diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index ba4e73374c..32fc8cddd4 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-05-27T06:57:22Z", + "updated_at": "2022-05-29T02:16:18Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1373, - "watchers_count": 1373, + "stargazers_count": 1374, + "watchers_count": 1374, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1373, + "watchers": 1374, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 53fedb45fb..369714ed5a 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-05-27T06:57:22Z", + "updated_at": "2022-05-29T02:16:18Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1373, - "watchers_count": 1373, + "stargazers_count": 1374, + "watchers_count": 1374, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1373, + "watchers": 1374, "score": 0 }, { diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json index 4d9e10395c..866acedb9b 100644 --- a/2017/CVE-2017-0144.json +++ b/2017/CVE-2017-0144.json @@ -17,12 +17,12 @@ "pushed_at": "2022-01-28T20:54:38Z", "stargazers_count": 291, "watchers_count": 291, - "forks_count": 117, + "forks_count": 118, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 117, + "forks": 118, "watchers": 291, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 2d3250b226..aeedabfda2 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-05-27T06:57:22Z", + "updated_at": "2022-05-29T02:16:18Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1373, - "watchers_count": 1373, + "stargazers_count": 1374, + "watchers_count": 1374, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1373, + "watchers": 1374, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 45ca42fb4f..d6b9edfcb5 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -127,17 +127,17 @@ "description": "It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).", "fork": false, "created_at": "2017-05-30T15:08:32Z", - "updated_at": "2022-05-25T20:40:28Z", + "updated_at": "2022-05-29T01:42:06Z", "pushed_at": "2021-10-31T07:06:25Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "forks_count": 24, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 24, - "watchers": 44, + "watchers": 45, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index f943ef728c..3d082be23f 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-05-27T06:57:22Z", + "updated_at": "2022-05-29T02:16:18Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1373, - "watchers_count": 1373, + "stargazers_count": 1374, + "watchers_count": 1374, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1373, + "watchers": 1374, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 3bcb40d4b6..f874a871ff 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2861,17 +2861,17 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2022-05-28T02:07:53Z", + "updated_at": "2022-05-29T06:14:22Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 292, - "watchers_count": 292, + "stargazers_count": 293, + "watchers_count": 293, "forks_count": 71, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 71, - "watchers": 292, + "watchers": 293, "score": 0 }, { diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index d17993dbaa..a659660e7f 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -94,17 +94,17 @@ "description": null, "fork": false, "created_at": "2019-06-24T15:33:50Z", - "updated_at": "2022-05-28T18:22:55Z", + "updated_at": "2022-05-29T05:13:33Z", "pushed_at": "2020-11-09T07:33:12Z", - "stargazers_count": 261, - "watchers_count": 261, + "stargazers_count": 262, + "watchers_count": 262, "forks_count": 56, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 56, - "watchers": 261, + "watchers": 262, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 2bdd5702a9..0247c922fd 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -44,7 +44,7 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 3330, "watchers_count": 3330, - "forks_count": 998, + "forks_count": 997, "allow_forking": true, "is_template": false, "topics": [ @@ -69,7 +69,7 @@ "webshell" ], "visibility": "public", - "forks": 998, + "forks": 997, "watchers": 3330, "score": 0 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 1eb2c95570..19564668b0 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-05-27T06:57:22Z", + "updated_at": "2022-05-29T02:16:18Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1373, - "watchers_count": 1373, + "stargazers_count": 1374, + "watchers_count": 1374, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1373, + "watchers": 1374, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index f4cb42a218..31b62f1e3a 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -44,7 +44,7 @@ "pushed_at": "2020-01-24T15:21:06Z", "stargazers_count": 252, "watchers_count": 252, - "forks_count": 79, + "forks_count": 80, "allow_forking": true, "is_template": false, "topics": [ @@ -52,7 +52,7 @@ "cve-2020-0610" ], "visibility": "public", - "forks": 79, + "forks": 80, "watchers": 252, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 1e32b779f8..490d81ecab 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -17,7 +17,7 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 3330, "watchers_count": 3330, - "forks_count": 998, + "forks_count": 997, "allow_forking": true, "is_template": false, "topics": [ @@ -42,7 +42,7 @@ "webshell" ], "visibility": "public", - "forks": 998, + "forks": 997, "watchers": 3330, "score": 0 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 8a2eed1fdd..e0ca248e83 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-05-27T06:57:22Z", + "updated_at": "2022-05-29T02:16:18Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1373, - "watchers_count": 1373, + "stargazers_count": 1374, + "watchers_count": 1374, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1373, + "watchers": 1374, "score": 0 }, { diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 10334c2ad7..54c98ba351 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -380,17 +380,17 @@ "description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)", "fork": false, "created_at": "2022-04-29T18:57:30Z", - "updated_at": "2022-05-28T16:04:06Z", + "updated_at": "2022-05-29T06:26:40Z", "pushed_at": "2022-05-02T07:49:01Z", - "stargazers_count": 41, - "watchers_count": 41, - "forks_count": 4, + "stargazers_count": 46, + "watchers_count": 46, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 41, + "forks": 5, + "watchers": 46, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 476407dfcf..ba02a3c66f 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -73,17 +73,17 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-05-28T23:45:09Z", + "updated_at": "2022-05-29T04:29:16Z", "pushed_at": "2022-01-30T14:22:23Z", - "stargazers_count": 1541, - "watchers_count": 1541, + "stargazers_count": 1542, + "watchers_count": 1542, "forks_count": 452, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 452, - "watchers": 1541, + "watchers": 1542, "score": 0 }, { diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 504c12fe04..58ac6a4422 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -526,17 +526,17 @@ "description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"", "fork": false, "created_at": "2022-03-08T17:13:24Z", - "updated_at": "2022-05-25T08:19:24Z", + "updated_at": "2022-05-29T06:27:37Z", "pushed_at": "2022-03-18T09:32:30Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, - "watchers": 38, + "watchers": 39, "score": 0 }, { diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index f6756327ea..edf89af86a 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -206,12 +206,12 @@ "pushed_at": "2022-05-12T05:56:13Z", "stargazers_count": 68, "watchers_count": 68, - "forks_count": 26, + "forks_count": 27, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 26, + "forks": 27, "watchers": 68, "score": 0 }, @@ -314,12 +314,12 @@ "pushed_at": "2022-05-09T20:52:07Z", "stargazers_count": 201, "watchers_count": 201, - "forks_count": 31, + "forks_count": 32, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 31, + "forks": 32, "watchers": 201, "score": 0 }, diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index d8e564c12f..a645bec7fd 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-05-25T00:24:20Z", + "updated_at": "2022-05-29T05:40:37Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 599, - "watchers_count": 599, + "stargazers_count": 600, + "watchers_count": 600, "forks_count": 120, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 120, - "watchers": 599, + "watchers": 600, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 9a68c44058..e486a91b04 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1253,5 +1253,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 497460990, + "name": "CVE-2022-22947-exp", + "full_name": "Wrong-pixel\/CVE-2022-22947-exp", + "owner": { + "login": "Wrong-pixel", + "id": 43137902, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43137902?v=4", + "html_url": "https:\/\/github.com\/Wrong-pixel" + }, + "html_url": "https:\/\/github.com\/Wrong-pixel\/CVE-2022-22947-exp", + "description": null, + "fork": false, + "created_at": "2022-05-29T01:07:26Z", + "updated_at": "2022-05-29T01:08:13Z", + "pushed_at": "2022-05-29T01:08:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22972.json b/2022/CVE-2022-22972.json index 76658d15ce..54a8a78690 100644 --- a/2022/CVE-2022-22972.json +++ b/2022/CVE-2022-22972.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-05-24T20:19:55Z", - "updated_at": "2022-05-28T22:16:00Z", + "updated_at": "2022-05-29T03:56:55Z", "pushed_at": "2022-05-26T16:07:18Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 17, - "watchers": 97, + "watchers": 98, "score": 0 }, { diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index de4110ed55..d1fc5760ac 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -123,17 +123,17 @@ "description": "Detects attempts and successful exploitation of CVE-2022-26809", "fork": false, "created_at": "2022-04-14T16:58:09Z", - "updated_at": "2022-05-28T01:21:07Z", + "updated_at": "2022-05-29T03:27:29Z", "pushed_at": "2022-05-17T15:17:22Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 1972c76f17..059d8cf975 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -414,7 +414,7 @@ "fork": false, "created_at": "2022-05-26T22:02:45Z", "updated_at": "2022-05-26T22:02:56Z", - "pushed_at": "2022-05-26T22:52:27Z", + "pushed_at": "2022-05-29T00:53:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/README.md b/README.md index 20c4aada39..2da8b37668 100644 --- a/README.md +++ b/README.md @@ -691,6 +691,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v - [whwlsfb/cve-2022-22947-godzilla-memshell](https://github.com/whwlsfb/cve-2022-22947-godzilla-memshell) - [0730Nophone/CVE-2022-22947-](https://github.com/0730Nophone/CVE-2022-22947-) - [anansec/CVE-2022-22947_EXP](https://github.com/anansec/CVE-2022-22947_EXP) +- [Wrong-pixel/CVE-2022-22947-exp](https://github.com/Wrong-pixel/CVE-2022-22947-exp) ### CVE-2022-22948 (2022-03-29)