diff --git a/2015/CVE-2015-1328.json b/2015/CVE-2015-1328.json index 593ebbadc9..2ae6ecf5b7 100644 --- a/2015/CVE-2015-1328.json +++ b/2015/CVE-2015-1328.json @@ -69,10 +69,10 @@ "description": "kernel exploit", "fork": false, "created_at": "2022-02-07T10:52:51Z", - "updated_at": "2022-02-07T14:33:19Z", + "updated_at": "2022-09-03T23:13:11Z", "pushed_at": "2022-02-07T14:33:56Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -80,7 +80,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2015/CVE-2015-1805.json b/2015/CVE-2015-1805.json index ba9aea7719..0839e77eff 100644 --- a/2015/CVE-2015-1805.json +++ b/2015/CVE-2015-1805.json @@ -41,10 +41,10 @@ "description": "CVE-2015-1805 root tool", "fork": false, "created_at": "2016-04-01T12:10:14Z", - "updated_at": "2022-06-29T06:37:45Z", + "updated_at": "2022-09-03T18:38:35Z", "pushed_at": "2017-11-23T20:55:03Z", - "stargazers_count": 265, - "watchers_count": 265, + "stargazers_count": 266, + "watchers_count": 266, "forks_count": 155, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 155, - "watchers": 265, + "watchers": 266, "score": 0 }, { diff --git a/2017/CVE-2017-8917.json b/2017/CVE-2017-8917.json index 3d69c277f9..4f04b623ef 100644 --- a/2017/CVE-2017-8917.json +++ b/2017/CVE-2017-8917.json @@ -55,34 +55,6 @@ "watchers": 42, "score": 0 }, - { - "id": 165318193, - "name": "cve-2017-8917", - "full_name": "cved-sources\/cve-2017-8917", - "owner": { - "login": "cved-sources", - "id": 46423677, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", - "html_url": "https:\/\/github.com\/cved-sources" - }, - "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-8917", - "description": "cve-2017-8917", - "fork": false, - "created_at": "2019-01-11T22:13:56Z", - "updated_at": "2021-04-15T21:29:20Z", - "pushed_at": "2021-04-15T21:29:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 458793708, "name": "CVE-2017-8917", diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index ecb12042b6..56ee50af4d 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -17,13 +17,13 @@ "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 470, "watchers_count": 470, - "forks_count": 463, + "forks_count": 464, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 463, + "forks": 464, "watchers": 470, "score": 0 }, diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index b68cab0701..9122cf9046 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -41,10 +41,10 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2022-08-26T03:41:03Z", + "updated_at": "2022-09-03T18:37:06Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 573, - "watchers_count": 573, + "stargazers_count": 574, + "watchers_count": 574, "forks_count": 125, "allow_forking": true, "is_template": false, @@ -65,7 +65,7 @@ ], "visibility": "public", "forks": 125, - "watchers": 573, + "watchers": 574, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json index 66030cbcc2..c2c4787cff 100644 --- a/2019/CVE-2019-11358.json +++ b/2019/CVE-2019-11358.json @@ -118,7 +118,7 @@ "fork": false, "created_at": "2021-03-08T11:34:11Z", "updated_at": "2022-08-23T23:40:06Z", - "pushed_at": "2022-09-03T16:30:29Z", + "pushed_at": "2022-09-03T18:57:04Z", "stargazers_count": 32, "watchers_count": 32, "forks_count": 27, diff --git a/2019/CVE-2019-9053.json b/2019/CVE-2019-9053.json index 34602b88b8..080ad5aed4 100644 --- a/2019/CVE-2019-9053.json +++ b/2019/CVE-2019-9053.json @@ -125,10 +125,10 @@ "description": "CVE-2019-9053 Exploit for Python 3", "fork": false, "created_at": "2021-12-28T16:30:12Z", - "updated_at": "2022-08-23T14:42:48Z", + "updated_at": "2022-09-03T21:14:08Z", "pushed_at": "2021-12-28T17:02:27Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index 086c506543..44660b8cc4 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -209,10 +209,10 @@ "description": null, "fork": false, "created_at": "2020-12-31T21:54:50Z", - "updated_at": "2022-08-02T06:25:26Z", + "updated_at": "2022-09-03T22:27:32Z", "pushed_at": "2022-04-16T14:22:27Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -220,7 +220,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index e26082d06a..170f38f875 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -41,10 +41,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2022-09-02T05:12:23Z", + "updated_at": "2022-09-03T19:45:54Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1603, - "watchers_count": 1603, + "stargazers_count": 1604, + "watchers_count": 1604, "forks_count": 576, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 576, - "watchers": 1603, + "watchers": 1604, "score": 0 }, { diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 4b5bc34192..ad2725e7c5 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -69,10 +69,10 @@ "description": "PrintNightmare (CVE-2021-34527) PoC Exploit", "fork": false, "created_at": "2022-08-23T20:20:45Z", - "updated_at": "2022-09-02T09:32:33Z", + "updated_at": "2022-09-03T19:46:03Z", "pushed_at": "2022-08-26T12:13:22Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "forks_count": 12, "allow_forking": true, "is_template": false, @@ -80,7 +80,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 47, + "watchers": 48, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 5549d72a13..274c4d7d85 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -460,15 +460,20 @@ "description": "Cortex XDR PoC ft. CVE-2021-3560", "fork": false, "created_at": "2022-08-23T18:57:21Z", - "updated_at": "2022-09-02T19:10:54Z", - "pushed_at": "2022-08-31T03:23:26Z", + "updated_at": "2022-09-03T22:18:17Z", + "pushed_at": "2022-09-03T22:22:45Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "cve", + "exploit", + "security", + "vulnerability" + ], "visibility": "public", "forks": 0, "watchers": 1, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 2321844d9b..bdab3ee022 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -1856,10 +1856,10 @@ "description": "Proof of concept for pwnkit vulnerability", "fork": false, "created_at": "2022-01-27T14:43:57Z", - "updated_at": "2022-09-03T09:53:56Z", + "updated_at": "2022-09-03T23:27:48Z", "pushed_at": "2022-04-19T12:33:32Z", - "stargazers_count": 311, - "watchers_count": 311, + "stargazers_count": 313, + "watchers_count": 313, "forks_count": 36, "allow_forking": true, "is_template": false, @@ -1867,7 +1867,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 311, + "watchers": 313, "score": 0 }, { diff --git a/2021/CVE-2021-41349.json b/2021/CVE-2021-41349.json index 69e377d490..c937896035 100644 --- a/2021/CVE-2021-41349.json +++ b/2021/CVE-2021-41349.json @@ -45,10 +45,10 @@ "description": "Microsoft Exchange Server Spoofing Vulnerability Exploit!", "fork": false, "created_at": "2022-07-30T10:51:55Z", - "updated_at": "2022-07-30T11:45:58Z", + "updated_at": "2022-09-03T19:30:24Z", "pushed_at": "2022-07-30T11:35:12Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -56,7 +56,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index fc6eed92a6..5bb8539a1f 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -222,10 +222,10 @@ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2022-09-02T18:28:37Z", + "updated_at": "2022-09-03T21:35:48Z", "pushed_at": "2022-08-02T13:18:24Z", - "stargazers_count": 1004, - "watchers_count": 1004, + "stargazers_count": 1005, + "watchers_count": 1005, "forks_count": 449, "allow_forking": true, "is_template": false, @@ -235,7 +235,7 @@ ], "visibility": "public", "forks": 449, - "watchers": 1004, + "watchers": 1005, "score": 0 }, { @@ -2402,10 +2402,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2022-09-03T14:04:56Z", + "updated_at": "2022-09-03T19:09:30Z", "pushed_at": "2022-04-24T08:56:47Z", - "stargazers_count": 347, - "watchers_count": 347, + "stargazers_count": 348, + "watchers_count": 348, "forks_count": 48, "allow_forking": true, "is_template": false, @@ -2419,7 +2419,7 @@ ], "visibility": "public", "forks": 48, - "watchers": 347, + "watchers": 348, "score": 0 }, { diff --git a/2022/CVE-2022-0543.json b/2022/CVE-2022-0543.json index f227749cbe..f4ec051a72 100644 --- a/2022/CVE-2022-0543.json +++ b/2022/CVE-2022-0543.json @@ -69,10 +69,10 @@ "description": "Redis RCE through Lua Sandbox Escape vulnerability", "fork": false, "created_at": "2022-09-01T16:44:56Z", - "updated_at": "2022-09-01T17:43:34Z", + "updated_at": "2022-09-03T18:24:54Z", "pushed_at": "2022-09-02T22:46:08Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -80,7 +80,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0995.json b/2022/CVE-2022-0995.json index d7a1791578..a2c64bdf56 100644 --- a/2022/CVE-2022-0995.json +++ b/2022/CVE-2022-0995.json @@ -13,10 +13,10 @@ "description": "CVE-2022-0995 exploit", "fork": false, "created_at": "2022-03-26T21:46:09Z", - "updated_at": "2022-09-03T08:06:38Z", + "updated_at": "2022-09-03T19:10:13Z", "pushed_at": "2022-03-27T09:07:01Z", - "stargazers_count": 471, - "watchers_count": 471, + "stargazers_count": 472, + "watchers_count": 472, "forks_count": 67, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 67, - "watchers": 471, + "watchers": 472, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-24706.json b/2022/CVE-2022-24706.json index 9e27f00505..a1301b5214 100644 --- a/2022/CVE-2022-24706.json +++ b/2022/CVE-2022-24706.json @@ -13,10 +13,10 @@ "description": "Apache CouchDB 3.2.1 - Remote Code Execution (RCE)", "fork": false, "created_at": "2022-05-20T04:28:51Z", - "updated_at": "2022-09-03T07:03:45Z", + "updated_at": "2022-09-03T19:11:40Z", "pushed_at": "2022-05-20T04:32:13Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 6, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 19, + "watchers": 20, "score": 0 }, { diff --git a/2022/CVE-2022-25845.json b/2022/CVE-2022-25845.json index 6aabcf1a7d..3e0162b29d 100644 --- a/2022/CVE-2022-25845.json +++ b/2022/CVE-2022-25845.json @@ -58,10 +58,10 @@ "description": "[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload", "fork": false, "created_at": "2022-09-01T04:36:50Z", - "updated_at": "2022-09-03T17:08:43Z", + "updated_at": "2022-09-03T19:03:23Z", "pushed_at": "2022-09-02T11:00:28Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -69,7 +69,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 21, + "watchers": 22, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-2586.json b/2022/CVE-2022-2586.json new file mode 100644 index 0000000000..c1537e429d --- /dev/null +++ b/2022/CVE-2022-2586.json @@ -0,0 +1,30 @@ +[ + { + "id": 532350223, + "name": "CVE-2022-2586-LPE", + "full_name": "aels\/CVE-2022-2586-LPE", + "owner": { + "login": "aels", + "id": 1212294, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1212294?v=4", + "html_url": "https:\/\/github.com\/aels" + }, + "html_url": "https:\/\/github.com\/aels\/CVE-2022-2586-LPE", + "description": "CVE-2022-2586: Linux kernel nft_object UAF", + "fork": false, + "created_at": "2022-09-03T19:04:31Z", + "updated_at": "2022-09-03T19:06:49Z", + "pushed_at": "2022-09-03T19:06:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30592.json b/2022/CVE-2022-30592.json index 1bc99d8c0f..30a41b06fb 100644 --- a/2022/CVE-2022-30592.json +++ b/2022/CVE-2022-30592.json @@ -13,10 +13,10 @@ "description": "HTTP3-attacks (CVE-2022-30592)", "fork": false, "created_at": "2022-08-06T09:57:43Z", - "updated_at": "2022-09-03T16:37:30Z", + "updated_at": "2022-09-03T18:20:53Z", "pushed_at": "2022-09-02T21:05:44Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "forks_count": 5, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 23, + "watchers": 24, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-33174.json b/2022/CVE-2022-33174.json index b6c267f9b5..3afad4247d 100644 --- a/2022/CVE-2022-33174.json +++ b/2022/CVE-2022-33174.json @@ -13,10 +13,10 @@ "description": "Powertek PDU身份绕过", "fork": false, "created_at": "2022-09-02T02:27:31Z", - "updated_at": "2022-09-02T16:33:01Z", + "updated_at": "2022-09-03T20:42:27Z", "pushed_at": "2022-09-02T02:32:54Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json index 905e827d1f..276ec2acf9 100644 --- a/2022/CVE-2022-36804.json +++ b/2022/CVE-2022-36804.json @@ -13,10 +13,10 @@ "description": "Remote Code Execution exploit for CVE-2022-36804 (BitBucket Server and DataCenter).", "fork": false, "created_at": "2022-09-03T14:53:29Z", - "updated_at": "2022-09-03T16:06:17Z", + "updated_at": "2022-09-03T21:27:08Z", "pushed_at": "2022-09-03T16:04:14Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 7fd96e8ace..5b6e471a93 100644 --- a/README.md +++ b/README.md @@ -533,6 +533,9 @@ It was found that Quarkus 2.10.x does not terminate HTTP requests header context - [yuxblank/CVE-2022-2466---Request-Context-not-terminated-with-GraphQL](https://github.com/yuxblank/CVE-2022-2466---Request-Context-not-terminated-with-GraphQL) +### CVE-2022-2586 +- [aels/CVE-2022-2586-LPE](https://github.com/aels/CVE-2022-2586-LPE) + ### CVE-2022-2588 - [Markakd/CVE-2022-2588](https://github.com/Markakd/CVE-2022-2588) - [ASkyeye/2022-LPE-UAF](https://github.com/ASkyeye/2022-LPE-UAF) @@ -22163,7 +22166,6 @@ SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to ex - [brianwrf/Joomla3.7-SQLi-CVE-2017-8917](https://github.com/brianwrf/Joomla3.7-SQLi-CVE-2017-8917) - [stefanlucas/Exploit-Joomla](https://github.com/stefanlucas/Exploit-Joomla) -- [cved-sources/cve-2017-8917](https://github.com/cved-sources/cve-2017-8917) - [gmohlamo/CVE-2017-8917](https://github.com/gmohlamo/CVE-2017-8917) - [AkuCyberSec/CVE-2017-8917-Joomla-370-SQL-Injection](https://github.com/AkuCyberSec/CVE-2017-8917-Joomla-370-SQL-Injection) - [Siopy/CVE-2017-8917](https://github.com/Siopy/CVE-2017-8917)