diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index 7d7c157e89..a379d991e0 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -17,14 +17,14 @@ "pushed_at": "2017-04-24T14:16:56Z", "stargazers_count": 334, "watchers_count": 334, - "forks_count": 103, + "forks_count": 104, "allow_forking": true, "is_template": false, "topics": [ "cve-2008-0166" ], "visibility": "public", - "forks": 103, + "forks": 104, "watchers": 334, "score": 0 }, diff --git a/2013/CVE-2013-2186.json b/2013/CVE-2013-2186.json index b12e65af5c..26838ccc26 100644 --- a/2013/CVE-2013-2186.json +++ b/2013/CVE-2013-2186.json @@ -13,17 +13,17 @@ "description": "Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)", "fork": false, "created_at": "2016-02-08T08:29:11Z", - "updated_at": "2022-02-03T17:43:26Z", + "updated_at": "2022-03-15T09:34:25Z", "pushed_at": "2016-04-14T15:53:28Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 14, - "watchers": 38, + "watchers": 39, "score": 0 }, { diff --git a/2016/CVE-2016-4657.json b/2016/CVE-2016-4657.json index eecf0172ed..3ab458247a 100644 --- a/2016/CVE-2016-4657.json +++ b/2016/CVE-2016-4657.json @@ -70,17 +70,17 @@ "description": "Exploiting CVE-2016-4657 to JailBreak the Nintendo Switch", "fork": false, "created_at": "2017-06-02T10:54:27Z", - "updated_at": "2021-07-18T18:36:28Z", + "updated_at": "2022-03-15T10:27:37Z", "pushed_at": "2018-02-03T14:49:44Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 49, + "watchers_count": 49, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 50, + "watchers": 49, "score": 0 }, { diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 42527ffb65..1abcb5afe0 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -1065,17 +1065,17 @@ "description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”", "fork": false, "created_at": "2022-03-07T18:36:50Z", - "updated_at": "2022-03-15T02:43:23Z", + "updated_at": "2022-03-15T08:59:26Z", "pushed_at": "2022-03-09T08:40:29Z", - "stargazers_count": 144, - "watchers_count": 144, - "forks_count": 47, + "stargazers_count": 146, + "watchers_count": 146, + "forks_count": 49, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 47, - "watchers": 144, + "forks": 49, + "watchers": 146, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-11235.json b/2018/CVE-2018-11235.json index aac7fd58c4..3fcd8396be 100644 --- a/2018/CVE-2018-11235.json +++ b/2018/CVE-2018-11235.json @@ -505,17 +505,17 @@ "description": "Auto malicious git repository creation to exploit CVE-2018-11235 a Remote Code Execution using Git Sub module.", "fork": false, "created_at": "2021-09-22T21:15:50Z", - "updated_at": "2021-12-22T15:28:18Z", + "updated_at": "2022-03-15T07:47:40Z", "pushed_at": "2021-09-22T21:28:30Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2018/CVE-2018-15961.json b/2018/CVE-2018-15961.json index 55d0685b55..226be7781f 100644 --- a/2018/CVE-2018-15961.json +++ b/2018/CVE-2018-15961.json @@ -100,17 +100,17 @@ "description": "Exploit for CVE-2018-15961, a unrestricted file upload vulnerability in Adobe ColdFusion 2018 leading to RCE", "fork": false, "created_at": "2021-06-30T08:15:18Z", - "updated_at": "2021-06-30T08:27:24Z", + "updated_at": "2022-03-15T11:57:09Z", "pushed_at": "2021-06-30T08:27:22Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2018/CVE-2018-4013.json b/2018/CVE-2018-4013.json index 24dc09d294..fd10c25ebe 100644 --- a/2018/CVE-2018-4013.json +++ b/2018/CVE-2018-4013.json @@ -40,17 +40,17 @@ "description": "RTSPServer Code Execution Vulnerability CVE-2018-4013", "fork": false, "created_at": "2018-11-24T15:49:53Z", - "updated_at": "2020-08-06T07:17:07Z", + "updated_at": "2022-03-15T09:32:43Z", "pushed_at": "2018-11-26T23:35:57Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 11, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index e771227e42..c333730205 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1705,17 +1705,17 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2022-03-14T08:48:38Z", + "updated_at": "2022-03-15T07:27:14Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1100, - "watchers_count": 1100, + "stargazers_count": 1101, + "watchers_count": 1101, "forks_count": 355, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 355, - "watchers": 1100, + "watchers": 1101, "score": 0 }, { @@ -1786,17 +1786,17 @@ "description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits", "fork": false, "created_at": "2019-05-31T00:04:12Z", - "updated_at": "2022-02-01T18:00:19Z", + "updated_at": "2022-03-15T07:18:41Z", "pushed_at": "2021-01-10T04:31:22Z", - "stargazers_count": 347, - "watchers_count": 347, + "stargazers_count": 348, + "watchers_count": 348, "forks_count": 129, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 129, - "watchers": 347, + "watchers": 348, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 302d651821..e99504962f 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2022-03-15T02:17:37Z", + "updated_at": "2022-03-15T10:12:16Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1705, - "watchers_count": 1705, - "forks_count": 256, + "stargazers_count": 1706, + "watchers_count": 1706, + "forks_count": 257, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 256, - "watchers": 1705, + "forks": 257, + "watchers": 1706, "score": 0 }, { diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index ce47f415d9..d54ad20186 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -202,10 +202,10 @@ "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", - "updated_at": "2022-02-22T03:05:47Z", + "updated_at": "2022-03-15T08:44:21Z", "pushed_at": "2020-01-15T17:01:50Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 127, + "watchers_count": 127, "forks_count": 58, "allow_forking": true, "is_template": false, @@ -221,7 +221,7 @@ ], "visibility": "public", "forks": 58, - "watchers": 126, + "watchers": 127, "score": 0 }, { diff --git a/2019/CVE-2019-11730.json b/2019/CVE-2019-11730.json index 260bcbbcdf..df89ee6ad7 100644 --- a/2019/CVE-2019-11730.json +++ b/2019/CVE-2019-11730.json @@ -17,12 +17,12 @@ "pushed_at": "2019-12-22T19:18:35Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 3, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 2, "watchers": 9, "score": 0 } diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index d3098a5105..abe0095467 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -44,7 +44,7 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 3209, "watchers_count": 3209, - "forks_count": 953, + "forks_count": 954, "allow_forking": true, "is_template": false, "topics": [ @@ -69,7 +69,7 @@ "webshell" ], "visibility": "public", - "forks": 953, + "forks": 954, "watchers": 3209, "score": 0 }, diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index f4ef517306..74a8d1dfbc 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -40,17 +40,17 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2022-03-04T08:29:03Z", + "updated_at": "2022-03-15T08:14:04Z", "pushed_at": "2022-01-05T04:09:42Z", - "stargazers_count": 570, - "watchers_count": 570, + "stargazers_count": 571, + "watchers_count": 571, "forks_count": 156, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 156, - "watchers": 570, + "watchers": 571, "score": 0 }, { diff --git a/2020/CVE-2020-0443.json b/2020/CVE-2020-0443.json index 675bd94ddb..4e6136a8b9 100644 --- a/2020/CVE-2020-0443.json +++ b/2020/CVE-2020-0443.json @@ -13,17 +13,17 @@ "description": "Proof of concept app for Android permanent denial-of-service vulnerability, CVE-2020-0443", "fork": false, "created_at": "2022-03-15T04:54:31Z", - "updated_at": "2022-03-15T05:18:37Z", + "updated_at": "2022-03-15T10:07:52Z", "pushed_at": "2022-03-15T05:15:48Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index e4aa88e53d..be830f5a22 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -17,7 +17,7 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 3209, "watchers_count": 3209, - "forks_count": 953, + "forks_count": 954, "allow_forking": true, "is_template": false, "topics": [ @@ -42,7 +42,7 @@ "webshell" ], "visibility": "public", - "forks": 953, + "forks": 954, "watchers": 3209, "score": 0 }, diff --git a/2020/CVE-2020-16938.json b/2020/CVE-2020-16938.json index a01b2b1fac..a61551a1da 100644 --- a/2020/CVE-2020-16938.json +++ b/2020/CVE-2020-16938.json @@ -13,17 +13,17 @@ "description": "Bypassing NTFS permissions to read any files as unprivileged user.", "fork": false, "created_at": "2020-10-21T15:38:22Z", - "updated_at": "2022-02-12T15:36:25Z", + "updated_at": "2022-03-15T06:46:25Z", "pushed_at": "2020-10-21T15:39:00Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 177, + "watchers_count": 177, "forks_count": 39, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 39, - "watchers": 176, + "watchers": 177, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 5fd7cea3d7..495904212c 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -202,17 +202,17 @@ "description": "在一定条件下可执行命令", "fork": false, "created_at": "2020-02-21T08:42:50Z", - "updated_at": "2021-12-15T14:38:24Z", + "updated_at": "2022-03-15T06:33:28Z", "pushed_at": "2020-02-21T08:45:51Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, - "watchers": 8, + "watchers": 9, "score": 0 }, { diff --git a/2020/CVE-2020-8558.json b/2020/CVE-2020-8558.json index bfd0b1de4d..2fe0f9e8b2 100644 --- a/2020/CVE-2020-8558.json +++ b/2020/CVE-2020-8558.json @@ -17,12 +17,12 @@ "pushed_at": "2020-07-22T12:34:47Z", "stargazers_count": 38, "watchers_count": 38, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 38, "score": 0 }, diff --git a/2021/CVE-2021-1782.json b/2021/CVE-2021-1782.json index 21cb200833..b1b56e0827 100644 --- a/2021/CVE-2021-1782.json +++ b/2021/CVE-2021-1782.json @@ -17,12 +17,12 @@ "pushed_at": "2021-02-10T14:39:04Z", "stargazers_count": 31, "watchers_count": 31, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 11, "watchers": 31, "score": 0 } diff --git a/2021/CVE-2021-21341.json b/2021/CVE-2021-21341.json index f60f824780..ed3094b5ae 100644 --- a/2021/CVE-2021-21341.json +++ b/2021/CVE-2021-21341.json @@ -25,5 +25,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 470049863, + "name": "ka-cve-2021-21341", + "full_name": "Mani1325\/ka-cve-2021-21341", + "owner": { + "login": "Mani1325", + "id": 96471113, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96471113?v=4", + "html_url": "https:\/\/github.com\/Mani1325" + }, + "html_url": "https:\/\/github.com\/Mani1325\/ka-cve-2021-21341", + "description": null, + "fork": false, + "created_at": "2022-03-15T07:28:52Z", + "updated_at": "2022-03-15T07:38:51Z", + "pushed_at": "2022-03-15T07:38:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index aec23c209c..46e8cfa10d 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -84,10 +84,10 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2022-03-14T03:20:12Z", + "updated_at": "2022-03-15T11:41:08Z", "pushed_at": "2021-12-30T12:26:11Z", - "stargazers_count": 354, - "watchers_count": 354, + "stargazers_count": 355, + "watchers_count": 355, "forks_count": 134, "allow_forking": true, "is_template": false, @@ -96,7 +96,7 @@ ], "visibility": "public", "forks": 134, - "watchers": 354, + "watchers": 355, "score": 0 }, { diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 69ec74f645..497e5667c4 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -234,17 +234,17 @@ "description": "Code By:Tas9er \/ F5 BIG-IP 远程命令执行漏洞", "fork": false, "created_at": "2021-03-29T05:56:21Z", - "updated_at": "2021-12-03T11:53:56Z", + "updated_at": "2022-03-15T07:42:46Z", "pushed_at": "2021-03-29T05:58:51Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2021/CVE-2021-27928.json b/2021/CVE-2021-27928.json index 12449b2b72..1dbcb2eac5 100644 --- a/2021/CVE-2021-27928.json +++ b/2021/CVE-2021-27928.json @@ -13,10 +13,10 @@ "description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞", "fork": false, "created_at": "2021-04-15T06:40:49Z", - "updated_at": "2022-03-15T03:39:24Z", + "updated_at": "2022-03-15T06:17:14Z", "pushed_at": "2021-12-08T03:06:43Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 13, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 46, + "watchers": 47, "score": 0 }, { diff --git a/2021/CVE-2021-29441.json b/2021/CVE-2021-29441.json new file mode 100644 index 0000000000..2a27bae48b --- /dev/null +++ b/2021/CVE-2021-29441.json @@ -0,0 +1,29 @@ +[ + { + "id": 470076597, + "name": "CVE-2021-29441", + "full_name": "bysinks\/CVE-2021-29441", + "owner": { + "login": "bysinks", + "id": 50199185, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199185?v=4", + "html_url": "https:\/\/github.com\/bysinks" + }, + "html_url": "https:\/\/github.com\/bysinks\/CVE-2021-29441", + "description": null, + "fork": false, + "created_at": "2022-03-15T08:53:59Z", + "updated_at": "2022-03-15T09:02:02Z", + "pushed_at": "2022-03-15T08:56:39Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index ea16fee30c..ad850418ba 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -206,12 +206,12 @@ "pushed_at": "2021-01-28T02:21:30Z", "stargazers_count": 6, "watchers_count": 6, - "forks_count": 3, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 2, "watchers": 6, "score": 0 }, @@ -973,12 +973,12 @@ "pushed_at": "2022-01-13T05:48:01Z", "stargazers_count": 458, "watchers_count": 458, - "forks_count": 122, + "forks_count": 123, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 122, + "forks": 123, "watchers": 458, "score": 0 }, diff --git a/2021/CVE-2021-35211.json b/2021/CVE-2021-35211.json index febbddf39a..7b59d4c76c 100644 --- a/2021/CVE-2021-35211.json +++ b/2021/CVE-2021-35211.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-01-14T05:52:17Z", - "updated_at": "2022-03-13T08:51:42Z", + "updated_at": "2022-03-15T12:14:31Z", "pushed_at": "2022-01-14T05:56:09Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 15, + "watchers": 16, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-35587.json b/2021/CVE-2021-35587.json index cc4e5f7947..f59b07a46c 100644 --- a/2021/CVE-2021-35587.json +++ b/2021/CVE-2021-35587.json @@ -13,17 +13,17 @@ "description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587", "fork": false, "created_at": "2022-03-14T05:03:54Z", - "updated_at": "2022-03-15T06:06:57Z", + "updated_at": "2022-03-15T10:55:36Z", "pushed_at": "2022-03-14T05:07:01Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 7, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-37748.json b/2021/CVE-2021-37748.json deleted file mode 100644 index 60e0602871..0000000000 --- a/2021/CVE-2021-37748.json +++ /dev/null @@ -1,29 +0,0 @@ -[ - { - "id": 421010663, - "name": "CVE-2021-37748", - "full_name": "SECFORCE\/CVE-2021-37748", - "owner": { - "login": "SECFORCE", - "id": 8157384, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", - "html_url": "https:\/\/github.com\/SECFORCE" - }, - "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2021-37748", - "description": null, - "fork": false, - "created_at": "2021-10-25T12:16:41Z", - "updated_at": "2022-02-12T03:49:08Z", - "pushed_at": "2021-10-25T12:57:55Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 4698164f2e..54a1f3025e 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -106,17 +106,17 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-03-14T13:16:16Z", + "updated_at": "2022-03-15T08:23:58Z", "pushed_at": "2022-01-30T14:22:23Z", - "stargazers_count": 1410, - "watchers_count": 1410, - "forks_count": 412, + "stargazers_count": 1412, + "watchers_count": 1412, + "forks_count": 413, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 412, - "watchers": 1410, + "forks": 413, + "watchers": 1412, "score": 0 }, { @@ -912,14 +912,14 @@ "pushed_at": "2022-01-27T20:09:24Z", "stargazers_count": 459, "watchers_count": 459, - "forks_count": 82, + "forks_count": 83, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-4034" ], "visibility": "public", - "forks": 82, + "forks": 83, "watchers": 459, "score": 0 }, @@ -1261,10 +1261,10 @@ "description": "Proof of Concept (PoC) CVE-2021-4034 ", "fork": false, "created_at": "2022-01-26T18:01:26Z", - "updated_at": "2022-03-11T23:19:30Z", + "updated_at": "2022-03-15T09:38:52Z", "pushed_at": "2022-02-07T15:42:00Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -1287,7 +1287,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 41, + "watchers": 42, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 579873b4bd..6c44e636bc 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -53,33 +53,6 @@ "watchers": 0, "score": 0 }, - { - "id": 420818304, - "name": "CVE-2021-40444", - "full_name": "TiagoSergio\/CVE-2021-40444", - "owner": { - "login": "TiagoSergio", - "id": 24528913, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4", - "html_url": "https:\/\/github.com\/TiagoSergio" - }, - "html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444", - "description": null, - "fork": false, - "created_at": "2021-10-24T23:17:12Z", - "updated_at": "2021-10-24T23:17:28Z", - "pushed_at": "2021-10-24T23:17:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 422246280, "name": "CVE-2021-40444-POC", diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 9830a043b5..93d87a69d5 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -612,11 +612,11 @@ "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", - "updated_at": "2022-03-15T03:14:42Z", + "updated_at": "2022-03-15T08:44:21Z", "pushed_at": "2022-03-12T21:30:58Z", - "stargazers_count": 25, - "watchers_count": 25, - "forks_count": 6, + "stargazers_count": 29, + "watchers_count": 29, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [ @@ -630,8 +630,8 @@ "thehackersbrain" ], "visibility": "public", - "forks": 6, - "watchers": 25, + "forks": 10, + "watchers": 29, "score": 0 }, { diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 647bd54ce0..39cf5e7f2e 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,17 +13,17 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2022-03-14T01:55:53Z", + "updated_at": "2022-03-15T06:22:16Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1050, - "watchers_count": 1050, - "forks_count": 281, + "stargazers_count": 1051, + "watchers_count": 1051, + "forks_count": 282, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 281, - "watchers": 1050, + "forks": 282, + "watchers": 1051, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 7f136ac86f..ac7b22ba2d 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -860,10 +860,10 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2022-03-10T11:49:02Z", + "updated_at": "2022-03-15T07:28:37Z", "pushed_at": "2022-01-15T16:18:44Z", - "stargazers_count": 708, - "watchers_count": 708, + "stargazers_count": 709, + "watchers_count": 709, "forks_count": 112, "allow_forking": true, "is_template": false, @@ -890,7 +890,7 @@ ], "visibility": "public", "forks": 112, - "watchers": 708, + "watchers": 709, "score": 0 }, { @@ -911,7 +911,7 @@ "pushed_at": "2022-01-22T14:55:02Z", "stargazers_count": 1271, "watchers_count": 1271, - "forks_count": 347, + "forks_count": 346, "allow_forking": true, "is_template": false, "topics": [ @@ -921,7 +921,7 @@ "security" ], "visibility": "public", - "forks": 347, + "forks": 346, "watchers": 1271, "score": 0 }, @@ -3208,17 +3208,17 @@ "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T22:52:02Z", - "updated_at": "2022-03-13T15:38:15Z", + "updated_at": "2022-03-15T07:28:20Z", "pushed_at": "2021-12-20T15:34:21Z", - "stargazers_count": 321, - "watchers_count": 321, + "stargazers_count": 322, + "watchers_count": 322, "forks_count": 50, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 50, - "watchers": 321, + "watchers": 322, "score": 0 }, { @@ -5937,12 +5937,12 @@ "pushed_at": "2022-02-03T20:02:09Z", "stargazers_count": 336, "watchers_count": 336, - "forks_count": 95, + "forks_count": 94, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 95, + "forks": 94, "watchers": 336, "score": 0 }, @@ -6766,17 +6766,17 @@ "description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).", "fork": false, "created_at": "2021-12-15T22:30:34Z", - "updated_at": "2022-03-09T06:29:52Z", + "updated_at": "2022-03-15T08:55:40Z", "pushed_at": "2022-01-23T22:37:41Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "forks_count": 20, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 20, - "watchers": 69, + "watchers": 70, "score": 0 }, { diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index c452a85497..46c8c8b29f 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -94,17 +94,17 @@ "description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”", "fork": false, "created_at": "2022-03-07T18:36:50Z", - "updated_at": "2022-03-15T02:43:23Z", + "updated_at": "2022-03-15T08:59:26Z", "pushed_at": "2022-03-09T08:40:29Z", - "stargazers_count": 144, - "watchers_count": 144, - "forks_count": 47, + "stargazers_count": 146, + "watchers_count": 146, + "forks_count": 49, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 47, - "watchers": 144, + "forks": 49, + "watchers": 146, "score": 0 }, { @@ -121,17 +121,17 @@ "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "fork": false, "created_at": "2022-03-07T18:55:20Z", - "updated_at": "2022-03-15T02:51:19Z", + "updated_at": "2022-03-15T12:02:50Z", "pushed_at": "2022-03-08T06:20:05Z", - "stargazers_count": 820, - "watchers_count": 820, - "forks_count": 158, + "stargazers_count": 826, + "watchers_count": 826, + "forks_count": 161, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 158, - "watchers": 820, + "forks": 161, + "watchers": 826, "score": 0 }, { @@ -283,17 +283,17 @@ "description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.", "fork": false, "created_at": "2022-03-08T09:10:51Z", - "updated_at": "2022-03-15T03:02:00Z", + "updated_at": "2022-03-15T08:12:21Z", "pushed_at": "2022-03-08T09:14:25Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 17, - "watchers": 49, + "watchers": 50, "score": 0 }, { @@ -337,17 +337,17 @@ "description": "CVE-2022-0847 DirtyPipe Exploit.", "fork": false, "created_at": "2022-03-08T11:49:40Z", - "updated_at": "2022-03-15T00:57:39Z", + "updated_at": "2022-03-15T11:45:36Z", "pushed_at": "2022-03-08T11:52:22Z", - "stargazers_count": 21, - "watchers_count": 21, - "forks_count": 12, + "stargazers_count": 22, + "watchers_count": 22, + "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 12, - "watchers": 21, + "forks": 13, + "watchers": 22, "score": 0 }, { @@ -364,17 +364,17 @@ "description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability", "fork": false, "created_at": "2022-03-08T12:43:43Z", - "updated_at": "2022-03-15T01:26:18Z", + "updated_at": "2022-03-15T09:13:50Z", "pushed_at": "2022-03-08T13:15:35Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 9, + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 9, - "watchers": 12, + "forks": 10, + "watchers": 14, "score": 0 }, { @@ -526,17 +526,17 @@ "description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"", "fork": false, "created_at": "2022-03-08T17:13:24Z", - "updated_at": "2022-03-14T13:16:20Z", + "updated_at": "2022-03-15T12:06:42Z", "pushed_at": "2022-03-08T19:53:16Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 4, + "stargazers_count": 17, + "watchers_count": 17, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 15, + "forks": 5, + "watchers": 17, "score": 0 }, { @@ -663,17 +663,17 @@ "description": null, "fork": false, "created_at": "2022-03-09T05:22:20Z", - "updated_at": "2022-03-10T18:50:04Z", + "updated_at": "2022-03-15T11:48:55Z", "pushed_at": "2022-03-09T06:16:23Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 3, "score": 0 }, { @@ -1074,17 +1074,17 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2022-03-15T03:49:25Z", + "updated_at": "2022-03-15T10:39:54Z", "pushed_at": "2022-03-15T00:26:45Z", - "stargazers_count": 82, - "watchers_count": 82, - "forks_count": 14, + "stargazers_count": 85, + "watchers_count": 85, + "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 82, + "forks": 15, + "watchers": 85, "score": 0 }, { @@ -1160,7 +1160,7 @@ "fork": false, "created_at": "2022-03-14T13:21:25Z", "updated_at": "2022-03-14T19:36:09Z", - "pushed_at": "2022-03-14T13:29:03Z", + "pushed_at": "2022-03-15T09:06:03Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, @@ -1186,17 +1186,17 @@ "description": "CVE-2022-0847 POC", "fork": false, "created_at": "2022-03-14T15:32:25Z", - "updated_at": "2022-03-14T18:00:25Z", + "updated_at": "2022-03-15T07:53:31Z", "pushed_at": "2022-03-14T20:34:57Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -1231,21 +1231,75 @@ "score": 0 }, { - "id": 470027659, - "name": "CVE-2022-0847", - "full_name": "phuonguno98\/CVE-2022-0847", + "id": 470069674, + "name": "DirtyPIPE-CVE-2022-0847", + "full_name": "githublihaha\/DirtyPIPE-CVE-2022-0847", + "owner": { + "login": "githublihaha", + "id": 43808858, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43808858?v=4", + "html_url": "https:\/\/github.com\/githublihaha" + }, + "html_url": "https:\/\/github.com\/githublihaha\/DirtyPIPE-CVE-2022-0847", + "description": null, + "fork": false, + "created_at": "2022-03-15T08:33:19Z", + "updated_at": "2022-03-15T08:34:07Z", + "pushed_at": "2022-03-15T08:55:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 470076829, + "name": "CVE-2022-0847-DirtyPipe-Exploits", + "full_name": "phuonguno98\/CVE-2022-0847-DirtyPipe-Exploits", "owner": { "login": "phuonguno98", "id": 55579865, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55579865?v=4", "html_url": "https:\/\/github.com\/phuonguno98" }, - "html_url": "https:\/\/github.com\/phuonguno98\/CVE-2022-0847", + "html_url": "https:\/\/github.com\/phuonguno98\/CVE-2022-0847-DirtyPipe-Exploits", "description": null, "fork": false, - "created_at": "2022-03-15T06:06:31Z", - "updated_at": "2022-03-15T06:06:54Z", - "pushed_at": "2022-03-15T06:06:51Z", + "created_at": "2022-03-15T08:54:38Z", + "updated_at": "2022-03-15T08:54:46Z", + "pushed_at": "2022-03-15T09:11:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 470128338, + "name": "CVE-2022-0847-dirty-pipe-kernel-checker", + "full_name": "MrP1xel\/CVE-2022-0847-dirty-pipe-kernel-checker", + "owner": { + "login": "MrP1xel", + "id": 16755572, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16755572?v=4", + "html_url": "https:\/\/github.com\/MrP1xel" + }, + "html_url": "https:\/\/github.com\/MrP1xel\/CVE-2022-0847-dirty-pipe-kernel-checker", + "description": "Python script to check if your kernel is vulnerable to Dirty pipe CVE-2022-0847", + "fork": false, + "created_at": "2022-03-15T11:25:19Z", + "updated_at": "2022-03-15T11:27:38Z", + "pushed_at": "2022-03-15T11:30:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2022/CVE-2022-0853.json b/2022/CVE-2022-0853.json index eb0fba8c26..247a82c7c8 100644 --- a/2022/CVE-2022-0853.json +++ b/2022/CVE-2022-0853.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-03-10T09:10:56Z", - "updated_at": "2022-03-12T08:16:55Z", + "updated_at": "2022-03-15T08:20:26Z", "pushed_at": "2022-03-12T14:31:08Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 4, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 9, + "forks": 5, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index bb666072de..5da71abcce 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -13,17 +13,17 @@ "description": "win32k LPE ", "fork": false, "created_at": "2022-01-27T03:44:10Z", - "updated_at": "2022-03-14T01:58:30Z", + "updated_at": "2022-03-15T08:17:55Z", "pushed_at": "2022-01-27T04:18:18Z", - "stargazers_count": 391, - "watchers_count": 391, + "stargazers_count": 392, + "watchers_count": 392, "forks_count": 118, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 118, - "watchers": 391, + "watchers": 392, "score": 0 }, { diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json index ebccece002..3d4bcc58fe 100644 --- a/2022/CVE-2022-21971.json +++ b/2022/CVE-2022-21971.json @@ -13,11 +13,11 @@ "description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"", "fork": false, "created_at": "2022-02-26T20:37:42Z", - "updated_at": "2022-03-15T06:11:31Z", + "updated_at": "2022-03-15T09:15:53Z", "pushed_at": "2022-02-26T20:45:19Z", - "stargazers_count": 227, - "watchers_count": 227, - "forks_count": 45, + "stargazers_count": 230, + "watchers_count": 230, + "forks_count": 47, "allow_forking": true, "is_template": false, "topics": [ @@ -29,8 +29,8 @@ "rtf" ], "visibility": "public", - "forks": 45, - "watchers": 227, + "forks": 47, + "watchers": 230, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 225db3899b..f87bf3e2d8 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -17,7 +17,7 @@ "pushed_at": "2022-02-09T16:54:09Z", "stargazers_count": 495, "watchers_count": 495, - "forks_count": 96, + "forks_count": 95, "allow_forking": true, "is_template": false, "topics": [ @@ -25,7 +25,7 @@ "cve-2022-22718" ], "visibility": "public", - "forks": 96, + "forks": 95, "watchers": 495, "score": 0 } diff --git a/2022/CVE-2022-22588.json b/2022/CVE-2022-22588.json index 8483f17cc9..d4b081f24d 100644 --- a/2022/CVE-2022-22588.json +++ b/2022/CVE-2022-22588.json @@ -13,10 +13,10 @@ "description": "Exploits CVE-2022-22588 vulnerability on iOS 15.2 and lower. Provided for research purposes only.", "fork": false, "created_at": "2022-01-01T07:38:48Z", - "updated_at": "2022-03-14T20:24:30Z", + "updated_at": "2022-03-15T06:35:33Z", "pushed_at": "2022-03-09T18:32:20Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 20, + "watchers": 21, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index bd55f4a753..efbf761393 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -13,17 +13,17 @@ "description": "CVE-2022-22947", "fork": false, "created_at": "2022-03-02T11:58:55Z", - "updated_at": "2022-03-13T15:49:59Z", + "updated_at": "2022-03-15T12:06:38Z", "pushed_at": "2022-03-03T14:03:30Z", - "stargazers_count": 164, - "watchers_count": 164, + "stargazers_count": 166, + "watchers_count": 166, "forks_count": 54, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 54, - "watchers": 164, + "watchers": 166, "score": 0 }, { @@ -125,12 +125,12 @@ "pushed_at": "2022-03-03T14:31:32Z", "stargazers_count": 32, "watchers_count": 32, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 13, + "forks": 14, "watchers": 32, "score": 0 }, @@ -175,17 +175,17 @@ "description": "SpringCloudGatewayRCE - CVE-2022-22947 \/ Code By:Tas9er", "fork": false, "created_at": "2022-03-03T19:45:18Z", - "updated_at": "2022-03-06T12:53:34Z", + "updated_at": "2022-03-15T07:42:04Z", "pushed_at": "2022-03-03T20:44:25Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 8, "score": 0 }, { @@ -864,5 +864,32 @@ "forks": 0, "watchers": 3, "score": 0 + }, + { + "id": 470075351, + "name": "CVE-2022-22947", + "full_name": "bysinks\/CVE-2022-22947", + "owner": { + "login": "bysinks", + "id": 50199185, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199185?v=4", + "html_url": "https:\/\/github.com\/bysinks" + }, + "html_url": "https:\/\/github.com\/bysinks\/CVE-2022-22947", + "description": null, + "fork": false, + "created_at": "2022-03-15T08:50:13Z", + "updated_at": "2022-03-15T08:50:13Z", + "pushed_at": "2022-03-15T08:52:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json index 23fddeba72..a60ee6431a 100644 --- a/2022/CVE-2022-23131.json +++ b/2022/CVE-2022-23131.json @@ -40,17 +40,17 @@ "description": "cve-2022-23131 exp", "fork": false, "created_at": "2022-02-18T08:38:53Z", - "updated_at": "2022-03-11T13:44:25Z", + "updated_at": "2022-03-15T08:14:38Z", "pushed_at": "2022-02-21T04:27:48Z", - "stargazers_count": 80, - "watchers_count": 80, - "forks_count": 31, + "stargazers_count": 81, + "watchers_count": 81, + "forks_count": 32, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 31, - "watchers": 80, + "forks": 32, + "watchers": 81, "score": 0 }, { diff --git a/2022/CVE-2022-24086.json b/2022/CVE-2022-24086.json index 7ba89331e5..6045341403 100644 --- a/2022/CVE-2022-24086.json +++ b/2022/CVE-2022-24086.json @@ -67,17 +67,17 @@ "description": null, "fork": false, "created_at": "2022-03-15T05:11:23Z", - "updated_at": "2022-03-15T05:11:23Z", + "updated_at": "2022-03-15T09:49:33Z", "pushed_at": "2022-03-15T05:15:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-24122.json b/2022/CVE-2022-24122.json index 5dbf471486..fccd232d50 100644 --- a/2022/CVE-2022-24122.json +++ b/2022/CVE-2022-24122.json @@ -13,10 +13,10 @@ "description": "CVE-2022-24122 Proof of Concept", "fork": false, "created_at": "2022-03-10T15:20:04Z", - "updated_at": "2022-03-15T06:10:26Z", - "pushed_at": "2022-03-14T20:29:56Z", - "stargazers_count": 5, - "watchers_count": 5, + "updated_at": "2022-03-15T10:20:13Z", + "pushed_at": "2022-03-15T11:18:45Z", + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json index cbaf92cd1d..6cf04e0693 100644 --- a/2022/CVE-2022-25636.json +++ b/2022/CVE-2022-25636.json @@ -13,17 +13,17 @@ "description": "CVE-2022-25636", "fork": false, "created_at": "2022-03-07T13:38:41Z", - "updated_at": "2022-03-15T05:29:02Z", + "updated_at": "2022-03-15T11:32:23Z", "pushed_at": "2022-03-07T17:18:19Z", - "stargazers_count": 184, - "watchers_count": 184, - "forks_count": 31, + "stargazers_count": 200, + "watchers_count": 200, + "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 31, - "watchers": 184, + "forks": 33, + "watchers": 200, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index a109f88fad..68774c720d 100644 --- a/README.md +++ b/README.md @@ -125,7 +125,9 @@ A flaw was found in the way the "flags" member of the new pipe buffer - [CYB3RK1D/CVE-2022-0847-POC](https://github.com/CYB3RK1D/CVE-2022-0847-POC) - [breachnix/dirty-pipe-poc](https://github.com/breachnix/dirty-pipe-poc) - [Shotokhan/cve_2022_0847_shellcode](https://github.com/Shotokhan/cve_2022_0847_shellcode) -- [phuonguno98/CVE-2022-0847](https://github.com/phuonguno98/CVE-2022-0847) +- [githublihaha/DirtyPIPE-CVE-2022-0847](https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847) +- [phuonguno98/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits) +- [MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker](https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker) ### CVE-2022-0848 (2022-03-04) @@ -366,6 +368,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v - [michaelklaan/CVE-2022-22947-Spring-Cloud](https://github.com/michaelklaan/CVE-2022-22947-Spring-Cloud) - [hh-hunter/cve-2022-22947-docker](https://github.com/hh-hunter/cve-2022-22947-docker) - [k3rwin/spring-cloud-gateway-rce](https://github.com/k3rwin/spring-cloud-gateway-rce) +- [bysinks/CVE-2022-22947](https://github.com/bysinks/CVE-2022-22947) ### CVE-2022-23046 (2022-01-19) @@ -1485,6 +1488,7 @@ XStream is a Java library to serialize objects to XML and back again. In XStream - [s-index/CVE-2021-21341](https://github.com/s-index/CVE-2021-21341) +- [Mani1325/ka-cve-2021-21341](https://github.com/Mani1325/ka-cve-2021-21341) ### CVE-2021-21349 (2021-03-22) @@ -2475,6 +2479,14 @@ Grav is a file based Web-platform. Twig processing of static pages can be enable - [CsEnox/CVE-2021-29440](https://github.com/CsEnox/CVE-2021-29440) +### CVE-2021-29441 (2021-04-27) + + +Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server. + + +- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441) + ### CVE-2021-29447 (2021-04-15) @@ -3067,14 +3079,6 @@ TensorFlow is an end-to-end open source platform for machine learning. In affect - [fran-CICS/ExploitTensorflowCVE-2021-37678](https://github.com/fran-CICS/ExploitTensorflowCVE-2021-37678) -### CVE-2021-37748 (2021-10-28) - - -Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate. - - -- [SECFORCE/CVE-2021-37748](https://github.com/SECFORCE/CVE-2021-37748) - ### CVE-2021-37832 (2021-08-03) @@ -3202,7 +3206,6 @@ Microsoft MSHTML Remote Code Execution Vulnerability - [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444) - [factionsypho/TIC4301_Project](https://github.com/factionsypho/TIC4301_Project) -- [TiagoSergio/CVE-2021-40444](https://github.com/TiagoSergio/CVE-2021-40444) - [0xK4gura/CVE-2021-40444-POC](https://github.com/0xK4gura/CVE-2021-40444-POC) - [Zeop-CyberSec/word_mshtml](https://github.com/Zeop-CyberSec/word_mshtml) - [Alexcot25051999/CVE-2021-40444](https://github.com/Alexcot25051999/CVE-2021-40444)