",
"pushed_at": "2022-07-12T14:42:21Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 3,
+ "watchers": 4,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-2022.json b/2022/CVE-2022-2022.json
new file mode 100644
index 0000000000..8dfe0594e0
--- /dev/null
+++ b/2022/CVE-2022-2022.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 430706849,
+ "name": "pxplan",
+ "full_name": "GREENHAT7\/pxplan",
+ "owner": {
+ "login": "GREENHAT7",
+ "id": 94844022,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94844022?v=4",
+ "html_url": "https:\/\/github.com\/GREENHAT7"
+ },
+ "html_url": "https:\/\/github.com\/GREENHAT7\/pxplan",
+ "description": "CVE-2022-2022",
+ "fork": false,
+ "created_at": "2021-11-22T12:57:22Z",
+ "updated_at": "2022-07-28T12:23:44Z",
+ "pushed_at": "2022-07-27T07:01:33Z",
+ "stargazers_count": 70,
+ "watchers_count": 70,
+ "forks_count": 34,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 34,
+ "watchers": 70,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-22536.json b/2022/CVE-2022-22536.json
index 28412224da..1fa76c38c0 100644
--- a/2022/CVE-2022-22536.json
+++ b/2022/CVE-2022-22536.json
@@ -13,10 +13,10 @@
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
"fork": false,
"created_at": "2022-02-15T09:22:19Z",
- "updated_at": "2022-07-14T12:13:25Z",
+ "updated_at": "2022-07-28T06:47:19Z",
"pushed_at": "2022-02-21T08:58:22Z",
- "stargazers_count": 46,
- "watchers_count": 46,
+ "stargazers_count": 47,
+ "watchers_count": 47,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 46,
+ "watchers": 47,
"score": 0
},
{
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 6d9d4fb4a8..c085a594e1 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -547,10 +547,10 @@
"description": "Spring Cloud Gateway远程代码执行漏洞POC,基于命令执行的基础上,增加了反弹shell操作",
"fork": false,
"created_at": "2022-03-07T07:24:13Z",
- "updated_at": "2022-05-20T10:11:30Z",
+ "updated_at": "2022-07-28T06:28:47Z",
"pushed_at": "2022-03-09T05:43:23Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@@ -558,7 +558,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 7,
+ "watchers": 8,
"score": 0
},
{
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index b0bc272c6d..0626f36bb8 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -520,18 +520,18 @@
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
"fork": false,
"created_at": "2022-06-01T19:33:32Z",
- "updated_at": "2022-06-26T09:49:47Z",
+ "updated_at": "2022-07-28T09:26:29Z",
"pushed_at": "2022-06-01T23:50:18Z",
- "stargazers_count": 20,
- "watchers_count": 20,
- "forks_count": 3,
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 3,
- "watchers": 20,
+ "forks": 4,
+ "watchers": 21,
"score": 0
},
{
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index c909c7d04b..65f8959caa 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -17,7 +17,7 @@
"pushed_at": "2022-07-14T14:55:24Z",
"stargazers_count": 289,
"watchers_count": 289,
- "forks_count": 93,
+ "forks_count": 94,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -32,7 +32,7 @@
"tomcat"
],
"visibility": "public",
- "forks": 93,
+ "forks": 94,
"watchers": 289,
"score": 0
},
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index dbac576d8b..08a9f61ac1 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
- "updated_at": "2022-07-28T05:08:27Z",
- "pushed_at": "2022-07-28T02:55:10Z",
- "stargazers_count": 541,
- "watchers_count": 541,
+ "updated_at": "2022-07-28T10:31:16Z",
+ "pushed_at": "2022-07-28T11:12:35Z",
+ "stargazers_count": 544,
+ "watchers_count": 544,
"forks_count": 97,
"allow_forking": true,
"is_template": false,
@@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 97,
- "watchers": 541,
+ "watchers": 544,
"score": 0
},
{
@@ -214,7 +214,7 @@
"pushed_at": "2022-06-06T20:24:06Z",
"stargazers_count": 250,
"watchers_count": 250,
- "forks_count": 68,
+ "forks_count": 70,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -232,7 +232,7 @@
"vulnerability"
],
"visibility": "public",
- "forks": 68,
+ "forks": 70,
"watchers": 250,
"score": 0
},
diff --git a/2022/CVE-2022-26138.json b/2022/CVE-2022-26138.json
index 786b8d6f1f..eb450614b8 100644
--- a/2022/CVE-2022-26138.json
+++ b/2022/CVE-2022-26138.json
@@ -88,5 +88,33 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 518788417,
+ "name": "Confluence-Question-CVE-2022-26138-",
+ "full_name": "Vulnmachines\/Confluence-Question-CVE-2022-26138-",
+ "owner": {
+ "login": "Vulnmachines",
+ "id": 79006904,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
+ "html_url": "https:\/\/github.com\/Vulnmachines"
+ },
+ "html_url": "https:\/\/github.com\/Vulnmachines\/Confluence-Question-CVE-2022-26138-",
+ "description": "Atlassian Confluence Server and Data Center: CVE-2022-26138",
+ "fork": false,
+ "created_at": "2022-07-28T09:48:21Z",
+ "updated_at": "2022-07-28T09:48:21Z",
+ "pushed_at": "2022-07-28T09:59:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json
index 57591ed3c8..a3f4171832 100644
--- a/2022/CVE-2022-26809.json
+++ b/2022/CVE-2022-26809.json
@@ -329,7 +329,7 @@
"pushed_at": "2022-05-22T14:08:38Z",
"stargazers_count": 16,
"watchers_count": 16,
- "forks_count": 5,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -342,7 +342,7 @@
"windows"
],
"visibility": "public",
- "forks": 5,
+ "forks": 6,
"watchers": 16,
"score": 0
},
@@ -640,18 +640,18 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
- "updated_at": "2022-07-28T06:19:25Z",
+ "updated_at": "2022-07-28T12:29:21Z",
"pushed_at": "2022-07-27T15:55:01Z",
- "stargazers_count": 61,
- "watchers_count": 61,
- "forks_count": 11,
+ "stargazers_count": 109,
+ "watchers_count": 109,
+ "forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 11,
- "watchers": 61,
+ "forks": 17,
+ "watchers": 109,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-27254.json b/2022/CVE-2022-27254.json
index 3eb852580b..a7a75fb03b 100644
--- a/2022/CVE-2022-27254.json
+++ b/2022/CVE-2022-27254.json
@@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
- "updated_at": "2022-07-27T07:13:27Z",
+ "updated_at": "2022-07-28T12:05:42Z",
"pushed_at": "2022-03-26T05:52:15Z",
- "stargazers_count": 369,
- "watchers_count": 369,
+ "stargazers_count": 370,
+ "watchers_count": 370,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
- "watchers": 369,
+ "watchers": 370,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index 1f11773a5d..71dd04d19b 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -426,7 +426,7 @@
"fork": false,
"created_at": "2022-06-01T11:37:08Z",
"updated_at": "2022-07-25T16:16:05Z",
- "pushed_at": "2022-06-07T08:35:35Z",
+ "pushed_at": "2022-07-28T10:56:46Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
diff --git a/2022/CVE-2022-31101.json b/2022/CVE-2022-31101.json
index ef30023d78..8f516c9f64 100644
--- a/2022/CVE-2022-31101.json
+++ b/2022/CVE-2022-31101.json
@@ -13,10 +13,10 @@
"description": "Major Security Vulnerability on PrestaShop Websites - CVE-2022-31101",
"fork": false,
"created_at": "2022-07-24T21:50:13Z",
- "updated_at": "2022-07-28T00:19:21Z",
+ "updated_at": "2022-07-28T12:17:23Z",
"pushed_at": "2022-07-27T10:03:54Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 16,
+ "watchers": 17,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json
index d49e6a91c0..e3ccabb90f 100644
--- a/2022/CVE-2022-34918.json
+++ b/2022/CVE-2022-34918.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-19T12:46:45Z",
- "updated_at": "2022-07-28T02:31:28Z",
+ "updated_at": "2022-07-28T10:13:29Z",
"pushed_at": "2022-07-25T21:24:15Z",
- "stargazers_count": 169,
- "watchers_count": 169,
+ "stargazers_count": 170,
+ "watchers_count": 170,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
- "watchers": 169,
+ "watchers": 170,
"score": 0
},
{
diff --git a/2022/CVE-2022-31181.json b/2022/CVE-2022-36408.json
similarity index 76%
rename from 2022/CVE-2022-31181.json
rename to 2022/CVE-2022-36408.json
index 6a5c3937ac..c5a097b5da 100644
--- a/2022/CVE-2022-31181.json
+++ b/2022/CVE-2022-36408.json
@@ -1,20 +1,20 @@
[
{
"id": 517931760,
- "name": "lblfixer_cve_2022_31181",
- "full_name": "drkbcn\/lblfixer_cve_2022_31181",
+ "name": "lblfixer_cve_2022_36408",
+ "full_name": "drkbcn\/lblfixer_cve_2022_36408",
"owner": {
"login": "drkbcn",
"id": 2090227,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2090227?v=4",
"html_url": "https:\/\/github.com\/drkbcn"
},
- "html_url": "https:\/\/github.com\/drkbcn\/lblfixer_cve_2022_31181",
- "description": "Module for PrestaShop 1.6.1.X\/1.7.X to fix CVE-2022-31181 vulnerability (Chain SQL Injection)",
+ "html_url": "https:\/\/github.com\/drkbcn\/lblfixer_cve_2022_36408",
+ "description": "Module for PrestaShop 1.6.1.X\/1.7.X to fix CVE-2022-36408 \/ CVE-2022-31181 vulnerability (Chain SQL Injection)",
"fork": false,
"created_at": "2022-07-26T05:55:53Z",
- "updated_at": "2022-07-27T06:58:05Z",
- "pushed_at": "2022-07-27T06:42:32Z",
+ "updated_at": "2022-07-28T07:07:11Z",
+ "pushed_at": "2022-07-28T07:14:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2022/CVE-2022-36946.json b/2022/CVE-2022-36946.json
new file mode 100644
index 0000000000..2a25c3f3bc
--- /dev/null
+++ b/2022/CVE-2022-36946.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 518816810,
+ "name": "CVE-2022-36946",
+ "full_name": "Pwnzer0tt1\/CVE-2022-36946",
+ "owner": {
+ "login": "Pwnzer0tt1",
+ "id": 107208935,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107208935?v=4",
+ "html_url": "https:\/\/github.com\/Pwnzer0tt1"
+ },
+ "html_url": "https:\/\/github.com\/Pwnzer0tt1\/CVE-2022-36946",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-07-28T11:22:13Z",
+ "updated_at": "2022-07-28T11:50:57Z",
+ "pushed_at": "2022-07-28T11:22:14Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/README.md b/README.md
index a70f3bd489..065751c291 100644
--- a/README.md
+++ b/README.md
@@ -460,6 +460,14 @@ The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (ev
### CVE-2022-1972
- [randorisec/CVE-2022-1972-infoleak-PoC](https://github.com/randorisec/CVE-2022-1972-infoleak-PoC)
+### CVE-2022-2022 (2022-06-07)
+
+
+Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.7.
+
+
+- [GREENHAT7/pxplan](https://github.com/GREENHAT7/pxplan)
+
### CVE-2022-2097 (2022-07-05)
@@ -1799,6 +1807,7 @@ The Atlassian Questions For Confluence app for Confluence Server and Data Center
- [alcaparra/CVE-2022-26138](https://github.com/alcaparra/CVE-2022-26138)
- [1mxml/CVE-2022-26138](https://github.com/1mxml/CVE-2022-26138)
- [Daro1967/CVE-2022-26138-RCE](https://github.com/Daro1967/CVE-2022-26138-RCE)
+- [Vulnmachines/Confluence-Question-CVE-2022-26138-](https://github.com/Vulnmachines/Confluence-Question-CVE-2022-26138-)
### CVE-2022-26155 (2022-02-28)
@@ -2650,9 +2659,6 @@ mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an
- [ly1g3/Mailcow-CVE-2022-31138](https://github.com/ly1g3/Mailcow-CVE-2022-31138)
-### CVE-2022-31181
-- [drkbcn/lblfixer_cve_2022_31181](https://github.com/drkbcn/lblfixer_cve_2022_31181)
-
### CVE-2022-31245 (2022-05-20)
@@ -2935,6 +2941,22 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD
- [AngeloPioAmirante/CVE-2022-35899](https://github.com/AngeloPioAmirante/CVE-2022-35899)
+### CVE-2022-36408 (2022-07-22)
+
+
+PrestaShop 1.6.0.10 through 1.7.x before 1.7.8.7 allows remote attackers to execute arbitrary code, aka a "previously unknown vulnerability chain" related to SQL injection and MySQL Smarty cache storage injection, as exploited in the wild in July 2022.
+
+
+- [drkbcn/lblfixer_cve_2022_36408](https://github.com/drkbcn/lblfixer_cve_2022_36408)
+
+### CVE-2022-36946 (2022-07-27)
+
+
+nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
+
+
+- [Pwnzer0tt1/CVE-2022-36946](https://github.com/Pwnzer0tt1/CVE-2022-36946)
+
## 2021
### CVE-2021-0302 (2021-02-10)
@@ -6332,6 +6354,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013)
- [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013)
- [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013)
+- [theykillmeslowly/CVE-2021-42013](https://github.com/theykillmeslowly/CVE-2021-42013)
### CVE-2021-42056 (2022-06-24)
@@ -6857,7 +6880,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [rodfer0x80/log4j2-prosecutor](https://github.com/rodfer0x80/log4j2-prosecutor)
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
-- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228)
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
@@ -20948,6 +20970,7 @@ Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletio
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
+- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715)
- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list)
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
@@ -26245,6 +26268,7 @@ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured
- [tardummy01/oscp_scripts-1](https://github.com/tardummy01/oscp_scripts-1)
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
+- [theykillmeslowly/CVE-2012-1823](https://github.com/theykillmeslowly/CVE-2012-1823)
### CVE-2012-1870 (2012-07-10)