From bd6f1419ad1607066f5df0e23e60b2a8430ebd7e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 18 Nov 2022 21:18:16 +0900 Subject: [PATCH] Auto Update 2022/11/18 12:18:16 --- 2014/CVE-2014-4210.json | 12 ++++++------ 2015/CVE-2015-1805.json | 8 ++++---- 2015/CVE-2015-6357.json | 31 +++++++++++++++++++++++++++++++ 2015/CVE-2015-6639.json | 8 ++++---- 2016/CVE-2016-0638.json | 12 ++++++------ 2016/CVE-2016-2431.json | 8 ++++---- 2017/CVE-2017-3066.json | 8 ++++---- 2017/CVE-2017-3248.json | 12 ++++++------ 2017/CVE-2017-6079.json | 8 ++++---- 2018/CVE-2018-2628.json | 12 ++++++------ 2018/CVE-2018-2893.json | 16 ++++++++-------- 2018/CVE-2018-7600.json | 8 ++++---- 2019/CVE-2019-11043.json | 8 ++++---- 2019/CVE-2019-11510.json | 8 ++++---- 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-19781.json | 8 ++++---- 2019/CVE-2019-2618.json | 12 ++++++------ 2019/CVE-2019-3396.json | 8 ++++---- 2019/CVE-2019-7304.json | 8 ++++---- 2020/CVE-2020-1472.json | 12 ++++++------ 2020/CVE-2020-14882.json | 8 ++++---- 2020/CVE-2020-15778.json | 20 ++++++++++---------- 2020/CVE-2020-2551.json | 12 ++++++------ 2020/CVE-2020-35847.json | 6 +++--- 2020/CVE-2020-8241.json | 8 ++++---- 2021/CVE-2021-1675.json | 8 ++++---- 2021/CVE-2021-21972.json | 12 ++++++------ 2021/CVE-2021-21985.json | 8 ++++---- 2021/CVE-2021-3129.json | 8 ++++---- 2021/CVE-2021-3156.json | 8 ++++---- 2021/CVE-2021-4034.json | 4 ++-- 2021/CVE-2021-41773.json | 4 ++-- 2021/CVE-2021-44228.json | 2 +- 2022/CVE-2022-0441.json | 29 +++++++++++++++++++++++++++++ 2022/CVE-2022-0847.json | 8 ++++---- 2022/CVE-2022-1329.json | 4 ++-- 2022/CVE-2022-22947.json | 16 ++++++++-------- 2022/CVE-2022-22954.json | 12 ++++++------ 2022/CVE-2022-26134.json | 12 ++++++------ 2022/CVE-2022-30781.json | 8 ++++---- 2022/CVE-2022-33679.json | 8 ++++---- 2022/CVE-2022-3699.json | 8 ++++---- 2022/CVE-2022-39197.json | 8 ++++---- 2022/CVE-2022-41082.json | 8 ++++---- 2022/CVE-2022-41622.json | 8 ++++---- 2022/CVE-2022-42045.json | 8 ++++---- README.md | 9 +++++++++ 47 files changed, 269 insertions(+), 200 deletions(-) create mode 100644 2015/CVE-2015-6357.json diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index e43fb31388..85306b2854 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -42,12 +42,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-11-17T00:07:34Z", + "updated_at": "2022-11-18T11:54:28Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1538, - "watchers_count": 1538, + "stargazers_count": 1539, + "watchers_count": 1539, "has_discussions": false, - "forks_count": 310, + "forks_count": 311, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,8 +74,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 310, - "watchers": 1538, + "forks": 311, + "watchers": 1539, "score": 0 }, { diff --git a/2015/CVE-2015-1805.json b/2015/CVE-2015-1805.json index 6c9b0949f2..f570b0a80f 100644 --- a/2015/CVE-2015-1805.json +++ b/2015/CVE-2015-1805.json @@ -42,10 +42,10 @@ "description": "CVE-2015-1805 root tool", "fork": false, "created_at": "2016-04-01T12:10:14Z", - "updated_at": "2022-09-03T18:38:35Z", + "updated_at": "2022-11-18T11:21:23Z", "pushed_at": "2017-11-23T20:55:03Z", - "stargazers_count": 266, - "watchers_count": 266, + "stargazers_count": 265, + "watchers_count": 265, "has_discussions": false, "forks_count": 155, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 155, - "watchers": 266, + "watchers": 265, "score": 0 }, { diff --git a/2015/CVE-2015-6357.json b/2015/CVE-2015-6357.json new file mode 100644 index 0000000000..d0e44f7c22 --- /dev/null +++ b/2015/CVE-2015-6357.json @@ -0,0 +1,31 @@ +[ + { + "id": 46267200, + "name": "firepwner", + "full_name": "mattimustang\/firepwner", + "owner": { + "login": "mattimustang", + "id": 188046, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188046?v=4", + "html_url": "https:\/\/github.com\/mattimustang" + }, + "html_url": "https:\/\/github.com\/mattimustang\/firepwner", + "description": "Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability", + "fork": false, + "created_at": "2015-11-16T10:15:47Z", + "updated_at": "2020-04-07T07:07:42Z", + "pushed_at": "2015-11-16T10:20:09Z", + "stargazers_count": 5, + "watchers_count": 5, + "has_discussions": false, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index 5f26e1a86d..93b6a948b3 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -42,10 +42,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2022-10-06T08:10:15Z", + "updated_at": "2022-11-18T07:29:12Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 323, - "watchers_count": 323, + "stargazers_count": 322, + "watchers_count": 322, "has_discussions": false, "forks_count": 116, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 116, - "watchers": 323, + "watchers": 322, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 7432e6f942..1545516f1b 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,12 +13,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-11-17T00:07:34Z", + "updated_at": "2022-11-18T11:54:28Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1538, - "watchers_count": 1538, + "stargazers_count": 1539, + "watchers_count": 1539, "has_discussions": false, - "forks_count": 310, + "forks_count": 311, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,8 +45,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 310, - "watchers": 1538, + "forks": 311, + "watchers": 1539, "score": 0 }, { diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index 2e84da48df..aec59b26e4 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -42,10 +42,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2022-10-06T08:10:15Z", + "updated_at": "2022-11-18T07:29:12Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 323, - "watchers_count": 323, + "stargazers_count": 322, + "watchers_count": 322, "has_discussions": false, "forks_count": 116, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 116, - "watchers": 323, + "watchers": 322, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3066.json b/2017/CVE-2017-3066.json index 0c9b56c224..2e20a2d6be 100644 --- a/2017/CVE-2017-3066.json +++ b/2017/CVE-2017-3066.json @@ -13,10 +13,10 @@ "description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12", "fork": false, "created_at": "2018-03-12T16:44:12Z", - "updated_at": "2022-11-09T17:59:26Z", + "updated_at": "2022-11-18T10:10:03Z", "pushed_at": "2022-10-18T08:53:13Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 85, + "watchers": 86, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index b2109697ef..f9afb5683d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,12 +42,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-11-17T00:07:34Z", + "updated_at": "2022-11-18T11:54:28Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1538, - "watchers_count": 1538, + "stargazers_count": 1539, + "watchers_count": 1539, "has_discussions": false, - "forks_count": 310, + "forks_count": 311, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,8 +74,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 310, - "watchers": 1538, + "forks": 311, + "watchers": 1539, "score": 0 }, { diff --git a/2017/CVE-2017-6079.json b/2017/CVE-2017-6079.json index f68e49846c..0a75a86215 100644 --- a/2017/CVE-2017-6079.json +++ b/2017/CVE-2017-6079.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2018-09-22T19:18:47Z", - "updated_at": "2022-09-17T03:55:56Z", + "updated_at": "2022-11-18T11:26:29Z", "pushed_at": "2018-09-22T21:17:51Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 19, + "watchers": 18, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 46e6d2442b..5d4b73a430 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,12 +568,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-11-17T00:07:34Z", + "updated_at": "2022-11-18T11:54:28Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1538, - "watchers_count": 1538, + "stargazers_count": 1539, + "watchers_count": 1539, "has_discussions": false, - "forks_count": 310, + "forks_count": 311, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -600,8 +600,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 310, - "watchers": 1538, + "forks": 311, + "watchers": 1539, "score": 0 }, { diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json index e1efcceccb..26a5d468cf 100644 --- a/2018/CVE-2018-2893.json +++ b/2018/CVE-2018-2893.json @@ -42,10 +42,10 @@ "description": "CVE-2018-2893 PoC", "fork": false, "created_at": "2018-07-19T06:28:12Z", - "updated_at": "2022-07-25T02:34:20Z", + "updated_at": "2022-11-18T08:03:11Z", "pushed_at": "2018-07-19T06:12:51Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 37, - "watchers": 30, + "watchers": 31, "score": 0 }, { @@ -158,10 +158,10 @@ "description": "CVE-2018-2893", "fork": false, "created_at": "2018-10-07T08:41:14Z", - "updated_at": "2022-01-22T07:50:55Z", + "updated_at": "2022-11-18T08:04:55Z", "pushed_at": "2018-10-07T09:53:54Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -170,7 +170,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 11, + "watchers": 12, "score": 0 }, { diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 3237a5add3..eb67101ddb 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -78,10 +78,10 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2022-11-16T11:56:36Z", + "updated_at": "2022-11-18T08:54:22Z", "pushed_at": "2021-01-08T10:31:22Z", - "stargazers_count": 536, - "watchers_count": 536, + "stargazers_count": 537, + "watchers_count": 537, "has_discussions": false, "forks_count": 173, "allow_forking": true, @@ -100,7 +100,7 @@ ], "visibility": "public", "forks": 173, - "watchers": 536, + "watchers": 537, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index a227f48bc9..098752b6d0 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2022-11-16T06:33:09Z", + "updated_at": "2022-11-18T06:50:37Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1744, - "watchers_count": 1744, + "stargazers_count": 1745, + "watchers_count": 1745, "has_discussions": false, "forks_count": 261, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 261, - "watchers": 1744, + "watchers": 1745, "score": 0 }, { diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index 223b675b80..3459558e9d 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -216,10 +216,10 @@ "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", - "updated_at": "2022-07-10T18:18:14Z", + "updated_at": "2022-11-18T09:14:05Z", "pushed_at": "2020-01-15T17:01:50Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 125, + "watchers_count": 125, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -237,7 +237,7 @@ ], "visibility": "public", "forks": 58, - "watchers": 126, + "watchers": 125, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 6b1bd85076..8b9258d32d 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -42,10 +42,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-11-18T01:49:53Z", + "updated_at": "2022-11-18T11:50:28Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3603, - "watchers_count": 3603, + "stargazers_count": 3604, + "watchers_count": 3604, "has_discussions": false, "forks_count": 1042, "allow_forking": true, @@ -74,7 +74,7 @@ ], "visibility": "public", "forks": 1042, - "watchers": 3603, + "watchers": 3604, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 7cdafc0fcb..6ee1b019df 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -311,10 +311,10 @@ "description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix", "fork": false, "created_at": "2020-01-12T15:16:54Z", - "updated_at": "2022-06-16T20:16:19Z", + "updated_at": "2022-11-18T07:29:24Z", "pushed_at": "2020-01-17T22:01:20Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -329,7 +329,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 36, + "watchers": 35, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 5daacd2521..ee40390910 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -187,12 +187,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-11-17T00:07:34Z", + "updated_at": "2022-11-18T11:54:28Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1538, - "watchers_count": 1538, + "stargazers_count": 1539, + "watchers_count": 1539, "has_discussions": false, - "forks_count": 310, + "forks_count": 311, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -219,8 +219,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 310, - "watchers": 1538, + "forks": 311, + "watchers": 1539, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index 4e75190239..a991fac549 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -100,10 +100,10 @@ "description": "CVE-2019-3396 confluence SSTI RCE", "fork": false, "created_at": "2019-04-10T02:15:47Z", - "updated_at": "2022-11-09T18:02:59Z", + "updated_at": "2022-11-18T10:10:10Z", "pushed_at": "2020-10-01T08:40:07Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 75, "allow_forking": true, @@ -117,7 +117,7 @@ ], "visibility": "public", "forks": 75, - "watchers": 169, + "watchers": 170, "score": 0 }, { diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json index 2cf44d14d1..9e8ebf07d5 100644 --- a/2019/CVE-2019-7304.json +++ b/2019/CVE-2019-7304.json @@ -13,10 +13,10 @@ "description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)", "fork": false, "created_at": "2019-02-12T06:02:06Z", - "updated_at": "2022-11-11T13:04:49Z", + "updated_at": "2022-11-18T10:13:55Z", "pushed_at": "2019-05-09T21:34:26Z", - "stargazers_count": 625, - "watchers_count": 625, + "stargazers_count": 626, + "watchers_count": 626, "has_discussions": false, "forks_count": 158, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 158, - "watchers": 625, + "watchers": 626, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index f2c127c954..ab4c61fa24 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -100,10 +100,10 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2022-11-13T18:40:00Z", + "updated_at": "2022-11-18T07:03:24Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 970, - "watchers_count": 970, + "stargazers_count": 971, + "watchers_count": 971, "has_discussions": false, "forks_count": 268, "allow_forking": true, @@ -112,7 +112,7 @@ "topics": [], "visibility": "public", "forks": 268, - "watchers": 970, + "watchers": 971, "score": 0 }, { @@ -1135,13 +1135,13 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 4, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 09c961d567..9db30d4ab8 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-11-18T01:49:53Z", + "updated_at": "2022-11-18T11:50:28Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3603, - "watchers_count": 3603, + "stargazers_count": 3604, + "watchers_count": 3604, "has_discussions": false, "forks_count": 1042, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1042, - "watchers": 3603, + "watchers": 3604, "score": 0 }, { diff --git a/2020/CVE-2020-15778.json b/2020/CVE-2020-15778.json index b93774f023..56c82bb5cc 100644 --- a/2020/CVE-2020-15778.json +++ b/2020/CVE-2020-15778.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2020-07-18T05:15:05Z", - "updated_at": "2022-11-09T18:08:37Z", + "updated_at": "2022-11-18T09:40:21Z", "pushed_at": "2021-03-17T11:29:58Z", - "stargazers_count": 119, - "watchers_count": 119, + "stargazers_count": 120, + "watchers_count": 120, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 119, + "watchers": 120, "score": 0 }, { @@ -42,19 +42,19 @@ "description": "Exploit for CVE-2020-15778(OpenSSH vul)", "fork": false, "created_at": "2021-07-15T01:04:24Z", - "updated_at": "2022-10-20T21:58:20Z", + "updated_at": "2022-11-18T09:40:13Z", "pushed_at": "2022-02-18T08:04:46Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, - "watchers": 16, + "forks": 7, + "watchers": 17, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 0b0e39fb73..04498a72c7 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,12 +13,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-11-17T00:07:34Z", + "updated_at": "2022-11-18T11:54:28Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1538, - "watchers_count": 1538, + "stargazers_count": 1539, + "watchers_count": 1539, "has_discussions": false, - "forks_count": 310, + "forks_count": 311, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,8 +45,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 310, - "watchers": 1538, + "forks": 311, + "watchers": 1539, "score": 0 }, { diff --git a/2020/CVE-2020-35847.json b/2020/CVE-2020-35847.json index 9bafee04b5..36e130dcd2 100644 --- a/2020/CVE-2020-35847.json +++ b/2020/CVE-2020-35847.json @@ -14,17 +14,17 @@ "fork": false, "created_at": "2021-08-06T09:19:01Z", "updated_at": "2021-08-06T10:53:15Z", - "pushed_at": "2021-08-06T10:27:32Z", + "pushed_at": "2022-11-18T08:47:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2020/CVE-2020-8241.json b/2020/CVE-2020-8241.json index 57ef7cdd4b..b282b4a60d 100644 --- a/2020/CVE-2020-8241.json +++ b/2020/CVE-2020-8241.json @@ -13,10 +13,10 @@ "description": "Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239", "fork": false, "created_at": "2020-10-25T15:58:02Z", - "updated_at": "2021-03-17T06:36:08Z", + "updated_at": "2022-11-18T11:29:29Z", "pushed_at": "2020-11-01T07:25:54Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 24, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 267dc2e246..1b27994645 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -42,10 +42,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2022-11-17T08:05:03Z", + "updated_at": "2022-11-18T10:29:33Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1630, - "watchers_count": 1630, + "stargazers_count": 1631, + "watchers_count": 1631, "has_discussions": false, "forks_count": 581, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 581, - "watchers": 1630, + "watchers": 1631, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index ede3b95c63..435fb3b7c3 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -795,12 +795,12 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2022-11-18T06:12:02Z", + "updated_at": "2022-11-18T11:41:04Z", "pushed_at": "2022-10-28T14:26:56Z", - "stargazers_count": 604, - "watchers_count": 604, + "stargazers_count": 616, + "watchers_count": 616, "has_discussions": false, - "forks_count": 65, + "forks_count": 67, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -813,8 +813,8 @@ "vcenter" ], "visibility": "public", - "forks": 65, - "watchers": 604, + "forks": 67, + "watchers": 616, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 46c604c6b5..a72720d252 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -198,10 +198,10 @@ "description": null, "fork": false, "created_at": "2021-06-05T11:03:13Z", - "updated_at": "2022-11-14T04:48:02Z", + "updated_at": "2022-11-18T11:29:47Z", "pushed_at": "2021-06-07T04:00:06Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -210,7 +210,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 34, + "watchers": 33, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index c120c876c4..bbd01bc893 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2022-11-09T18:10:47Z", + "updated_at": "2022-11-18T11:30:18Z", "pushed_at": "2021-01-29T13:59:07Z", - "stargazers_count": 226, - "watchers_count": 226, + "stargazers_count": 227, + "watchers_count": 227, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 226, + "watchers": 227, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index fb9f98be70..a09ecf53c2 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1039,10 +1039,10 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2022-11-17T23:08:12Z", + "updated_at": "2022-11-18T10:03:01Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 550, - "watchers_count": 550, + "stargazers_count": 551, + "watchers_count": 551, "has_discussions": false, "forks_count": 152, "allow_forking": true, @@ -1051,7 +1051,7 @@ "topics": [], "visibility": "public", "forks": 152, - "watchers": 550, + "watchers": 551, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 6e25a35606..a1cf2bfc70 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -82,13 +82,13 @@ "stargazers_count": 1701, "watchers_count": 1701, "has_discussions": false, - "forks_count": 487, + "forks_count": 488, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 487, + "forks": 488, "watchers": 1701, "score": 0 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 5ff6e4787e..6e9472e4a0 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -414,7 +414,7 @@ "stargazers_count": 57, "watchers_count": 57, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -429,7 +429,7 @@ "thehackersbrain" ], "visibility": "public", - "forks": 23, + "forks": 24, "watchers": 57, "score": 0 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 7bfdf5e192..0f59a3ed44 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -412,7 +412,7 @@ "fork": false, "created_at": "2021-12-11T07:19:11Z", "updated_at": "2022-11-18T03:08:35Z", - "pushed_at": "2022-11-17T02:44:09Z", + "pushed_at": "2022-11-18T08:36:03Z", "stargazers_count": 542, "watchers_count": 542, "has_discussions": false, diff --git a/2022/CVE-2022-0441.json b/2022/CVE-2022-0441.json index 7072e5b1d6..7548e48c89 100644 --- a/2022/CVE-2022-0441.json +++ b/2022/CVE-2022-0441.json @@ -33,5 +33,34 @@ "forks": 1, "watchers": 5, "score": 0 + }, + { + "id": 567613523, + "name": "cve-2022-0441", + "full_name": "SDragon1205\/cve-2022-0441", + "owner": { + "login": "SDragon1205", + "id": 80585189, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80585189?v=4", + "html_url": "https:\/\/github.com\/SDragon1205" + }, + "html_url": "https:\/\/github.com\/SDragon1205\/cve-2022-0441", + "description": "CVE-2022-0441 - MasterStudy LMS 2.7.6", + "fork": false, + "created_at": "2022-11-18T07:02:29Z", + "updated_at": "2022-11-18T07:07:18Z", + "pushed_at": "2022-11-18T07:07:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 3ae473231a..2e611da8f4 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1175,10 +1175,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2022-11-14T14:21:34Z", + "updated_at": "2022-11-18T09:04:09Z", "pushed_at": "2022-06-13T19:33:08Z", - "stargazers_count": 341, - "watchers_count": 341, + "stargazers_count": 342, + "watchers_count": 342, "has_discussions": false, "forks_count": 95, "allow_forking": true, @@ -1187,7 +1187,7 @@ "topics": [], "visibility": "public", "forks": 95, - "watchers": 341, + "watchers": 342, "score": 0 }, { diff --git a/2022/CVE-2022-1329.json b/2022/CVE-2022-1329.json index 4d9ffda1cc..1ff1c69f74 100644 --- a/2022/CVE-2022-1329.json +++ b/2022/CVE-2022-1329.json @@ -18,13 +18,13 @@ "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, - "forks_count": 6, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 5, "watchers": 12, "score": 0 }, diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 0038c1deec..45d9094138 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1273,10 +1273,10 @@ "description": "CVE-2022-22947 注入Godzilla内存马", "fork": false, "created_at": "2022-04-26T05:48:27Z", - "updated_at": "2022-11-18T00:38:21Z", + "updated_at": "2022-11-18T09:38:53Z", "pushed_at": "2022-04-26T05:55:58Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 127, + "watchers_count": 127, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -1285,7 +1285,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 126, + "watchers": 127, "score": 0 }, { @@ -1563,10 +1563,10 @@ "description": "Spring Cloud Gateway远程代码执行", "fork": false, "created_at": "2022-10-29T03:28:55Z", - "updated_at": "2022-11-06T06:53:11Z", + "updated_at": "2022-11-18T09:30:52Z", "pushed_at": "2022-10-29T04:34:21Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -1575,7 +1575,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 84ac500e68..72046de44d 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -712,12 +712,12 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2022-11-18T06:12:02Z", + "updated_at": "2022-11-18T11:41:04Z", "pushed_at": "2022-10-28T14:26:56Z", - "stargazers_count": 604, - "watchers_count": 604, + "stargazers_count": 616, + "watchers_count": 616, "has_discussions": false, - "forks_count": 65, + "forks_count": 67, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -730,8 +730,8 @@ "vcenter" ], "visibility": "public", - "forks": 65, - "watchers": 604, + "forks": 67, + "watchers": 616, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 4de922b85a..ee7e61d4fd 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -18,7 +18,7 @@ "stargazers_count": 862, "watchers_count": 862, "has_discussions": true, - "forks_count": 156, + "forks_count": 157, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,7 +44,7 @@ "gui" ], "visibility": "public", - "forks": 156, + "forks": 157, "watchers": 862, "score": 0 }, @@ -742,10 +742,10 @@ "description": null, "fork": false, "created_at": "2022-06-07T09:19:02Z", - "updated_at": "2022-11-15T17:36:49Z", + "updated_at": "2022-11-18T10:10:17Z", "pushed_at": "2022-06-07T10:35:18Z", - "stargazers_count": 230, - "watchers_count": 230, + "stargazers_count": 231, + "watchers_count": 231, "has_discussions": false, "forks_count": 44, "allow_forking": true, @@ -754,7 +754,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 230, + "watchers": 231, "score": 0 }, { diff --git a/2022/CVE-2022-30781.json b/2022/CVE-2022-30781.json index f59469b854..0fd2ed029b 100644 --- a/2022/CVE-2022-30781.json +++ b/2022/CVE-2022-30781.json @@ -13,10 +13,10 @@ "description": "🍵 Gitea repository migration remote command execution exploit.", "fork": false, "created_at": "2022-05-22T05:15:58Z", - "updated_at": "2022-11-09T18:15:52Z", + "updated_at": "2022-11-18T07:15:44Z", "pushed_at": "2022-05-26T11:32:21Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 78, + "watchers": 79, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-33679.json b/2022/CVE-2022-33679.json index 2d47f53d90..a7ea32018a 100644 --- a/2022/CVE-2022-33679.json +++ b/2022/CVE-2022-33679.json @@ -13,10 +13,10 @@ "description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html", "fork": false, "created_at": "2022-11-02T18:38:01Z", - "updated_at": "2022-11-18T05:48:27Z", + "updated_at": "2022-11-18T07:26:44Z", "pushed_at": "2022-11-07T16:21:14Z", - "stargazers_count": 298, - "watchers_count": 298, + "stargazers_count": 299, + "watchers_count": 299, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 298, + "watchers": 299, "score": 0 }, { diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json index 6a0f3e317a..7bbca751d3 100644 --- a/2022/CVE-2022-3699.json +++ b/2022/CVE-2022-3699.json @@ -13,10 +13,10 @@ "description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W", "fork": false, "created_at": "2022-11-09T14:15:30Z", - "updated_at": "2022-11-18T04:24:34Z", + "updated_at": "2022-11-18T07:36:30Z", "pushed_at": "2022-11-09T14:42:56Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 117, + "watchers_count": 117, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 118, + "watchers": 117, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index b6074b44a0..03b2296a5f 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -282,10 +282,10 @@ "description": "CobaltStrike <= 4.7.1 RCE", "fork": false, "created_at": "2022-10-14T11:46:01Z", - "updated_at": "2022-11-17T06:48:24Z", + "updated_at": "2022-11-18T11:03:01Z", "pushed_at": "2022-10-25T05:32:54Z", - "stargazers_count": 280, - "watchers_count": 280, + "stargazers_count": 281, + "watchers_count": 281, "has_discussions": false, "forks_count": 74, "allow_forking": true, @@ -294,7 +294,7 @@ "topics": [], "visibility": "public", "forks": 74, - "watchers": 280, + "watchers": 281, "score": 0 }, { diff --git a/2022/CVE-2022-41082.json b/2022/CVE-2022-41082.json index 2739a2f6e1..8320d88845 100644 --- a/2022/CVE-2022-41082.json +++ b/2022/CVE-2022-41082.json @@ -13,10 +13,10 @@ "description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability", "fork": false, "created_at": "2022-10-01T11:53:14Z", - "updated_at": "2022-11-17T20:47:00Z", + "updated_at": "2022-11-18T08:11:20Z", "pushed_at": "2022-10-01T12:19:53Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 59, + "watchers": 60, "score": 0 }, { diff --git a/2022/CVE-2022-41622.json b/2022/CVE-2022-41622.json index d556a5437d..18b65ec7ed 100644 --- a/2022/CVE-2022-41622.json +++ b/2022/CVE-2022-41622.json @@ -13,10 +13,10 @@ "description": "A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root", "fork": false, "created_at": "2022-08-03T21:20:29Z", - "updated_at": "2022-11-17T19:49:36Z", + "updated_at": "2022-11-18T09:47:09Z", "pushed_at": "2022-10-20T17:37:43Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-42045.json b/2022/CVE-2022-42045.json index 61aead1417..430349d6b7 100644 --- a/2022/CVE-2022-42045.json +++ b/2022/CVE-2022-42045.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-10-23T15:58:18Z", - "updated_at": "2022-11-14T20:42:41Z", + "updated_at": "2022-11-18T07:39:05Z", "pushed_at": "2022-10-24T10:13:34Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 31, + "watchers": 30, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 2964ab0970..f2375648a7 100644 --- a/README.md +++ b/README.md @@ -58,6 +58,7 @@ The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some paramete - [biulove0x/CVE-2022-0441](https://github.com/biulove0x/CVE-2022-0441) +- [SDragon1205/cve-2022-0441](https://github.com/SDragon1205/cve-2022-0441) ### CVE-2022-0482 (2022-03-09) @@ -26326,6 +26327,14 @@ Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, - [hexx0r/CVE-2015-6132](https://github.com/hexx0r/CVE-2015-6132) +### CVE-2015-6357 (2015-11-18) + + +The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444. + + +- [mattimustang/firepwner](https://github.com/mattimustang/firepwner) + ### CVE-2015-6576 (2017-10-02)