diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json
index 7d7c157e89..a379d991e0 100644
--- a/2008/CVE-2008-0166.json
+++ b/2008/CVE-2008-0166.json
@@ -17,14 +17,14 @@
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 334,
"watchers_count": 334,
- "forks_count": 103,
+ "forks_count": 104,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2008-0166"
],
"visibility": "public",
- "forks": 103,
+ "forks": 104,
"watchers": 334,
"score": 0
},
diff --git a/2013/CVE-2013-2186.json b/2013/CVE-2013-2186.json
index b12e65af5c..26838ccc26 100644
--- a/2013/CVE-2013-2186.json
+++ b/2013/CVE-2013-2186.json
@@ -13,17 +13,17 @@
"description": "Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)",
"fork": false,
"created_at": "2016-02-08T08:29:11Z",
- "updated_at": "2022-02-03T17:43:26Z",
+ "updated_at": "2022-03-15T09:34:25Z",
"pushed_at": "2016-04-14T15:53:28Z",
- "stargazers_count": 38,
- "watchers_count": 38,
+ "stargazers_count": 39,
+ "watchers_count": 39,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 38,
+ "watchers": 39,
"score": 0
},
{
diff --git a/2016/CVE-2016-4657.json b/2016/CVE-2016-4657.json
index eecf0172ed..3ab458247a 100644
--- a/2016/CVE-2016-4657.json
+++ b/2016/CVE-2016-4657.json
@@ -70,17 +70,17 @@
"description": "Exploiting CVE-2016-4657 to JailBreak the Nintendo Switch",
"fork": false,
"created_at": "2017-06-02T10:54:27Z",
- "updated_at": "2021-07-18T18:36:28Z",
+ "updated_at": "2022-03-15T10:27:37Z",
"pushed_at": "2018-02-03T14:49:44Z",
- "stargazers_count": 50,
- "watchers_count": 50,
+ "stargazers_count": 49,
+ "watchers_count": 49,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 50,
+ "watchers": 49,
"score": 0
},
{
diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json
index 42527ffb65..1abcb5afe0 100644
--- a/2016/CVE-2016-5195.json
+++ b/2016/CVE-2016-5195.json
@@ -1065,17 +1065,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
- "updated_at": "2022-03-15T02:43:23Z",
+ "updated_at": "2022-03-15T08:59:26Z",
"pushed_at": "2022-03-09T08:40:29Z",
- "stargazers_count": 144,
- "watchers_count": 144,
- "forks_count": 47,
+ "stargazers_count": 146,
+ "watchers_count": 146,
+ "forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 47,
- "watchers": 144,
+ "forks": 49,
+ "watchers": 146,
"score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-11235.json b/2018/CVE-2018-11235.json
index aac7fd58c4..3fcd8396be 100644
--- a/2018/CVE-2018-11235.json
+++ b/2018/CVE-2018-11235.json
@@ -505,17 +505,17 @@
"description": "Auto malicious git repository creation to exploit CVE-2018-11235 a Remote Code Execution using Git Sub module.",
"fork": false,
"created_at": "2021-09-22T21:15:50Z",
- "updated_at": "2021-12-22T15:28:18Z",
+ "updated_at": "2022-03-15T07:47:40Z",
"pushed_at": "2021-09-22T21:28:30Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0
},
{
diff --git a/2018/CVE-2018-15961.json b/2018/CVE-2018-15961.json
index 55d0685b55..226be7781f 100644
--- a/2018/CVE-2018-15961.json
+++ b/2018/CVE-2018-15961.json
@@ -100,17 +100,17 @@
"description": "Exploit for CVE-2018-15961, a unrestricted file upload vulnerability in Adobe ColdFusion 2018 leading to RCE",
"fork": false,
"created_at": "2021-06-30T08:15:18Z",
- "updated_at": "2021-06-30T08:27:24Z",
+ "updated_at": "2022-03-15T11:57:09Z",
"pushed_at": "2021-06-30T08:27:22Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 0,
+ "watchers": 1,
"score": 0
},
{
diff --git a/2018/CVE-2018-4013.json b/2018/CVE-2018-4013.json
index 24dc09d294..fd10c25ebe 100644
--- a/2018/CVE-2018-4013.json
+++ b/2018/CVE-2018-4013.json
@@ -40,17 +40,17 @@
"description": "RTSPServer Code Execution Vulnerability CVE-2018-4013",
"fork": false,
"created_at": "2018-11-24T15:49:53Z",
- "updated_at": "2020-08-06T07:17:07Z",
+ "updated_at": "2022-03-15T09:32:43Z",
"pushed_at": "2018-11-26T23:35:57Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 11,
+ "watchers": 12,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index e771227e42..c333730205 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1705,17 +1705,17 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
- "updated_at": "2022-03-14T08:48:38Z",
+ "updated_at": "2022-03-15T07:27:14Z",
"pushed_at": "2021-12-02T12:00:46Z",
- "stargazers_count": 1100,
- "watchers_count": 1100,
+ "stargazers_count": 1101,
+ "watchers_count": 1101,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 355,
- "watchers": 1100,
+ "watchers": 1101,
"score": 0
},
{
@@ -1786,17 +1786,17 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
- "updated_at": "2022-02-01T18:00:19Z",
+ "updated_at": "2022-03-15T07:18:41Z",
"pushed_at": "2021-01-10T04:31:22Z",
- "stargazers_count": 347,
- "watchers_count": 347,
+ "stargazers_count": 348,
+ "watchers_count": 348,
"forks_count": 129,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 129,
- "watchers": 347,
+ "watchers": 348,
"score": 0
},
{
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index 302d651821..e99504962f 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -13,17 +13,17 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
- "updated_at": "2022-03-15T02:17:37Z",
+ "updated_at": "2022-03-15T10:12:16Z",
"pushed_at": "2019-11-12T18:53:14Z",
- "stargazers_count": 1705,
- "watchers_count": 1705,
- "forks_count": 256,
+ "stargazers_count": 1706,
+ "watchers_count": 1706,
+ "forks_count": 257,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 256,
- "watchers": 1705,
+ "forks": 257,
+ "watchers": 1706,
"score": 0
},
{
diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json
index ce47f415d9..d54ad20186 100644
--- a/2019/CVE-2019-11510.json
+++ b/2019/CVE-2019-11510.json
@@ -202,10 +202,10 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
- "updated_at": "2022-02-22T03:05:47Z",
+ "updated_at": "2022-03-15T08:44:21Z",
"pushed_at": "2020-01-15T17:01:50Z",
- "stargazers_count": 126,
- "watchers_count": 126,
+ "stargazers_count": 127,
+ "watchers_count": 127,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@@ -221,7 +221,7 @@
],
"visibility": "public",
"forks": 58,
- "watchers": 126,
+ "watchers": 127,
"score": 0
},
{
diff --git a/2019/CVE-2019-11730.json b/2019/CVE-2019-11730.json
index 260bcbbcdf..df89ee6ad7 100644
--- a/2019/CVE-2019-11730.json
+++ b/2019/CVE-2019-11730.json
@@ -17,12 +17,12 @@
"pushed_at": "2019-12-22T19:18:35Z",
"stargazers_count": 9,
"watchers_count": 9,
- "forks_count": 3,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 3,
+ "forks": 2,
"watchers": 9,
"score": 0
}
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index d3098a5105..abe0095467 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -44,7 +44,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3209,
"watchers_count": 3209,
- "forks_count": 953,
+ "forks_count": 954,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -69,7 +69,7 @@
"webshell"
],
"visibility": "public",
- "forks": 953,
+ "forks": 954,
"watchers": 3209,
"score": 0
},
diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json
index f4ef517306..74a8d1dfbc 100644
--- a/2019/CVE-2019-5736.json
+++ b/2019/CVE-2019-5736.json
@@ -40,17 +40,17 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
- "updated_at": "2022-03-04T08:29:03Z",
+ "updated_at": "2022-03-15T08:14:04Z",
"pushed_at": "2022-01-05T04:09:42Z",
- "stargazers_count": 570,
- "watchers_count": 570,
+ "stargazers_count": 571,
+ "watchers_count": 571,
"forks_count": 156,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 156,
- "watchers": 570,
+ "watchers": 571,
"score": 0
},
{
diff --git a/2020/CVE-2020-0443.json b/2020/CVE-2020-0443.json
index 675bd94ddb..4e6136a8b9 100644
--- a/2020/CVE-2020-0443.json
+++ b/2020/CVE-2020-0443.json
@@ -13,17 +13,17 @@
"description": "Proof of concept app for Android permanent denial-of-service vulnerability, CVE-2020-0443",
"fork": false,
"created_at": "2022-03-15T04:54:31Z",
- "updated_at": "2022-03-15T05:18:37Z",
+ "updated_at": "2022-03-15T10:07:52Z",
"pushed_at": "2022-03-15T05:15:48Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 3,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index e4aa88e53d..be830f5a22 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -17,7 +17,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3209,
"watchers_count": 3209,
- "forks_count": 953,
+ "forks_count": 954,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -42,7 +42,7 @@
"webshell"
],
"visibility": "public",
- "forks": 953,
+ "forks": 954,
"watchers": 3209,
"score": 0
},
diff --git a/2020/CVE-2020-16938.json b/2020/CVE-2020-16938.json
index a01b2b1fac..a61551a1da 100644
--- a/2020/CVE-2020-16938.json
+++ b/2020/CVE-2020-16938.json
@@ -13,17 +13,17 @@
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
"fork": false,
"created_at": "2020-10-21T15:38:22Z",
- "updated_at": "2022-02-12T15:36:25Z",
+ "updated_at": "2022-03-15T06:46:25Z",
"pushed_at": "2020-10-21T15:39:00Z",
- "stargazers_count": 176,
- "watchers_count": 176,
+ "stargazers_count": 177,
+ "watchers_count": 177,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
- "watchers": 176,
+ "watchers": 177,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json
index 5fd7cea3d7..495904212c 100644
--- a/2020/CVE-2020-1938.json
+++ b/2020/CVE-2020-1938.json
@@ -202,17 +202,17 @@
"description": "在一定条件下可执行命令",
"fork": false,
"created_at": "2020-02-21T08:42:50Z",
- "updated_at": "2021-12-15T14:38:24Z",
+ "updated_at": "2022-03-15T06:33:28Z",
"pushed_at": "2020-02-21T08:45:51Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 8,
+ "watchers": 9,
"score": 0
},
{
diff --git a/2020/CVE-2020-8558.json b/2020/CVE-2020-8558.json
index bfd0b1de4d..2fe0f9e8b2 100644
--- a/2020/CVE-2020-8558.json
+++ b/2020/CVE-2020-8558.json
@@ -17,12 +17,12 @@
"pushed_at": "2020-07-22T12:34:47Z",
"stargazers_count": 38,
"watchers_count": 38,
- "forks_count": 7,
+ "forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 7,
+ "forks": 8,
"watchers": 38,
"score": 0
},
diff --git a/2021/CVE-2021-1782.json b/2021/CVE-2021-1782.json
index 21cb200833..b1b56e0827 100644
--- a/2021/CVE-2021-1782.json
+++ b/2021/CVE-2021-1782.json
@@ -17,12 +17,12 @@
"pushed_at": "2021-02-10T14:39:04Z",
"stargazers_count": 31,
"watchers_count": 31,
- "forks_count": 10,
+ "forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 10,
+ "forks": 11,
"watchers": 31,
"score": 0
}
diff --git a/2021/CVE-2021-21341.json b/2021/CVE-2021-21341.json
index f60f824780..ed3094b5ae 100644
--- a/2021/CVE-2021-21341.json
+++ b/2021/CVE-2021-21341.json
@@ -25,5 +25,32 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 470049863,
+ "name": "ka-cve-2021-21341",
+ "full_name": "Mani1325\/ka-cve-2021-21341",
+ "owner": {
+ "login": "Mani1325",
+ "id": 96471113,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96471113?v=4",
+ "html_url": "https:\/\/github.com\/Mani1325"
+ },
+ "html_url": "https:\/\/github.com\/Mani1325\/ka-cve-2021-21341",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-15T07:28:52Z",
+ "updated_at": "2022-03-15T07:38:51Z",
+ "pushed_at": "2022-03-15T07:38:48Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index aec23c209c..46e8cfa10d 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -84,10 +84,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
- "updated_at": "2022-03-14T03:20:12Z",
+ "updated_at": "2022-03-15T11:41:08Z",
"pushed_at": "2021-12-30T12:26:11Z",
- "stargazers_count": 354,
- "watchers_count": 354,
+ "stargazers_count": 355,
+ "watchers_count": 355,
"forks_count": 134,
"allow_forking": true,
"is_template": false,
@@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 134,
- "watchers": 354,
+ "watchers": 355,
"score": 0
},
{
diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json
index 69ec74f645..497e5667c4 100644
--- a/2021/CVE-2021-22986.json
+++ b/2021/CVE-2021-22986.json
@@ -234,17 +234,17 @@
"description": "Code By:Tas9er \/ F5 BIG-IP 远程命令执行漏洞",
"fork": false,
"created_at": "2021-03-29T05:56:21Z",
- "updated_at": "2021-12-03T11:53:56Z",
+ "updated_at": "2022-03-15T07:42:46Z",
"pushed_at": "2021-03-29T05:58:51Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 7,
+ "watchers": 8,
"score": 0
},
{
diff --git a/2021/CVE-2021-27928.json b/2021/CVE-2021-27928.json
index 12449b2b72..1dbcb2eac5 100644
--- a/2021/CVE-2021-27928.json
+++ b/2021/CVE-2021-27928.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false,
"created_at": "2021-04-15T06:40:49Z",
- "updated_at": "2022-03-15T03:39:24Z",
+ "updated_at": "2022-03-15T06:17:14Z",
"pushed_at": "2021-12-08T03:06:43Z",
- "stargazers_count": 46,
- "watchers_count": 46,
+ "stargazers_count": 47,
+ "watchers_count": 47,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 13,
- "watchers": 46,
+ "watchers": 47,
"score": 0
},
{
diff --git a/2021/CVE-2021-29441.json b/2021/CVE-2021-29441.json
new file mode 100644
index 0000000000..2a27bae48b
--- /dev/null
+++ b/2021/CVE-2021-29441.json
@@ -0,0 +1,29 @@
+[
+ {
+ "id": 470076597,
+ "name": "CVE-2021-29441",
+ "full_name": "bysinks\/CVE-2021-29441",
+ "owner": {
+ "login": "bysinks",
+ "id": 50199185,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199185?v=4",
+ "html_url": "https:\/\/github.com\/bysinks"
+ },
+ "html_url": "https:\/\/github.com\/bysinks\/CVE-2021-29441",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-15T08:53:59Z",
+ "updated_at": "2022-03-15T09:02:02Z",
+ "pushed_at": "2022-03-15T08:56:39Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index ea16fee30c..ad850418ba 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -206,12 +206,12 @@
"pushed_at": "2021-01-28T02:21:30Z",
"stargazers_count": 6,
"watchers_count": 6,
- "forks_count": 3,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 3,
+ "forks": 2,
"watchers": 6,
"score": 0
},
@@ -973,12 +973,12 @@
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 458,
"watchers_count": 458,
- "forks_count": 122,
+ "forks_count": 123,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 122,
+ "forks": 123,
"watchers": 458,
"score": 0
},
diff --git a/2021/CVE-2021-35211.json b/2021/CVE-2021-35211.json
index febbddf39a..7b59d4c76c 100644
--- a/2021/CVE-2021-35211.json
+++ b/2021/CVE-2021-35211.json
@@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-14T05:52:17Z",
- "updated_at": "2022-03-13T08:51:42Z",
+ "updated_at": "2022-03-15T12:14:31Z",
"pushed_at": "2022-01-14T05:56:09Z",
- "stargazers_count": 15,
- "watchers_count": 15,
+ "stargazers_count": 16,
+ "watchers_count": 16,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 15,
+ "watchers": 16,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-35587.json b/2021/CVE-2021-35587.json
index cc4e5f7947..f59b07a46c 100644
--- a/2021/CVE-2021-35587.json
+++ b/2021/CVE-2021-35587.json
@@ -13,17 +13,17 @@
"description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587",
"fork": false,
"created_at": "2022-03-14T05:03:54Z",
- "updated_at": "2022-03-15T06:06:57Z",
+ "updated_at": "2022-03-15T10:55:36Z",
"pushed_at": "2022-03-14T05:07:01Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 7,
+ "watchers": 15,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-37748.json b/2021/CVE-2021-37748.json
deleted file mode 100644
index 60e0602871..0000000000
--- a/2021/CVE-2021-37748.json
+++ /dev/null
@@ -1,29 +0,0 @@
-[
- {
- "id": 421010663,
- "name": "CVE-2021-37748",
- "full_name": "SECFORCE\/CVE-2021-37748",
- "owner": {
- "login": "SECFORCE",
- "id": 8157384,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
- "html_url": "https:\/\/github.com\/SECFORCE"
- },
- "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2021-37748",
- "description": null,
- "fork": false,
- "created_at": "2021-10-25T12:16:41Z",
- "updated_at": "2022-02-12T03:49:08Z",
- "pushed_at": "2021-10-25T12:57:55Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "forks_count": 5,
- "allow_forking": true,
- "is_template": false,
- "topics": [],
- "visibility": "public",
- "forks": 5,
- "watchers": 3,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 4698164f2e..54a1f3025e 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -106,17 +106,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
- "updated_at": "2022-03-14T13:16:16Z",
+ "updated_at": "2022-03-15T08:23:58Z",
"pushed_at": "2022-01-30T14:22:23Z",
- "stargazers_count": 1410,
- "watchers_count": 1410,
- "forks_count": 412,
+ "stargazers_count": 1412,
+ "watchers_count": 1412,
+ "forks_count": 413,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 412,
- "watchers": 1410,
+ "forks": 413,
+ "watchers": 1412,
"score": 0
},
{
@@ -912,14 +912,14 @@
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 459,
"watchers_count": 459,
- "forks_count": 82,
+ "forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-4034"
],
"visibility": "public",
- "forks": 82,
+ "forks": 83,
"watchers": 459,
"score": 0
},
@@ -1261,10 +1261,10 @@
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
"fork": false,
"created_at": "2022-01-26T18:01:26Z",
- "updated_at": "2022-03-11T23:19:30Z",
+ "updated_at": "2022-03-15T09:38:52Z",
"pushed_at": "2022-02-07T15:42:00Z",
- "stargazers_count": 41,
- "watchers_count": 41,
+ "stargazers_count": 42,
+ "watchers_count": 42,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@@ -1287,7 +1287,7 @@
],
"visibility": "public",
"forks": 7,
- "watchers": 41,
+ "watchers": 42,
"score": 0
},
{
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index 579873b4bd..6c44e636bc 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -53,33 +53,6 @@
"watchers": 0,
"score": 0
},
- {
- "id": 420818304,
- "name": "CVE-2021-40444",
- "full_name": "TiagoSergio\/CVE-2021-40444",
- "owner": {
- "login": "TiagoSergio",
- "id": 24528913,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
- "html_url": "https:\/\/github.com\/TiagoSergio"
- },
- "html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444",
- "description": null,
- "fork": false,
- "created_at": "2021-10-24T23:17:12Z",
- "updated_at": "2021-10-24T23:17:28Z",
- "pushed_at": "2021-10-24T23:17:25Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 422246280,
"name": "CVE-2021-40444-POC",
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 9830a043b5..93d87a69d5 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -612,11 +612,11 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
- "updated_at": "2022-03-15T03:14:42Z",
+ "updated_at": "2022-03-15T08:44:21Z",
"pushed_at": "2022-03-12T21:30:58Z",
- "stargazers_count": 25,
- "watchers_count": 25,
- "forks_count": 6,
+ "stargazers_count": 29,
+ "watchers_count": 29,
+ "forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -630,8 +630,8 @@
"thehackersbrain"
],
"visibility": "public",
- "forks": 6,
- "watchers": 25,
+ "forks": 10,
+ "watchers": 29,
"score": 0
},
{
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index 647bd54ce0..39cf5e7f2e 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
- "updated_at": "2022-03-14T01:55:53Z",
+ "updated_at": "2022-03-15T06:22:16Z",
"pushed_at": "2021-12-16T09:50:15Z",
- "stargazers_count": 1050,
- "watchers_count": 1050,
- "forks_count": 281,
+ "stargazers_count": 1051,
+ "watchers_count": 1051,
+ "forks_count": 282,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 281,
- "watchers": 1050,
+ "forks": 282,
+ "watchers": 1051,
"score": 0
},
{
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 7f136ac86f..ac7b22ba2d 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -860,10 +860,10 @@
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
- "updated_at": "2022-03-10T11:49:02Z",
+ "updated_at": "2022-03-15T07:28:37Z",
"pushed_at": "2022-01-15T16:18:44Z",
- "stargazers_count": 708,
- "watchers_count": 708,
+ "stargazers_count": 709,
+ "watchers_count": 709,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
@@ -890,7 +890,7 @@
],
"visibility": "public",
"forks": 112,
- "watchers": 708,
+ "watchers": 709,
"score": 0
},
{
@@ -911,7 +911,7 @@
"pushed_at": "2022-01-22T14:55:02Z",
"stargazers_count": 1271,
"watchers_count": 1271,
- "forks_count": 347,
+ "forks_count": 346,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -921,7 +921,7 @@
"security"
],
"visibility": "public",
- "forks": 347,
+ "forks": 346,
"watchers": 1271,
"score": 0
},
@@ -3208,17 +3208,17 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T22:52:02Z",
- "updated_at": "2022-03-13T15:38:15Z",
+ "updated_at": "2022-03-15T07:28:20Z",
"pushed_at": "2021-12-20T15:34:21Z",
- "stargazers_count": 321,
- "watchers_count": 321,
+ "stargazers_count": 322,
+ "watchers_count": 322,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
- "watchers": 321,
+ "watchers": 322,
"score": 0
},
{
@@ -5937,12 +5937,12 @@
"pushed_at": "2022-02-03T20:02:09Z",
"stargazers_count": 336,
"watchers_count": 336,
- "forks_count": 95,
+ "forks_count": 94,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 95,
+ "forks": 94,
"watchers": 336,
"score": 0
},
@@ -6766,17 +6766,17 @@
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-15T22:30:34Z",
- "updated_at": "2022-03-09T06:29:52Z",
+ "updated_at": "2022-03-15T08:55:40Z",
"pushed_at": "2022-01-23T22:37:41Z",
- "stargazers_count": 69,
- "watchers_count": 69,
+ "stargazers_count": 70,
+ "watchers_count": 70,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
- "watchers": 69,
+ "watchers": 70,
"score": 0
},
{
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index c452a85497..46c8c8b29f 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -94,17 +94,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
- "updated_at": "2022-03-15T02:43:23Z",
+ "updated_at": "2022-03-15T08:59:26Z",
"pushed_at": "2022-03-09T08:40:29Z",
- "stargazers_count": 144,
- "watchers_count": 144,
- "forks_count": 47,
+ "stargazers_count": 146,
+ "watchers_count": 146,
+ "forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 47,
- "watchers": 144,
+ "forks": 49,
+ "watchers": 146,
"score": 0
},
{
@@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
- "updated_at": "2022-03-15T02:51:19Z",
+ "updated_at": "2022-03-15T12:02:50Z",
"pushed_at": "2022-03-08T06:20:05Z",
- "stargazers_count": 820,
- "watchers_count": 820,
- "forks_count": 158,
+ "stargazers_count": 826,
+ "watchers_count": 826,
+ "forks_count": 161,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 158,
- "watchers": 820,
+ "forks": 161,
+ "watchers": 826,
"score": 0
},
{
@@ -283,17 +283,17 @@
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
"fork": false,
"created_at": "2022-03-08T09:10:51Z",
- "updated_at": "2022-03-15T03:02:00Z",
+ "updated_at": "2022-03-15T08:12:21Z",
"pushed_at": "2022-03-08T09:14:25Z",
- "stargazers_count": 49,
- "watchers_count": 49,
+ "stargazers_count": 50,
+ "watchers_count": 50,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
- "watchers": 49,
+ "watchers": 50,
"score": 0
},
{
@@ -337,17 +337,17 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
- "updated_at": "2022-03-15T00:57:39Z",
+ "updated_at": "2022-03-15T11:45:36Z",
"pushed_at": "2022-03-08T11:52:22Z",
- "stargazers_count": 21,
- "watchers_count": 21,
- "forks_count": 12,
+ "stargazers_count": 22,
+ "watchers_count": 22,
+ "forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 12,
- "watchers": 21,
+ "forks": 13,
+ "watchers": 22,
"score": 0
},
{
@@ -364,17 +364,17 @@
"description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2022-03-08T12:43:43Z",
- "updated_at": "2022-03-15T01:26:18Z",
+ "updated_at": "2022-03-15T09:13:50Z",
"pushed_at": "2022-03-08T13:15:35Z",
- "stargazers_count": 12,
- "watchers_count": 12,
- "forks_count": 9,
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 9,
- "watchers": 12,
+ "forks": 10,
+ "watchers": 14,
"score": 0
},
{
@@ -526,17 +526,17 @@
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
"fork": false,
"created_at": "2022-03-08T17:13:24Z",
- "updated_at": "2022-03-14T13:16:20Z",
+ "updated_at": "2022-03-15T12:06:42Z",
"pushed_at": "2022-03-08T19:53:16Z",
- "stargazers_count": 15,
- "watchers_count": 15,
- "forks_count": 4,
+ "stargazers_count": 17,
+ "watchers_count": 17,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 4,
- "watchers": 15,
+ "forks": 5,
+ "watchers": 17,
"score": 0
},
{
@@ -663,17 +663,17 @@
"description": null,
"fork": false,
"created_at": "2022-03-09T05:22:20Z",
- "updated_at": "2022-03-10T18:50:04Z",
+ "updated_at": "2022-03-15T11:48:55Z",
"pushed_at": "2022-03-09T06:16:23Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 3,
"score": 0
},
{
@@ -1074,17 +1074,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
- "updated_at": "2022-03-15T03:49:25Z",
+ "updated_at": "2022-03-15T10:39:54Z",
"pushed_at": "2022-03-15T00:26:45Z",
- "stargazers_count": 82,
- "watchers_count": 82,
- "forks_count": 14,
+ "stargazers_count": 85,
+ "watchers_count": 85,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 14,
- "watchers": 82,
+ "forks": 15,
+ "watchers": 85,
"score": 0
},
{
@@ -1160,7 +1160,7 @@
"fork": false,
"created_at": "2022-03-14T13:21:25Z",
"updated_at": "2022-03-14T19:36:09Z",
- "pushed_at": "2022-03-14T13:29:03Z",
+ "pushed_at": "2022-03-15T09:06:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@@ -1186,17 +1186,17 @@
"description": "CVE-2022-0847 POC",
"fork": false,
"created_at": "2022-03-14T15:32:25Z",
- "updated_at": "2022-03-14T18:00:25Z",
+ "updated_at": "2022-03-15T07:53:31Z",
"pushed_at": "2022-03-14T20:34:57Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
},
{
@@ -1231,21 +1231,75 @@
"score": 0
},
{
- "id": 470027659,
- "name": "CVE-2022-0847",
- "full_name": "phuonguno98\/CVE-2022-0847",
+ "id": 470069674,
+ "name": "DirtyPIPE-CVE-2022-0847",
+ "full_name": "githublihaha\/DirtyPIPE-CVE-2022-0847",
+ "owner": {
+ "login": "githublihaha",
+ "id": 43808858,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43808858?v=4",
+ "html_url": "https:\/\/github.com\/githublihaha"
+ },
+ "html_url": "https:\/\/github.com\/githublihaha\/DirtyPIPE-CVE-2022-0847",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-15T08:33:19Z",
+ "updated_at": "2022-03-15T08:34:07Z",
+ "pushed_at": "2022-03-15T08:55:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
+ {
+ "id": 470076829,
+ "name": "CVE-2022-0847-DirtyPipe-Exploits",
+ "full_name": "phuonguno98\/CVE-2022-0847-DirtyPipe-Exploits",
"owner": {
"login": "phuonguno98",
"id": 55579865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55579865?v=4",
"html_url": "https:\/\/github.com\/phuonguno98"
},
- "html_url": "https:\/\/github.com\/phuonguno98\/CVE-2022-0847",
+ "html_url": "https:\/\/github.com\/phuonguno98\/CVE-2022-0847-DirtyPipe-Exploits",
"description": null,
"fork": false,
- "created_at": "2022-03-15T06:06:31Z",
- "updated_at": "2022-03-15T06:06:54Z",
- "pushed_at": "2022-03-15T06:06:51Z",
+ "created_at": "2022-03-15T08:54:38Z",
+ "updated_at": "2022-03-15T08:54:46Z",
+ "pushed_at": "2022-03-15T09:11:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
+ {
+ "id": 470128338,
+ "name": "CVE-2022-0847-dirty-pipe-kernel-checker",
+ "full_name": "MrP1xel\/CVE-2022-0847-dirty-pipe-kernel-checker",
+ "owner": {
+ "login": "MrP1xel",
+ "id": 16755572,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16755572?v=4",
+ "html_url": "https:\/\/github.com\/MrP1xel"
+ },
+ "html_url": "https:\/\/github.com\/MrP1xel\/CVE-2022-0847-dirty-pipe-kernel-checker",
+ "description": "Python script to check if your kernel is vulnerable to Dirty pipe CVE-2022-0847",
+ "fork": false,
+ "created_at": "2022-03-15T11:25:19Z",
+ "updated_at": "2022-03-15T11:27:38Z",
+ "pushed_at": "2022-03-15T11:30:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2022/CVE-2022-0853.json b/2022/CVE-2022-0853.json
index eb0fba8c26..247a82c7c8 100644
--- a/2022/CVE-2022-0853.json
+++ b/2022/CVE-2022-0853.json
@@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-03-10T09:10:56Z",
- "updated_at": "2022-03-12T08:16:55Z",
+ "updated_at": "2022-03-15T08:20:26Z",
"pushed_at": "2022-03-12T14:31:08Z",
- "stargazers_count": 9,
- "watchers_count": 9,
- "forks_count": 4,
+ "stargazers_count": 10,
+ "watchers_count": 10,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 4,
- "watchers": 9,
+ "forks": 5,
+ "watchers": 10,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json
index bb666072de..5da71abcce 100644
--- a/2022/CVE-2022-21882.json
+++ b/2022/CVE-2022-21882.json
@@ -13,17 +13,17 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
- "updated_at": "2022-03-14T01:58:30Z",
+ "updated_at": "2022-03-15T08:17:55Z",
"pushed_at": "2022-01-27T04:18:18Z",
- "stargazers_count": 391,
- "watchers_count": 391,
+ "stargazers_count": 392,
+ "watchers_count": 392,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 118,
- "watchers": 391,
+ "watchers": 392,
"score": 0
},
{
diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json
index ebccece002..3d4bcc58fe 100644
--- a/2022/CVE-2022-21971.json
+++ b/2022/CVE-2022-21971.json
@@ -13,11 +13,11 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
- "updated_at": "2022-03-15T06:11:31Z",
+ "updated_at": "2022-03-15T09:15:53Z",
"pushed_at": "2022-02-26T20:45:19Z",
- "stargazers_count": 227,
- "watchers_count": 227,
- "forks_count": 45,
+ "stargazers_count": 230,
+ "watchers_count": 230,
+ "forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -29,8 +29,8 @@
"rtf"
],
"visibility": "public",
- "forks": 45,
- "watchers": 227,
+ "forks": 47,
+ "watchers": 230,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json
index 225db3899b..f87bf3e2d8 100644
--- a/2022/CVE-2022-21999.json
+++ b/2022/CVE-2022-21999.json
@@ -17,7 +17,7 @@
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 495,
"watchers_count": 495,
- "forks_count": 96,
+ "forks_count": 95,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -25,7 +25,7 @@
"cve-2022-22718"
],
"visibility": "public",
- "forks": 96,
+ "forks": 95,
"watchers": 495,
"score": 0
}
diff --git a/2022/CVE-2022-22588.json b/2022/CVE-2022-22588.json
index 8483f17cc9..d4b081f24d 100644
--- a/2022/CVE-2022-22588.json
+++ b/2022/CVE-2022-22588.json
@@ -13,10 +13,10 @@
"description": "Exploits CVE-2022-22588 vulnerability on iOS 15.2 and lower. Provided for research purposes only.",
"fork": false,
"created_at": "2022-01-01T07:38:48Z",
- "updated_at": "2022-03-14T20:24:30Z",
+ "updated_at": "2022-03-15T06:35:33Z",
"pushed_at": "2022-03-09T18:32:20Z",
- "stargazers_count": 20,
- "watchers_count": 20,
+ "stargazers_count": 21,
+ "watchers_count": 21,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 20,
+ "watchers": 21,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index bd55f4a753..efbf761393 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -13,17 +13,17 @@
"description": "CVE-2022-22947",
"fork": false,
"created_at": "2022-03-02T11:58:55Z",
- "updated_at": "2022-03-13T15:49:59Z",
+ "updated_at": "2022-03-15T12:06:38Z",
"pushed_at": "2022-03-03T14:03:30Z",
- "stargazers_count": 164,
- "watchers_count": 164,
+ "stargazers_count": 166,
+ "watchers_count": 166,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 54,
- "watchers": 164,
+ "watchers": 166,
"score": 0
},
{
@@ -125,12 +125,12 @@
"pushed_at": "2022-03-03T14:31:32Z",
"stargazers_count": 32,
"watchers_count": 32,
- "forks_count": 13,
+ "forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 13,
+ "forks": 14,
"watchers": 32,
"score": 0
},
@@ -175,17 +175,17 @@
"description": "SpringCloudGatewayRCE - CVE-2022-22947 \/ Code By:Tas9er",
"fork": false,
"created_at": "2022-03-03T19:45:18Z",
- "updated_at": "2022-03-06T12:53:34Z",
+ "updated_at": "2022-03-15T07:42:04Z",
"pushed_at": "2022-03-03T20:44:25Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 6,
+ "watchers": 8,
"score": 0
},
{
@@ -864,5 +864,32 @@
"forks": 0,
"watchers": 3,
"score": 0
+ },
+ {
+ "id": 470075351,
+ "name": "CVE-2022-22947",
+ "full_name": "bysinks\/CVE-2022-22947",
+ "owner": {
+ "login": "bysinks",
+ "id": 50199185,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199185?v=4",
+ "html_url": "https:\/\/github.com\/bysinks"
+ },
+ "html_url": "https:\/\/github.com\/bysinks\/CVE-2022-22947",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-15T08:50:13Z",
+ "updated_at": "2022-03-15T08:50:13Z",
+ "pushed_at": "2022-03-15T08:52:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json
index 23fddeba72..a60ee6431a 100644
--- a/2022/CVE-2022-23131.json
+++ b/2022/CVE-2022-23131.json
@@ -40,17 +40,17 @@
"description": "cve-2022-23131 exp",
"fork": false,
"created_at": "2022-02-18T08:38:53Z",
- "updated_at": "2022-03-11T13:44:25Z",
+ "updated_at": "2022-03-15T08:14:38Z",
"pushed_at": "2022-02-21T04:27:48Z",
- "stargazers_count": 80,
- "watchers_count": 80,
- "forks_count": 31,
+ "stargazers_count": 81,
+ "watchers_count": 81,
+ "forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 31,
- "watchers": 80,
+ "forks": 32,
+ "watchers": 81,
"score": 0
},
{
diff --git a/2022/CVE-2022-24086.json b/2022/CVE-2022-24086.json
index 7ba89331e5..6045341403 100644
--- a/2022/CVE-2022-24086.json
+++ b/2022/CVE-2022-24086.json
@@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2022-03-15T05:11:23Z",
- "updated_at": "2022-03-15T05:11:23Z",
+ "updated_at": "2022-03-15T09:49:33Z",
"pushed_at": "2022-03-15T05:15:10Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 0,
+ "forks": 1,
+ "watchers": 1,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-24122.json b/2022/CVE-2022-24122.json
index 5dbf471486..fccd232d50 100644
--- a/2022/CVE-2022-24122.json
+++ b/2022/CVE-2022-24122.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-24122 Proof of Concept",
"fork": false,
"created_at": "2022-03-10T15:20:04Z",
- "updated_at": "2022-03-15T06:10:26Z",
- "pushed_at": "2022-03-14T20:29:56Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "updated_at": "2022-03-15T10:20:13Z",
+ "pushed_at": "2022-03-15T11:18:45Z",
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 5,
+ "watchers": 8,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json
index cbaf92cd1d..6cf04e0693 100644
--- a/2022/CVE-2022-25636.json
+++ b/2022/CVE-2022-25636.json
@@ -13,17 +13,17 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
- "updated_at": "2022-03-15T05:29:02Z",
+ "updated_at": "2022-03-15T11:32:23Z",
"pushed_at": "2022-03-07T17:18:19Z",
- "stargazers_count": 184,
- "watchers_count": 184,
- "forks_count": 31,
+ "stargazers_count": 200,
+ "watchers_count": 200,
+ "forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 31,
- "watchers": 184,
+ "forks": 33,
+ "watchers": 200,
"score": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index a109f88fad..68774c720d 100644
--- a/README.md
+++ b/README.md
@@ -125,7 +125,9 @@ A flaw was found in the way the "flags" member of the new pipe buffer
- [CYB3RK1D/CVE-2022-0847-POC](https://github.com/CYB3RK1D/CVE-2022-0847-POC)
- [breachnix/dirty-pipe-poc](https://github.com/breachnix/dirty-pipe-poc)
- [Shotokhan/cve_2022_0847_shellcode](https://github.com/Shotokhan/cve_2022_0847_shellcode)
-- [phuonguno98/CVE-2022-0847](https://github.com/phuonguno98/CVE-2022-0847)
+- [githublihaha/DirtyPIPE-CVE-2022-0847](https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847)
+- [phuonguno98/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits)
+- [MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker](https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker)
### CVE-2022-0848 (2022-03-04)
@@ -366,6 +368,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v
- [michaelklaan/CVE-2022-22947-Spring-Cloud](https://github.com/michaelklaan/CVE-2022-22947-Spring-Cloud)
- [hh-hunter/cve-2022-22947-docker](https://github.com/hh-hunter/cve-2022-22947-docker)
- [k3rwin/spring-cloud-gateway-rce](https://github.com/k3rwin/spring-cloud-gateway-rce)
+- [bysinks/CVE-2022-22947](https://github.com/bysinks/CVE-2022-22947)
### CVE-2022-23046 (2022-01-19)
@@ -1485,6 +1488,7 @@ XStream is a Java library to serialize objects to XML and back again. In XStream
- [s-index/CVE-2021-21341](https://github.com/s-index/CVE-2021-21341)
+- [Mani1325/ka-cve-2021-21341](https://github.com/Mani1325/ka-cve-2021-21341)
### CVE-2021-21349 (2021-03-22)
@@ -2475,6 +2479,14 @@ Grav is a file based Web-platform. Twig processing of static pages can be enable
- [CsEnox/CVE-2021-29440](https://github.com/CsEnox/CVE-2021-29440)
+### CVE-2021-29441 (2021-04-27)
+
+
+Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
+
+
+- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
+
### CVE-2021-29447 (2021-04-15)
@@ -3067,14 +3079,6 @@ TensorFlow is an end-to-end open source platform for machine learning. In affect
- [fran-CICS/ExploitTensorflowCVE-2021-37678](https://github.com/fran-CICS/ExploitTensorflowCVE-2021-37678)
-### CVE-2021-37748 (2021-10-28)
-
-
-Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.
-
-
-- [SECFORCE/CVE-2021-37748](https://github.com/SECFORCE/CVE-2021-37748)
-
### CVE-2021-37832 (2021-08-03)
@@ -3202,7 +3206,6 @@ Microsoft MSHTML Remote Code Execution Vulnerability
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
- [factionsypho/TIC4301_Project](https://github.com/factionsypho/TIC4301_Project)
-- [TiagoSergio/CVE-2021-40444](https://github.com/TiagoSergio/CVE-2021-40444)
- [0xK4gura/CVE-2021-40444-POC](https://github.com/0xK4gura/CVE-2021-40444-POC)
- [Zeop-CyberSec/word_mshtml](https://github.com/Zeop-CyberSec/word_mshtml)
- [Alexcot25051999/CVE-2021-40444](https://github.com/Alexcot25051999/CVE-2021-40444)