From c4564abae00e7e180bc973c216170f5da6e2e8b6 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 7 Jun 2022 15:23:16 +0900 Subject: [PATCH] Auto Update 2022/06/07 06:23:16 --- 2014/CVE-2014-4210.json | 8 ++--- 2016/CVE-2016-0638.json | 8 ++--- 2016/CVE-2016-5195.json | 4 +-- 2017/CVE-2017-3248.json | 8 ++--- 2017/CVE-2017-7921.json | 8 ++--- 2017/CVE-2017-8570.json | 8 ++--- 2018/CVE-2018-11759.json | 8 ++--- 2018/CVE-2018-2628.json | 8 ++--- 2018/CVE-2018-8174.json | 8 ++--- 2018/CVE-2018-8581.json | 8 ++--- 2019/CVE-2019-0232.json | 8 ++--- 2019/CVE-2019-0708.json | 8 ++--- 2019/CVE-2019-11580.json | 8 ++--- 2019/CVE-2019-12409.json | 8 ++--- 2019/CVE-2019-15514.json | 8 ++--- 2019/CVE-2019-17558.json | 12 ++++---- 2019/CVE-2019-19781.json | 8 ++--- 2019/CVE-2019-2618.json | 24 +++++++-------- 2019/CVE-2019-2725.json | 8 ++--- 2019/CVE-2019-6447.json | 8 ++--- 2020/CVE-2020-0609.json | 8 ++--- 2020/CVE-2020-0796.json | 16 +++++----- 2020/CVE-2020-12800.json | 2 +- 2020/CVE-2020-14882.json | 12 ++++---- 2020/CVE-2020-1938.json | 16 +++++----- 2020/CVE-2020-2551.json | 16 +++++----- 2020/CVE-2020-8840.json | 8 ++--- 2021/CVE-2021-22205.json | 4 +-- 2021/CVE-2021-26855.json | 27 +++++++++++++++++ 2021/CVE-2021-26943.json | 8 ++--- 2021/CVE-2021-3156.json | 8 ++--- 2021/CVE-2021-31805.json | 16 +++++----- 2021/CVE-2021-3560.json | 8 ++--- 2021/CVE-2021-4034.json | 8 ++--- 2021/CVE-2021-40444.json | 12 ++++---- 2021/CVE-2021-43224.json | 12 ++++---- 2021/CVE-2021-44228.json | 47 +++++++---------------------- 2022/CVE-2022-0540.json | 8 ++--- 2022/CVE-2022-0847.json | 4 +-- 2022/CVE-2022-1388.json | 10 +++---- 2022/CVE-2022-22536.json | 8 ++--- 2022/CVE-2022-22965.json | 12 ++++---- 2022/CVE-2022-26134.json | 65 ++++++++++++++++++++++++++++------------ 2022/CVE-2022-29072.json | 8 ++--- 2022/CVE-2022-30190.json | 28 ++++++++--------- README.md | 5 ++-- 46 files changed, 290 insertions(+), 262 deletions(-) diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 460ddff739..5ef56abb65 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-06-05T03:33:27Z", + "updated_at": "2022-06-07T05:04:26Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1381, - "watchers_count": 1381, + "stargazers_count": 1382, + "watchers_count": 1382, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1381, + "watchers": 1382, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 6169366145..fb3b7dc2e3 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-06-05T03:33:27Z", + "updated_at": "2022-06-07T05:04:26Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1381, - "watchers_count": 1381, + "stargazers_count": 1382, + "watchers_count": 1382, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1381, + "watchers": 1382, "score": 0 }, { diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 4b0a63f309..e30972a43e 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -1073,12 +1073,12 @@ "pushed_at": "2022-03-09T08:40:29Z", "stargazers_count": 186, "watchers_count": 186, - "forks_count": 64, + "forks_count": 65, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 64, + "forks": 65, "watchers": 186, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 00a58832a1..6c92c6ca53 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-06-05T03:33:27Z", + "updated_at": "2022-06-07T05:04:26Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1381, - "watchers_count": 1381, + "stargazers_count": 1382, + "watchers_count": 1382, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1381, + "watchers": 1382, "score": 0 }, { diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index 4a093c69b9..428d2cef07 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -94,17 +94,17 @@ "description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.", "fork": false, "created_at": "2021-01-29T16:08:35Z", - "updated_at": "2022-05-22T23:46:43Z", + "updated_at": "2022-06-07T01:27:07Z", "pushed_at": "2021-01-29T16:22:39Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, - "watchers": 29, + "watchers": 30, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-8570.json b/2017/CVE-2017-8570.json index fa6c0ca475..66a5777302 100644 --- a/2017/CVE-2017-8570.json +++ b/2017/CVE-2017-8570.json @@ -40,17 +40,17 @@ "description": "Proof of Concept exploit for CVE-2017-8570", "fork": false, "created_at": "2018-01-09T19:09:33Z", - "updated_at": "2022-04-29T17:26:29Z", + "updated_at": "2022-06-07T05:25:16Z", "pushed_at": "2018-01-09T19:23:43Z", - "stargazers_count": 182, - "watchers_count": 182, + "stargazers_count": 183, + "watchers_count": 183, "forks_count": 105, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 105, - "watchers": 182, + "watchers": 183, "score": 0 }, { diff --git a/2018/CVE-2018-11759.json b/2018/CVE-2018-11759.json index 1a8148fdfe..91e3a95398 100644 --- a/2018/CVE-2018-11759.json +++ b/2018/CVE-2018-11759.json @@ -13,17 +13,17 @@ "description": "Proof of concept showing how to exploit the CVE-2018-11759", "fork": false, "created_at": "2018-11-01T09:11:07Z", - "updated_at": "2022-03-07T09:18:24Z", + "updated_at": "2022-06-07T03:35:52Z", "pushed_at": "2018-12-11T12:59:26Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 39, + "watchers_count": 39, "forks_count": 18, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 18, - "watchers": 40, + "watchers": 39, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 633bbcd35c..0059306a39 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-06-05T03:33:27Z", + "updated_at": "2022-06-07T05:04:26Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1381, - "watchers_count": 1381, + "stargazers_count": 1382, + "watchers_count": 1382, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1381, + "watchers": 1382, "score": 0 }, { diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json index b35aa20f26..9d2ad14ed2 100644 --- a/2018/CVE-2018-8174.json +++ b/2018/CVE-2018-8174.json @@ -40,17 +40,17 @@ "description": "CVE-2018-8174_python", "fork": false, "created_at": "2018-05-30T03:12:32Z", - "updated_at": "2022-04-27T10:00:37Z", + "updated_at": "2022-06-07T05:42:45Z", "pushed_at": "2022-04-19T13:24:53Z", - "stargazers_count": 135, - "watchers_count": 135, + "stargazers_count": 136, + "watchers_count": 136, "forks_count": 68, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 68, - "watchers": 135, + "watchers": 136, "score": 0 }, { diff --git a/2018/CVE-2018-8581.json b/2018/CVE-2018-8581.json index e18a78d4e4..4ca1b0406f 100644 --- a/2018/CVE-2018-8581.json +++ b/2018/CVE-2018-8581.json @@ -13,17 +13,17 @@ "description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability", "fork": false, "created_at": "2018-12-27T06:30:32Z", - "updated_at": "2022-04-24T18:00:24Z", + "updated_at": "2022-06-07T03:36:39Z", "pushed_at": "2018-12-30T11:53:08Z", - "stargazers_count": 328, - "watchers_count": 328, + "stargazers_count": 327, + "watchers_count": 327, "forks_count": 115, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 115, - "watchers": 328, + "watchers": 327, "score": 0 }, { diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index cc4dd740bd..b481ad4e40 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -13,17 +13,17 @@ "description": "Apache Tomcat Remote Code Execution on Windows", "fork": false, "created_at": "2019-04-15T07:54:25Z", - "updated_at": "2022-05-03T15:53:53Z", + "updated_at": "2022-06-07T03:28:08Z", "pushed_at": "2019-11-27T07:39:40Z", - "stargazers_count": 185, - "watchers_count": 185, + "stargazers_count": 184, + "watchers_count": 184, "forks_count": 54, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 54, - "watchers": 185, + "watchers": 184, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 7fd0a80221..fbdb890134 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1705,17 +1705,17 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2022-05-14T09:35:38Z", + "updated_at": "2022-06-07T03:25:45Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1114, - "watchers_count": 1114, + "stargazers_count": 1113, + "watchers_count": 1113, "forks_count": 356, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 356, - "watchers": 1114, + "watchers": 1113, "score": 0 }, { diff --git a/2019/CVE-2019-11580.json b/2019/CVE-2019-11580.json index f94d0bf09b..d699851be8 100644 --- a/2019/CVE-2019-11580.json +++ b/2019/CVE-2019-11580.json @@ -13,17 +13,17 @@ "description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE", "fork": false, "created_at": "2019-07-17T07:54:38Z", - "updated_at": "2022-04-27T09:09:45Z", + "updated_at": "2022-06-07T02:41:55Z", "pushed_at": "2019-07-18T10:03:28Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 97, + "watchers_count": 97, "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 22, - "watchers": 98, + "watchers": 97, "score": 0 }, { diff --git a/2019/CVE-2019-12409.json b/2019/CVE-2019-12409.json index d8afcdc5fb..f60cb57775 100644 --- a/2019/CVE-2019-12409.json +++ b/2019/CVE-2019-12409.json @@ -13,17 +13,17 @@ "description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")", "fork": false, "created_at": "2019-11-19T08:53:56Z", - "updated_at": "2022-03-21T08:19:58Z", + "updated_at": "2022-06-07T03:17:32Z", "pushed_at": "2019-11-19T09:18:00Z", - "stargazers_count": 102, - "watchers_count": 102, + "stargazers_count": 101, + "watchers_count": 101, "forks_count": 36, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 36, - "watchers": 102, + "watchers": 101, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-15514.json b/2019/CVE-2019-15514.json index a7ea43362f..6d5b5bf6ce 100644 --- a/2019/CVE-2019-15514.json +++ b/2019/CVE-2019-15514.json @@ -13,10 +13,10 @@ "description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ", "fork": false, "created_at": "2021-12-10T19:03:53Z", - "updated_at": "2022-05-30T18:32:29Z", + "updated_at": "2022-06-07T00:59:54Z", "pushed_at": "2021-12-19T18:18:36Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 56, + "watchers": 57, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 773e305623..0f7b06e47b 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,11 +40,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-06-06T22:00:32Z", + "updated_at": "2022-06-07T05:07:08Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3346, - "watchers_count": 3346, - "forks_count": 998, + "stargazers_count": 3348, + "watchers_count": 3348, + "forks_count": 999, "allow_forking": true, "is_template": false, "topics": [ @@ -69,8 +69,8 @@ "webshell" ], "visibility": "public", - "forks": 998, - "watchers": 3346, + "forks": 999, + "watchers": 3348, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 2e4559854c..c4909b1dbb 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -67,17 +67,17 @@ "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "fork": false, "created_at": "2020-01-11T00:08:27Z", - "updated_at": "2022-05-21T13:58:12Z", + "updated_at": "2022-06-07T00:43:04Z", "pushed_at": "2020-01-22T20:23:51Z", - "stargazers_count": 551, - "watchers_count": 551, + "stargazers_count": 550, + "watchers_count": 550, "forks_count": 130, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 130, - "watchers": 551, + "watchers": 550, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 5073fbc64f..5bba4faa61 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -13,17 +13,17 @@ "description": "Weblogic Unrestricted File Upload", "fork": false, "created_at": "2019-04-17T11:12:32Z", - "updated_at": "2022-01-09T21:15:08Z", + "updated_at": "2022-06-07T03:16:21Z", "pushed_at": "2019-04-17T11:13:29Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 13, - "watchers": 54, + "watchers": 53, "score": 0 }, { @@ -40,17 +40,17 @@ "description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618", "fork": false, "created_at": "2019-04-17T12:23:24Z", - "updated_at": "2022-06-02T04:40:07Z", + "updated_at": "2022-06-07T03:28:00Z", "pushed_at": "2019-04-17T15:05:09Z", - "stargazers_count": 163, - "watchers_count": 163, + "stargazers_count": 162, + "watchers_count": 162, "forks_count": 50, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 50, - "watchers": 163, + "watchers": 162, "score": 0 }, { @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-06-05T03:33:27Z", + "updated_at": "2022-06-07T05:04:26Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1381, - "watchers_count": 1381, + "stargazers_count": 1382, + "watchers_count": 1382, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1381, + "watchers": 1382, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 9ad5a1d9c1..b56dd7874f 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -229,17 +229,17 @@ "description": "CVE-2019-2725命令回显+webshell上传+最新绕过", "fork": false, "created_at": "2019-06-10T05:12:44Z", - "updated_at": "2022-06-05T06:16:50Z", + "updated_at": "2022-06-07T03:47:24Z", "pushed_at": "2019-06-21T03:33:05Z", - "stargazers_count": 167, - "watchers_count": 167, + "stargazers_count": 166, + "watchers_count": 166, "forks_count": 66, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 66, - "watchers": 167, + "watchers": 166, "score": 0 }, { diff --git a/2019/CVE-2019-6447.json b/2019/CVE-2019-6447.json index 25ab6cd21a..5b80c9e942 100644 --- a/2019/CVE-2019-6447.json +++ b/2019/CVE-2019-6447.json @@ -13,10 +13,10 @@ "description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447", "fork": false, "created_at": "2019-01-09T22:30:42Z", - "updated_at": "2022-05-05T12:35:08Z", + "updated_at": "2022-06-07T03:39:09Z", "pushed_at": "2021-09-01T08:56:40Z", - "stargazers_count": 649, - "watchers_count": 649, + "stargazers_count": 648, + "watchers_count": 648, "forks_count": 139, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 139, - "watchers": 649, + "watchers": 648, "score": 0 }, { diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index 4a310045ba..c66b894964 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -70,17 +70,17 @@ "description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.", "fork": false, "created_at": "2020-01-24T03:52:49Z", - "updated_at": "2021-08-06T07:34:23Z", + "updated_at": "2022-06-07T06:00:58Z", "pushed_at": "2020-01-26T21:04:27Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "forks_count": 32, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 32, - "watchers": 72, + "watchers": 73, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 4578cd6c08..2e98f04abd 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -121,10 +121,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2022-06-06T06:02:41Z", + "updated_at": "2022-06-07T02:45:18Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 618, - "watchers_count": 618, + "stargazers_count": 617, + "watchers_count": 617, "forks_count": 200, "allow_forking": true, "is_template": false, @@ -133,7 +133,7 @@ ], "visibility": "public", "forks": 200, - "watchers": 618, + "watchers": 617, "score": 0 }, { @@ -404,10 +404,10 @@ "description": "PoC for triggering buffer overflow via CVE-2020-0796", "fork": false, "created_at": "2020-03-12T18:34:40Z", - "updated_at": "2022-05-31T16:28:40Z", + "updated_at": "2022-06-07T02:41:51Z", "pushed_at": "2020-03-14T10:04:59Z", - "stargazers_count": 287, - "watchers_count": 287, + "stargazers_count": 286, + "watchers_count": 286, "forks_count": 113, "allow_forking": true, "is_template": false, @@ -419,7 +419,7 @@ ], "visibility": "public", "forks": 113, - "watchers": 287, + "watchers": 286, "score": 0 }, { diff --git a/2020/CVE-2020-12800.json b/2020/CVE-2020-12800.json index 2dc24b4578..c4ef9d9456 100644 --- a/2020/CVE-2020-12800.json +++ b/2020/CVE-2020-12800.json @@ -13,7 +13,7 @@ "description": "POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload ", "fork": false, "created_at": "2020-05-15T01:50:36Z", - "updated_at": "2022-06-02T04:32:24Z", + "updated_at": "2022-06-07T01:12:56Z", "pushed_at": "2020-06-16T19:47:29Z", "stargazers_count": 21, "watchers_count": 21, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index ad97a4c0c6..a7d3d04659 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,11 +13,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-06-06T22:00:32Z", + "updated_at": "2022-06-07T05:07:08Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3346, - "watchers_count": 3346, - "forks_count": 998, + "stargazers_count": 3348, + "watchers_count": 3348, + "forks_count": 999, "allow_forking": true, "is_template": false, "topics": [ @@ -42,8 +42,8 @@ "webshell" ], "visibility": "public", - "forks": 998, - "watchers": 3346, + "forks": 999, + "watchers": 3348, "score": 0 }, { diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 97b30bf855..ae6d0ec526 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -67,17 +67,17 @@ "description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc", "fork": false, "created_at": "2020-02-20T17:57:54Z", - "updated_at": "2022-06-02T04:33:43Z", + "updated_at": "2022-06-07T02:47:08Z", "pushed_at": "2020-02-23T17:06:06Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 97, + "watchers_count": 97, "forks_count": 68, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 68, - "watchers": 98, + "watchers": 97, "score": 0 }, { @@ -94,17 +94,17 @@ "description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool", "fork": false, "created_at": "2020-02-20T21:00:15Z", - "updated_at": "2022-05-28T18:20:15Z", + "updated_at": "2022-06-07T02:47:10Z", "pushed_at": "2021-11-26T07:40:35Z", - "stargazers_count": 263, - "watchers_count": 263, + "stargazers_count": 262, + "watchers_count": 262, "forks_count": 100, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 100, - "watchers": 263, + "watchers": 262, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 5a187db46b..d3aca20929 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-06-05T03:33:27Z", + "updated_at": "2022-06-07T05:04:26Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1381, - "watchers_count": 1381, + "stargazers_count": 1382, + "watchers_count": 1382, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 296, - "watchers": 1381, + "watchers": 1382, "score": 0 }, { @@ -115,17 +115,17 @@ "description": "Weblogic IIOP CVE-2020-2551", "fork": false, "created_at": "2020-02-28T08:46:21Z", - "updated_at": "2022-05-24T16:33:56Z", + "updated_at": "2022-06-07T02:46:05Z", "pushed_at": "2020-04-07T03:32:24Z", - "stargazers_count": 295, - "watchers_count": 295, + "stargazers_count": 294, + "watchers_count": 294, "forks_count": 74, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 74, - "watchers": 295, + "watchers": 294, "score": 0 }, { diff --git a/2020/CVE-2020-8840.json b/2020/CVE-2020-8840.json index 1e0b029bb6..d3cc7badec 100644 --- a/2020/CVE-2020-8840.json +++ b/2020/CVE-2020-8840.json @@ -13,17 +13,17 @@ "description": "FasterXML\/jackson-databind 远程代码执行漏洞", "fork": false, "created_at": "2020-02-21T15:58:25Z", - "updated_at": "2021-12-15T14:38:24Z", + "updated_at": "2022-06-07T02:46:47Z", "pushed_at": "2020-02-21T16:03:28Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 74, + "watchers_count": 74, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, - "watchers": 75, + "watchers": 74, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 16def51a00..e02ef5aeb7 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -17,12 +17,12 @@ "pushed_at": "2021-11-02T14:45:24Z", "stargazers_count": 179, "watchers_count": 179, - "forks_count": 43, + "forks_count": 44, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 43, + "forks": 44, "watchers": 179, "score": 0 }, diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 18afd5870c..608d1126e1 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -1118,5 +1118,32 @@ "forks": 1, "watchers": 9, "score": 0 + }, + { + "id": 500657432, + "name": "Flangvik", + "full_name": "1342486672\/Flangvik", + "owner": { + "login": "1342486672", + "id": 107014850, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107014850?v=4", + "html_url": "https:\/\/github.com\/1342486672" + }, + "html_url": "https:\/\/github.com\/1342486672\/Flangvik", + "description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode in…", + "fork": false, + "created_at": "2022-06-07T02:09:10Z", + "updated_at": "2022-06-07T02:09:10Z", + "pushed_at": "2022-06-07T02:09:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json index 57a241e922..811f8c5f11 100644 --- a/2021/CVE-2021-26943.json +++ b/2021/CVE-2021-26943.json @@ -13,10 +13,10 @@ "description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.", "fork": false, "created_at": "2020-12-31T16:30:02Z", - "updated_at": "2022-06-06T09:08:22Z", + "updated_at": "2022-06-07T02:13:50Z", "pushed_at": "2021-03-29T12:33:38Z", - "stargazers_count": 86, - "watchers_count": 86, + "stargazers_count": 87, + "watchers_count": 87, "forks_count": 18, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 18, - "watchers": 86, + "watchers": 87, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 5f5df1c319..1b910f429c 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -425,17 +425,17 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2022-05-30T08:17:45Z", + "updated_at": "2022-06-07T05:30:09Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 827, - "watchers_count": 827, + "stargazers_count": 828, + "watchers_count": 828, "forks_count": 235, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 235, - "watchers": 827, + "watchers": 828, "score": 0 }, { diff --git a/2021/CVE-2021-31805.json b/2021/CVE-2021-31805.json index 6e0c21f60b..88103ebcdb 100644 --- a/2021/CVE-2021-31805.json +++ b/2021/CVE-2021-31805.json @@ -13,17 +13,17 @@ "description": "远程代码执行S2-062 CVE-2021-31805验证POC", "fork": false, "created_at": "2022-04-15T01:50:14Z", - "updated_at": "2022-06-01T06:52:11Z", + "updated_at": "2022-06-07T05:46:26Z", "pushed_at": "2022-04-17T08:19:59Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 114, + "watchers_count": 114, "forks_count": 54, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 54, - "watchers": 113, + "watchers": 114, "score": 0 }, { @@ -40,17 +40,17 @@ "description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE", "fork": false, "created_at": "2022-04-15T04:23:44Z", - "updated_at": "2022-05-23T08:39:25Z", + "updated_at": "2022-06-07T06:10:29Z", "pushed_at": "2022-04-15T08:52:11Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, - "watchers": 28, + "watchers": 29, "score": 0 }, { diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index be4d71d8ea..6b908fc647 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -416,12 +416,12 @@ "pushed_at": "2022-05-02T07:49:01Z", "stargazers_count": 91, "watchers_count": 91, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 91, "score": 0 }, @@ -443,12 +443,12 @@ "pushed_at": "2022-05-02T07:49:12Z", "stargazers_count": 18, "watchers_count": 18, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 18, "score": 0 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index fc98fbd6ba..148d2b69ed 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -73,17 +73,17 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-06-06T20:25:46Z", + "updated_at": "2022-06-07T02:18:08Z", "pushed_at": "2022-01-30T14:22:23Z", - "stargazers_count": 1554, - "watchers_count": 1554, + "stargazers_count": 1555, + "watchers_count": 1555, "forks_count": 453, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 453, - "watchers": 1554, + "watchers": 1555, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 6612e848bc..df831c6a0d 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -40,11 +40,11 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2022-06-05T22:35:53Z", + "updated_at": "2022-06-07T05:55:58Z", "pushed_at": "2022-06-01T21:10:46Z", - "stargazers_count": 664, - "watchers_count": 664, - "forks_count": 148, + "stargazers_count": 665, + "watchers_count": 665, + "forks_count": 149, "allow_forking": true, "is_template": false, "topics": [ @@ -56,8 +56,8 @@ "remote-code-execution" ], "visibility": "public", - "forks": 148, - "watchers": 664, + "forks": 149, + "watchers": 665, "score": 0 }, { diff --git a/2021/CVE-2021-43224.json b/2021/CVE-2021-43224.json index 99deaf8264..d521a0da5c 100644 --- a/2021/CVE-2021-43224.json +++ b/2021/CVE-2021-43224.json @@ -13,17 +13,17 @@ "description": "Windows Common Log File System Driver POC", "fork": false, "created_at": "2021-12-21T01:51:41Z", - "updated_at": "2022-05-23T07:09:37Z", + "updated_at": "2022-06-07T04:38:39Z", "pushed_at": "2021-12-21T06:57:06Z", - "stargazers_count": 80, - "watchers_count": 80, - "forks_count": 26, + "stargazers_count": 82, + "watchers_count": 82, + "forks_count": 27, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 26, - "watchers": 80, + "forks": 27, + "watchers": 82, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 4a22da807b..d8df64baa1 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -94,17 +94,17 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2022-06-04T06:32:06Z", + "updated_at": "2022-06-07T01:07:03Z", "pushed_at": "2022-01-18T12:01:52Z", - "stargazers_count": 368, - "watchers_count": 368, - "forks_count": 118, + "stargazers_count": 369, + "watchers_count": 369, + "forks_count": 117, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 118, - "watchers": 368, + "forks": 117, + "watchers": 369, "score": 0 }, { @@ -1220,33 +1220,6 @@ "watchers": 5, "score": 0 }, - { - "id": 437407625, - "name": "log4j-docker-vaccine", - "full_name": "jeffbryner\/log4j-docker-vaccine", - "owner": { - "login": "jeffbryner", - "id": 566889, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/566889?v=4", - "html_url": "https:\/\/github.com\/jeffbryner" - }, - "html_url": "https:\/\/github.com\/jeffbryner\/log4j-docker-vaccine", - "description": "docker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228", - "fork": false, - "created_at": "2021-12-11T23:06:23Z", - "updated_at": "2022-05-22T02:50:49Z", - "pushed_at": "2021-12-12T00:15:23Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 437419010, "name": "log4j-detector", @@ -4441,10 +4414,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2022-06-03T15:51:19Z", + "updated_at": "2022-06-07T04:29:47Z", "pushed_at": "2022-04-24T08:56:47Z", - "stargazers_count": 318, - "watchers_count": 318, + "stargazers_count": 319, + "watchers_count": 319, "forks_count": 45, "allow_forking": true, "is_template": false, @@ -4457,7 +4430,7 @@ ], "visibility": "public", "forks": 45, - "watchers": 318, + "watchers": 319, "score": 0 }, { diff --git a/2022/CVE-2022-0540.json b/2022/CVE-2022-0540.json index 89098ae992..db1a8b594a 100644 --- a/2022/CVE-2022-0540.json +++ b/2022/CVE-2022-0540.json @@ -13,17 +13,17 @@ "description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)", "fork": false, "created_at": "2022-05-25T10:47:04Z", - "updated_at": "2022-06-03T10:56:12Z", + "updated_at": "2022-06-07T02:36:13Z", "pushed_at": "2022-05-25T13:43:16Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 25, + "watchers": 26, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index cdf2899731..374f2e75ad 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -98,12 +98,12 @@ "pushed_at": "2022-03-09T08:40:29Z", "stargazers_count": 186, "watchers_count": 186, - "forks_count": 64, + "forks_count": 65, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 64, + "forks": 65, "watchers": 186, "score": 0 }, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index fd08935dfc..0b5248f0ae 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -148,17 +148,17 @@ "description": "PoC for CVE-2022-1388_F5_BIG-IP", "fork": false, "created_at": "2022-05-09T07:39:55Z", - "updated_at": "2022-06-01T01:56:23Z", + "updated_at": "2022-06-07T00:54:41Z", "pushed_at": "2022-05-15T02:30:40Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, - "watchers": 56, + "watchers": 57, "score": 0 }, { @@ -1100,7 +1100,7 @@ "fork": false, "created_at": "2022-05-12T16:54:52Z", "updated_at": "2022-06-02T04:15:40Z", - "pushed_at": "2022-06-01T17:22:28Z", + "pushed_at": "2022-06-07T02:52:17Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 4, diff --git a/2022/CVE-2022-22536.json b/2022/CVE-2022-22536.json index 1d656e0332..8aa03ecab7 100644 --- a/2022/CVE-2022-22536.json +++ b/2022/CVE-2022-22536.json @@ -13,17 +13,17 @@ "description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.", "fork": false, "created_at": "2022-02-15T09:22:19Z", - "updated_at": "2022-05-26T00:15:25Z", + "updated_at": "2022-06-07T01:00:15Z", "pushed_at": "2022-02-21T08:58:22Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 12, - "watchers": 44, + "watchers": 45, "score": 0 }, { diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 8587ba98d3..f63b4013e7 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -123,12 +123,12 @@ "pushed_at": "2022-04-05T16:02:33Z", "stargazers_count": 242, "watchers_count": 242, - "forks_count": 200, + "forks_count": 201, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 200, + "forks": 201, "watchers": 242, "score": 0 }, @@ -1529,10 +1529,10 @@ "description": "spring4shell | CVE-2022-22965", "fork": false, "created_at": "2022-04-12T14:59:42Z", - "updated_at": "2022-05-24T19:11:40Z", + "updated_at": "2022-06-07T03:16:36Z", "pushed_at": "2022-04-13T14:44:51Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -1546,7 +1546,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index cd340554ff..50225923a2 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-06-06T16:10:07Z", + "updated_at": "2022-06-07T05:24:34Z", "pushed_at": "2022-06-06T18:52:38Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 26, + "watchers": 29, "score": 0 }, { @@ -50,12 +50,12 @@ "pushed_at": "2022-06-03T10:12:19Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 5, "score": 0 }, @@ -159,10 +159,10 @@ "description": "CVE-2022-26134 Proof of Concept", "fork": false, "created_at": "2022-06-03T13:59:19Z", - "updated_at": "2022-06-06T19:02:15Z", + "updated_at": "2022-06-07T04:12:08Z", "pushed_at": "2022-06-06T16:38:49Z", - "stargazers_count": 88, - "watchers_count": 88, + "stargazers_count": 91, + "watchers_count": 91, "forks_count": 30, "allow_forking": true, "is_template": false, @@ -173,7 +173,7 @@ ], "visibility": "public", "forks": 30, - "watchers": 88, + "watchers": 91, "score": 0 }, { @@ -217,11 +217,11 @@ "description": "[PoC] Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE)", "fork": false, "created_at": "2022-06-03T21:07:30Z", - "updated_at": "2022-06-06T18:06:21Z", + "updated_at": "2022-06-07T02:12:35Z", "pushed_at": "2022-06-06T20:24:06Z", - "stargazers_count": 113, - "watchers_count": 113, - "forks_count": 37, + "stargazers_count": 118, + "watchers_count": 118, + "forks_count": 38, "allow_forking": true, "is_template": false, "topics": [ @@ -238,8 +238,8 @@ "vulnerability" ], "visibility": "public", - "forks": 37, - "watchers": 113, + "forks": 38, + "watchers": 118, "score": 0 }, { @@ -601,10 +601,10 @@ "description": null, "fork": false, "created_at": "2022-06-06T16:45:35Z", - "updated_at": "2022-06-06T17:16:24Z", + "updated_at": "2022-06-07T06:14:38Z", "pushed_at": "2022-06-06T20:20:57Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -613,6 +613,33 @@ ], "visibility": "public", "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 500659259, + "name": "CVE-2022-26134-Confluence", + "full_name": "vesperp\/CVE-2022-26134-Confluence", + "owner": { + "login": "vesperp", + "id": 28191544, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28191544?v=4", + "html_url": "https:\/\/github.com\/vesperp" + }, + "html_url": "https:\/\/github.com\/vesperp\/CVE-2022-26134-Confluence", + "description": null, + "fork": false, + "created_at": "2022-06-07T02:16:56Z", + "updated_at": "2022-06-07T02:20:41Z", + "pushed_at": "2022-06-07T02:22:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, "watchers": 0, "score": 0 } diff --git a/2022/CVE-2022-29072.json b/2022/CVE-2022-29072.json index a5111142dc..6e58932f14 100644 --- a/2022/CVE-2022-29072.json +++ b/2022/CVE-2022-29072.json @@ -13,17 +13,17 @@ "description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.", "fork": false, "created_at": "2022-04-15T22:59:03Z", - "updated_at": "2022-06-06T04:40:01Z", + "updated_at": "2022-06-07T01:00:52Z", "pushed_at": "2022-04-22T11:26:31Z", - "stargazers_count": 667, - "watchers_count": 667, + "stargazers_count": 668, + "watchers_count": 668, "forks_count": 108, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 108, - "watchers": 667, + "watchers": 668, "score": 0 }, { diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 3028c925dc..55765abfd7 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-05-30T18:17:38Z", - "updated_at": "2022-06-06T23:47:32Z", + "updated_at": "2022-06-07T05:23:23Z", "pushed_at": "2022-06-05T21:06:13Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 97, + "watchers_count": 97, "forks_count": 38, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 38, - "watchers": 94, + "watchers": 97, "score": 0 }, { @@ -52,12 +52,12 @@ "pushed_at": "2022-05-31T09:35:37Z", "stargazers_count": 76, "watchers_count": 76, - "forks_count": 22, + "forks_count": 23, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 22, + "forks": 23, "watchers": 76, "score": 0 }, @@ -129,17 +129,17 @@ "description": "This Repository Talks about the Follina MSDT from Defender Perspective", "fork": false, "created_at": "2022-05-31T14:10:11Z", - "updated_at": "2022-06-06T23:06:32Z", + "updated_at": "2022-06-07T01:24:09Z", "pushed_at": "2022-06-02T09:12:54Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, - "watchers": 28, + "watchers": 29, "score": 0 }, { @@ -780,17 +780,17 @@ "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。", "fork": false, "created_at": "2022-06-02T12:33:18Z", - "updated_at": "2022-06-06T10:13:41Z", + "updated_at": "2022-06-07T04:32:59Z", "pushed_at": "2022-06-06T07:19:53Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 19, + "watchers": 22, "score": 0 }, { diff --git a/README.md b/README.md index a84378e247..a5960b3d36 100644 --- a/README.md +++ b/README.md @@ -1475,6 +1475,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - [h3v0x/CVE-2022-26134](https://github.com/h3v0x/CVE-2022-26134) - [archanchoudhury/Confluence-CVE-2022-26134](https://github.com/archanchoudhury/Confluence-CVE-2022-26134) - [PsykoDev/CVE-2022-26134](https://github.com/PsykoDev/CVE-2022-26134) +- [vesperp/CVE-2022-26134-Confluence](https://github.com/vesperp/CVE-2022-26134-Confluence) ### CVE-2022-26155 (2022-02-28) @@ -1636,7 +1637,7 @@ The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal - [nonamecoder/CVE-2022-27254](https://github.com/nonamecoder/CVE-2022-27254) -### CVE-2022-27438 (-) +### CVE-2022-27438 (2022-06-06) Caphyon Ltd Advanced Installer 19.2 was discovered to contain a remote code execution (RCE) vulnerability via the Update Check function. @@ -4079,6 +4080,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni - [hosch3n/ProxyVulns](https://github.com/hosch3n/ProxyVulns) - [Nick-Yin12/106362522](https://github.com/Nick-Yin12/106362522) - [thau0x01/poc_proxylogon](https://github.com/thau0x01/poc_proxylogon) +- [1342486672/Flangvik](https://github.com/1342486672/Flangvik) ### CVE-2021-26856 - [avi8892/CVE-2021-26856](https://github.com/avi8892/CVE-2021-26856) @@ -5829,7 +5831,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect) - [chilliwebs/CVE-2021-44228_Example](https://github.com/chilliwebs/CVE-2021-44228_Example) - [irgoncalves/f5-waf-enforce-sig-CVE-2021-44228](https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228) -- [jeffbryner/log4j-docker-vaccine](https://github.com/jeffbryner/log4j-docker-vaccine) - [mergebase/log4j-detector](https://github.com/mergebase/log4j-detector) - [unlimitedsola/log4j2-rce-poc](https://github.com/unlimitedsola/log4j2-rce-poc) - [corretto/hotpatch-for-apache-log4j2](https://github.com/corretto/hotpatch-for-apache-log4j2)