diff --git a/2016/CVE-2016-9066.json b/2016/CVE-2016-9066.json
new file mode 100644
index 0000000000..5c76ed2aff
--- /dev/null
+++ b/2016/CVE-2016-9066.json
@@ -0,0 +1,33 @@
+[
+ {
+ "id": 84596765,
+ "name": "foxpwn",
+ "full_name": "saelo\/foxpwn",
+ "owner": {
+ "login": "saelo",
+ "id": 2453290,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2453290?v=4",
+ "html_url": "https:\/\/github.com\/saelo"
+ },
+ "html_url": "https:\/\/github.com\/saelo\/foxpwn",
+ "description": "Exploit code for CVE-2016-9066",
+ "fork": false,
+ "created_at": "2017-03-10T20:08:13Z",
+ "updated_at": "2022-03-27T23:28:39Z",
+ "pushed_at": "2017-03-19T17:37:18Z",
+ "stargazers_count": 41,
+ "watchers_count": 41,
+ "forks_count": 11,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "exploitation",
+ "firefox"
+ ],
+ "visibility": "public",
+ "forks": 11,
+ "watchers": 41,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2017/CVE-2017-5754.json b/2017/CVE-2017-5754.json
index 7ceba88cf7..c5e0fc18d5 100644
--- a/2017/CVE-2017-5754.json
+++ b/2017/CVE-2017-5754.json
@@ -51,10 +51,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
- "updated_at": "2022-06-15T19:54:38Z",
+ "updated_at": "2022-07-06T13:31:50Z",
"pushed_at": "2018-02-27T05:22:38Z",
- "stargazers_count": 544,
- "watchers_count": 544,
+ "stargazers_count": 543,
+ "watchers_count": 543,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
@@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 71,
- "watchers": 544,
+ "watchers": 543,
"score": 0
},
{
diff --git a/2017/CVE-2017-9841.json b/2017/CVE-2017-9841.json
index 7a864ec119..147658ded2 100644
--- a/2017/CVE-2017-9841.json
+++ b/2017/CVE-2017-9841.json
@@ -118,18 +118,18 @@
{
"id": 382895850,
"name": "laravel-phpunit-rce-masscaner",
- "full_name": "rdpwn\/laravel-phpunit-rce-masscaner",
+ "full_name": "incogbyte\/laravel-phpunit-rce-masscaner",
"owner": {
- "login": "rdpwn",
- "id": 108700864,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108700864?v=4",
- "html_url": "https:\/\/github.com\/rdpwn"
+ "login": "incogbyte",
+ "id": 53656948,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53656948?v=4",
+ "html_url": "https:\/\/github.com\/incogbyte"
},
- "html_url": "https:\/\/github.com\/rdpwn\/laravel-phpunit-rce-masscaner",
+ "html_url": "https:\/\/github.com\/incogbyte\/laravel-phpunit-rce-masscaner",
"description": "Masscanner for Laravel phpunit RCE CVE-2017-9841",
"fork": false,
"created_at": "2021-07-04T16:15:27Z",
- "updated_at": "2022-07-05T13:02:09Z",
+ "updated_at": "2022-07-06T17:30:01Z",
"pushed_at": "2021-08-10T18:10:34Z",
"stargazers_count": 16,
"watchers_count": 16,
diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json
index a7874b5dba..c6950057cd 100644
--- a/2018/CVE-2018-15133.json
+++ b/2018/CVE-2018-15133.json
@@ -111,34 +111,6 @@
"watchers": 1,
"score": 0
},
- {
- "id": 311275268,
- "name": "better-poc-for-CVE-2018-15133",
- "full_name": "AlienX2001\/better-poc-for-CVE-2018-15133",
- "owner": {
- "login": "AlienX2001",
- "id": 64488123,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488123?v=4",
- "html_url": "https:\/\/github.com\/AlienX2001"
- },
- "html_url": "https:\/\/github.com\/AlienX2001\/better-poc-for-CVE-2018-15133",
- "description": "An automated PoC for CVE 2018-15133",
- "fork": false,
- "created_at": "2020-11-09T08:44:27Z",
- "updated_at": "2020-12-05T11:02:01Z",
- "pushed_at": "2020-12-05T11:01:59Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 312628962,
"name": "exploit_laravel_cve-2018-15133",
diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json
index 855842d7d7..e0980a57e1 100644
--- a/2018/CVE-2018-15473.json
+++ b/2018/CVE-2018-15473.json
@@ -555,34 +555,6 @@
"watchers": 13,
"score": 0
},
- {
- "id": 319993422,
- "name": "CVE-2018-15473_OpenSSH_7.7",
- "full_name": "WildfootW\/CVE-2018-15473_OpenSSH_7.7",
- "owner": {
- "login": "WildfootW",
- "id": 11520473,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4",
- "html_url": "https:\/\/github.com\/WildfootW"
- },
- "html_url": "https:\/\/github.com\/WildfootW\/CVE-2018-15473_OpenSSH_7.7",
- "description": null,
- "fork": false,
- "created_at": "2020-12-09T15:09:31Z",
- "updated_at": "2020-12-09T15:10:05Z",
- "pushed_at": "2020-12-09T15:10:02Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 406548761,
"name": "CVE-2018-15473",
diff --git a/2018/CVE-2018-20250.json b/2018/CVE-2018-20250.json
index a23e44c51d..a1104dd81f 100644
--- a/2018/CVE-2018-20250.json
+++ b/2018/CVE-2018-20250.json
@@ -13,10 +13,10 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
- "updated_at": "2022-06-14T13:06:20Z",
+ "updated_at": "2022-07-06T16:06:45Z",
"pushed_at": "2019-08-05T10:45:34Z",
- "stargazers_count": 480,
- "watchers_count": 480,
+ "stargazers_count": 481,
+ "watchers_count": 481,
"forks_count": 188,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 188,
- "watchers": 480,
+ "watchers": 481,
"score": 0
},
{
diff --git a/2018/CVE-2018-20433.json b/2018/CVE-2018-20433.json
deleted file mode 100644
index 5ae8e8848c..0000000000
--- a/2018/CVE-2018-20433.json
+++ /dev/null
@@ -1,30 +0,0 @@
-[
- {
- "id": 321055902,
- "name": "cp30_XXE_partial_fix",
- "full_name": "shanika04\/cp30_XXE_partial_fix",
- "owner": {
- "login": "shanika04",
- "id": 73774345,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73774345?v=4",
- "html_url": "https:\/\/github.com\/shanika04"
- },
- "html_url": "https:\/\/github.com\/shanika04\/cp30_XXE_partial_fix",
- "description": "version between CVE-2018-20433 and CVE-2019-5427",
- "fork": false,
- "created_at": "2020-12-13T12:08:30Z",
- "updated_at": "2020-12-13T12:10:34Z",
- "pushed_at": "2020-12-13T12:10:30Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2018/CVE-2018-2894.json b/2018/CVE-2018-2894.json
index 34e1f63194..c3becec749 100644
--- a/2018/CVE-2018-2894.json
+++ b/2018/CVE-2018-2894.json
@@ -82,33 +82,5 @@
"forks": 6,
"watchers": 14,
"score": 0
- },
- {
- "id": 222744850,
- "name": "PyLadon",
- "full_name": "k8gege\/PyLadon",
- "owner": {
- "login": "k8gege",
- "id": 42312878,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
- "html_url": "https:\/\/github.com\/k8gege"
- },
- "html_url": "https:\/\/github.com\/k8gege\/PyLadon",
- "description": "Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability \/ exploit \/ detection \/ MS17010\/SmbGhost\/CVE-2020-0796\/CVE-2018-2894",
- "fork": false,
- "created_at": "2019-11-19T16:51:39Z",
- "updated_at": "2022-06-23T02:00:48Z",
- "pushed_at": "2020-12-08T15:39:24Z",
- "stargazers_count": 43,
- "watchers_count": 43,
- "forks_count": 18,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 18,
- "watchers": 43,
- "score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json
index 3ed281d2d6..ccc269c27a 100644
--- a/2018/CVE-2018-7600.json
+++ b/2018/CVE-2018-7600.json
@@ -76,10 +76,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
- "updated_at": "2022-06-30T13:41:27Z",
+ "updated_at": "2022-07-06T17:11:44Z",
"pushed_at": "2021-01-08T10:31:22Z",
- "stargazers_count": 526,
- "watchers_count": 526,
+ "stargazers_count": 525,
+ "watchers_count": 525,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@@ -97,7 +97,7 @@
],
"visibility": "public",
"forks": 172,
- "watchers": 526,
+ "watchers": 525,
"score": 0
},
{
diff --git a/2018/CVE-2018-9276.json b/2018/CVE-2018-9276.json
index 349a25f221..013a82bbca 100644
--- a/2018/CVE-2018-9276.json
+++ b/2018/CVE-2018-9276.json
@@ -1,32 +1,4 @@
[
- {
- "id": 178663906,
- "name": "CVE-2018-9276",
- "full_name": "wildkindcc\/CVE-2018-9276",
- "owner": {
- "login": "wildkindcc",
- "id": 25321621,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25321621?v=4",
- "html_url": "https:\/\/github.com\/wildkindcc"
- },
- "html_url": "https:\/\/github.com\/wildkindcc\/CVE-2018-9276",
- "description": "CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)",
- "fork": false,
- "created_at": "2019-03-31T08:51:07Z",
- "updated_at": "2022-07-03T16:22:23Z",
- "pushed_at": "2020-12-03T11:22:15Z",
- "stargazers_count": 32,
- "watchers_count": 32,
- "forks_count": 9,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 9,
- "watchers": 32,
- "score": 0
- },
{
"id": 326146315,
"name": "CVE-2018-9276",
diff --git a/2019/CVE-2019-0193.json b/2019/CVE-2019-0193.json
index bf1b16b60b..90a66db3fd 100644
--- a/2019/CVE-2019-0193.json
+++ b/2019/CVE-2019-0193.json
@@ -41,10 +41,10 @@
"description": "Apache Solr DataImport Handler RCE",
"fork": false,
"created_at": "2019-08-09T06:27:39Z",
- "updated_at": "2022-06-18T09:19:04Z",
+ "updated_at": "2022-07-06T14:31:53Z",
"pushed_at": "2019-08-12T02:23:38Z",
- "stargazers_count": 84,
- "watchers_count": 84,
+ "stargazers_count": 85,
+ "watchers_count": 85,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
- "watchers": 84,
+ "watchers": 85,
"score": 0
},
{
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 80e7d487c8..de31135f06 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2022-07-06T11:30:32Z",
+ "updated_at": "2022-07-06T12:29:48Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 3411,
- "watchers_count": 3411,
+ "stargazers_count": 3412,
+ "watchers_count": 3412,
"forks_count": 1017,
"allow_forking": true,
"is_template": false,
@@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1017,
- "watchers": 3411,
+ "watchers": 3412,
"score": 0
},
{
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index c8677ea07c..7c4d9facaf 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -1234,10 +1234,10 @@
"description": "Citrix Unauthorized Remote Code Execution Attacker - CVE-2019-19781",
"fork": false,
"created_at": "2020-07-17T11:52:36Z",
- "updated_at": "2022-06-17T03:05:36Z",
+ "updated_at": "2022-07-06T16:40:34Z",
"pushed_at": "2020-07-21T19:41:23Z",
- "stargazers_count": 9,
- "watchers_count": 9,
+ "stargazers_count": 10,
+ "watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@@ -1245,7 +1245,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 9,
+ "watchers": 10,
"score": 0
},
{
diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json
index 3c94279908..0939e405f4 100644
--- a/2019/CVE-2019-2215.json
+++ b/2019/CVE-2019-2215.json
@@ -215,7 +215,7 @@
"pushed_at": "2020-08-08T12:54:09Z",
"stargazers_count": 26,
"watchers_count": 26,
- "forks_count": 12,
+ "forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -226,7 +226,7 @@
"kernel-vulnerability"
],
"visibility": "public",
- "forks": 12,
+ "forks": 13,
"watchers": 26,
"score": 0
},
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 8a3852c8af..d9558673aa 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -97,10 +97,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
- "updated_at": "2022-06-27T11:29:08Z",
+ "updated_at": "2022-07-06T17:11:52Z",
"pushed_at": "2020-04-26T10:49:25Z",
- "stargazers_count": 811,
- "watchers_count": 811,
+ "stargazers_count": 810,
+ "watchers_count": 810,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 172,
- "watchers": 811,
+ "watchers": 810,
"score": 0
},
{
diff --git a/2019/CVE-2019-9978.json b/2019/CVE-2019-9978.json
index 0f3e5aafa2..5f7bfa4407 100644
--- a/2019/CVE-2019-9978.json
+++ b/2019/CVE-2019-9978.json
@@ -13,10 +13,10 @@
"description": "CVE-2019-9978 - RCE on a Wordpress plugin: Social Warfare < 3.5.3",
"fork": false,
"created_at": "2019-03-25T23:38:58Z",
- "updated_at": "2020-04-05T17:18:01Z",
+ "updated_at": "2022-07-06T13:51:15Z",
"pushed_at": "2019-05-09T13:36:42Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 8,
+ "watchers": 9,
"score": 0
},
{
diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json
index 764c757091..875cfd7406 100644
--- a/2020/CVE-2020-0787.json
+++ b/2020/CVE-2020-0787.json
@@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
- "updated_at": "2022-07-06T07:27:59Z",
+ "updated_at": "2022-07-06T15:52:18Z",
"pushed_at": "2020-09-11T07:38:22Z",
- "stargazers_count": 625,
- "watchers_count": 625,
+ "stargazers_count": 626,
+ "watchers_count": 626,
"forks_count": 165,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 165,
- "watchers": 625,
+ "watchers": 626,
"score": 0
},
{
diff --git a/2020/CVE-2020-1034.json b/2020/CVE-2020-1034.json
index 0f3d1b2605..84a0165910 100644
--- a/2020/CVE-2020-1034.json
+++ b/2020/CVE-2020-1034.json
@@ -13,7 +13,7 @@
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
"fork": false,
"created_at": "2020-11-23T10:24:07Z",
- "updated_at": "2022-06-24T08:13:56Z",
+ "updated_at": "2022-07-06T13:03:27Z",
"pushed_at": "2021-03-16T13:53:37Z",
"stargazers_count": 103,
"watchers_count": 103,
@@ -21,7 +21,14 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
- "topics": [],
+ "topics": [
+ "cve",
+ "exploit",
+ "poc",
+ "privilege-escalation",
+ "vulnerability",
+ "windows"
+ ],
"visibility": "public",
"forks": 35,
"watchers": 103,
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 5459290167..7ade7beeb0 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2022-07-06T11:30:32Z",
+ "updated_at": "2022-07-06T12:29:48Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 3411,
- "watchers_count": 3411,
+ "stargazers_count": 3412,
+ "watchers_count": 3412,
"forks_count": 1017,
"allow_forking": true,
"is_template": false,
@@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1017,
- "watchers": 3411,
+ "watchers": 3412,
"score": 0
},
{
diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json
index a044d09857..39efc9f66d 100644
--- a/2020/CVE-2020-2883.json
+++ b/2020/CVE-2020-2883.json
@@ -102,10 +102,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
- "updated_at": "2022-07-05T17:15:45Z",
+ "updated_at": "2022-07-06T15:25:23Z",
"pushed_at": "2020-08-25T03:17:32Z",
- "stargazers_count": 405,
- "watchers_count": 405,
+ "stargazers_count": 406,
+ "watchers_count": 406,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
@@ -113,7 +113,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
- "watchers": 405,
+ "watchers": 406,
"score": 0
},
{
diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json
index 2b139db8a4..bb9d6f4107 100644
--- a/2020/CVE-2020-3452.json
+++ b/2020/CVE-2020-3452.json
@@ -419,10 +419,10 @@
"description": "CVE-2020-3452 - Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) traversal",
"fork": false,
"created_at": "2021-02-03T05:45:53Z",
- "updated_at": "2022-07-06T09:56:53Z",
+ "updated_at": "2022-07-06T14:05:45Z",
"pushed_at": "2021-02-03T12:19:16Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -433,7 +433,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 4,
"score": 0
},
{
diff --git a/2020/CVE-2020-5509.json b/2020/CVE-2020-5509.json
index d54b920563..ffe7ea606a 100644
--- a/2020/CVE-2020-5509.json
+++ b/2020/CVE-2020-5509.json
@@ -1,4 +1,32 @@
[
+ {
+ "id": 231982886,
+ "name": "CVE-2020-5509",
+ "full_name": "FULLSHADE\/CVE-2020-5509",
+ "owner": {
+ "login": "FULLSHADE",
+ "id": 54753063,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54753063?v=4",
+ "html_url": "https:\/\/github.com\/FULLSHADE"
+ },
+ "html_url": "https:\/\/github.com\/FULLSHADE\/CVE-2020-5509",
+ "description": "Car Rental Project v.1.0 Remote Code Execution",
+ "fork": false,
+ "created_at": "2020-01-05T22:13:24Z",
+ "updated_at": "2022-06-15T00:28:50Z",
+ "pushed_at": "2020-01-05T22:23:20Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0
+ },
{
"id": 319340829,
"name": "CVE-2020-5509",
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index f0b18c80eb..5ccf92fda1 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -45,13 +45,13 @@
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1575,
"watchers_count": 1575,
- "forks_count": 567,
+ "forks_count": 568,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 567,
+ "forks": 568,
"watchers": 1575,
"score": 0
},
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index de0ef55b82..a0196f7705 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -1570,7 +1570,7 @@
"fork": false,
"created_at": "2022-07-04T13:55:24Z",
"updated_at": "2022-07-05T15:28:42Z",
- "pushed_at": "2022-07-06T07:39:28Z",
+ "pushed_at": "2022-07-06T12:54:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index bb2d804598..b943a1329a 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -75,18 +75,18 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
- "updated_at": "2022-07-06T09:48:17Z",
+ "updated_at": "2022-07-06T14:28:15Z",
"pushed_at": "2022-06-08T04:00:28Z",
- "stargazers_count": 1600,
- "watchers_count": 1600,
- "forks_count": 463,
+ "stargazers_count": 1601,
+ "watchers_count": 1601,
+ "forks_count": 464,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 463,
- "watchers": 1600,
+ "forks": 464,
+ "watchers": 1601,
"score": 0
},
{
@@ -159,7 +159,7 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
- "updated_at": "2022-07-05T15:42:29Z",
+ "updated_at": "2022-07-06T17:15:55Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 878,
"watchers_count": 878,
diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json
index 265030a619..e8d6b14919 100644
--- a/2021/CVE-2021-42278.json
+++ b/2021/CVE-2021-42278.json
@@ -50,13 +50,13 @@
"pushed_at": "2022-04-25T07:53:41Z",
"stargazers_count": 364,
"watchers_count": 364,
- "forks_count": 72,
+ "forks_count": 73,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 72,
+ "forks": 73,
"watchers": 364,
"score": 0
},
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index febb5b926f..b1d56f699a 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -250,11 +250,11 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
- "updated_at": "2022-07-02T08:26:29Z",
+ "updated_at": "2022-07-06T12:55:22Z",
"pushed_at": "2022-06-28T17:00:53Z",
- "stargazers_count": 994,
- "watchers_count": 994,
- "forks_count": 439,
+ "stargazers_count": 995,
+ "watchers_count": 995,
+ "forks_count": 441,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -262,8 +262,8 @@
"log4shell"
],
"visibility": "public",
- "forks": 439,
- "watchers": 994,
+ "forks": 441,
+ "watchers": 995,
"score": 0
},
{
@@ -573,10 +573,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
- "updated_at": "2022-07-06T06:54:27Z",
+ "updated_at": "2022-07-06T15:50:10Z",
"pushed_at": "2022-03-20T16:33:49Z",
- "stargazers_count": 1423,
- "watchers_count": 1423,
+ "stargazers_count": 1422,
+ "watchers_count": 1422,
"forks_count": 391,
"allow_forking": true,
"is_template": false,
@@ -589,7 +589,7 @@
],
"visibility": "public",
"forks": 391,
- "watchers": 1423,
+ "watchers": 1422,
"score": 0
},
{
@@ -1147,18 +1147,18 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
- "updated_at": "2022-06-16T09:20:34Z",
+ "updated_at": "2022-07-06T15:24:37Z",
"pushed_at": "2022-01-25T12:58:27Z",
- "stargazers_count": 488,
- "watchers_count": 488,
- "forks_count": 66,
+ "stargazers_count": 489,
+ "watchers_count": 489,
+ "forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 66,
- "watchers": 488,
+ "forks": 67,
+ "watchers": 489,
"score": 0
},
{
@@ -4059,10 +4059,10 @@
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T18:08:45Z",
- "updated_at": "2022-06-15T19:59:09Z",
+ "updated_at": "2022-07-06T16:29:22Z",
"pushed_at": "2021-12-20T14:44:27Z",
- "stargazers_count": 140,
- "watchers_count": 140,
+ "stargazers_count": 141,
+ "watchers_count": 141,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
@@ -4070,7 +4070,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 140,
+ "watchers": 141,
"score": 0
},
{
diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json
index 32ce8e7681..5badee41d1 100644
--- a/2022/CVE-2022-0337.json
+++ b/2022/CVE-2022-0337.json
@@ -17,7 +17,7 @@
"pushed_at": "2022-03-19T12:01:26Z",
"stargazers_count": 268,
"watchers_count": 268,
- "forks_count": 34,
+ "forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -39,7 +39,7 @@
"writeups"
],
"visibility": "public",
- "forks": 34,
+ "forks": 33,
"watchers": 268,
"score": 0
}
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index c312db3c98..7a558b3a2a 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -1135,10 +1135,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
- "updated_at": "2022-07-06T09:16:54Z",
+ "updated_at": "2022-07-06T15:30:15Z",
"pushed_at": "2022-06-13T19:33:08Z",
- "stargazers_count": 287,
- "watchers_count": 287,
+ "stargazers_count": 288,
+ "watchers_count": 288,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
@@ -1146,7 +1146,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
- "watchers": 287,
+ "watchers": 288,
"score": 0
},
{
@@ -1868,10 +1868,10 @@
"description": "An eBPF detection program for CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T07:20:59Z",
- "updated_at": "2022-07-06T02:51:28Z",
+ "updated_at": "2022-07-06T14:56:17Z",
"pushed_at": "2022-07-05T14:25:46Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -1879,7 +1879,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 11,
+ "watchers": 12,
"score": 0
},
{
diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json
index a2276c205c..9155ddf8b5 100644
--- a/2022/CVE-2022-21882.json
+++ b/2022/CVE-2022-21882.json
@@ -13,10 +13,10 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
- "updated_at": "2022-07-06T06:19:27Z",
+ "updated_at": "2022-07-06T12:34:38Z",
"pushed_at": "2022-01-27T04:18:18Z",
- "stargazers_count": 418,
- "watchers_count": 418,
+ "stargazers_count": 419,
+ "watchers_count": 419,
"forks_count": 132,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 132,
- "watchers": 418,
+ "watchers": 419,
"score": 0
},
{
@@ -73,13 +73,13 @@
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 167,
"watchers_count": 167,
- "forks_count": 45,
+ "forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 45,
+ "forks": 44,
"watchers": 167,
"score": 0
},
diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json
index 455dafb6ab..204700b32b 100644
--- a/2022/CVE-2022-21907.json
+++ b/2022/CVE-2022-21907.json
@@ -240,13 +240,13 @@
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 118,
"watchers_count": 118,
- "forks_count": 28,
+ "forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 28,
+ "forks": 29,
"watchers": 118,
"score": 0
},
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index eaf1dc1689..cf0a575013 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -126,13 +126,13 @@
"pushed_at": "2022-06-10T17:34:08Z",
"stargazers_count": 260,
"watchers_count": 260,
- "forks_count": 204,
+ "forks_count": 203,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 204,
+ "forks": 203,
"watchers": 260,
"score": 0
},
diff --git a/2022/CVE-2022-23253.json b/2022/CVE-2022-23253.json
index b5a704a637..020d939df7 100644
--- a/2022/CVE-2022-23253.json
+++ b/2022/CVE-2022-23253.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-23253 PoC",
"fork": false,
"created_at": "2022-05-12T13:18:47Z",
- "updated_at": "2022-06-27T03:23:47Z",
+ "updated_at": "2022-07-06T15:59:40Z",
"pushed_at": "2022-05-23T11:45:12Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index 0598a9dfc0..371c3f855b 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -13,8 +13,8 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
- "updated_at": "2022-07-06T11:11:50Z",
- "pushed_at": "2022-07-05T16:12:40Z",
+ "updated_at": "2022-07-06T15:09:26Z",
+ "pushed_at": "2022-07-06T14:30:36Z",
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 35,
@@ -26,6 +26,7 @@
"batch",
"cve-2022-22980",
"cve-2022-26134",
+ "cve-2022-29464",
"gui",
"nday"
],
@@ -197,10 +198,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-06-03T21:07:30Z",
- "updated_at": "2022-07-05T19:28:37Z",
+ "updated_at": "2022-07-06T18:22:12Z",
"pushed_at": "2022-06-06T20:24:06Z",
- "stargazers_count": 242,
- "watchers_count": 242,
+ "stargazers_count": 243,
+ "watchers_count": 243,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
@@ -220,7 +221,7 @@
],
"visibility": "public",
"forks": 62,
- "watchers": 242,
+ "watchers": 243,
"score": 0
},
{
@@ -571,10 +572,10 @@
"description": "This repository talks about Zero-Day Exploitation of Atlassian Confluence, it's defense and analysis point of view from a SecOps or Blue Team perspective",
"fork": false,
"created_at": "2022-06-06T06:16:47Z",
- "updated_at": "2022-06-08T07:12:30Z",
+ "updated_at": "2022-07-06T18:21:26Z",
"pushed_at": "2022-06-10T03:12:07Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -582,7 +583,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0
},
{
diff --git a/2022/CVE-2022-26135.json b/2022/CVE-2022-26135.json
index f10e8f35cb..ccf8cb64c3 100644
--- a/2022/CVE-2022-26135.json
+++ b/2022/CVE-2022-26135.json
@@ -13,11 +13,11 @@
"description": "Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)",
"fork": false,
"created_at": "2022-06-24T07:55:52Z",
- "updated_at": "2022-07-06T12:02:47Z",
+ "updated_at": "2022-07-06T17:54:38Z",
"pushed_at": "2022-07-05T21:13:44Z",
- "stargazers_count": 24,
- "watchers_count": 24,
- "forks_count": 3,
+ "stargazers_count": 34,
+ "watchers_count": 34,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -28,8 +28,8 @@
"ssrf"
],
"visibility": "public",
- "forks": 3,
- "watchers": 24,
+ "forks": 6,
+ "watchers": 34,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-27255.json b/2022/CVE-2022-27255.json
new file mode 100644
index 0000000000..89c668d24f
--- /dev/null
+++ b/2022/CVE-2022-27255.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 511232241,
+ "name": "cve-2022-27255",
+ "full_name": "infobyte\/cve-2022-27255",
+ "owner": {
+ "login": "infobyte",
+ "id": 4226354,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4226354?v=4",
+ "html_url": "https:\/\/github.com\/infobyte"
+ },
+ "html_url": "https:\/\/github.com\/infobyte\/cve-2022-27255",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-07-06T17:29:04Z",
+ "updated_at": "2022-07-06T17:29:04Z",
+ "pushed_at": "2022-07-06T17:29:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-27666.json b/2022/CVE-2022-27666.json
index 48a7ee2db8..4951236615 100644
--- a/2022/CVE-2022-27666.json
+++ b/2022/CVE-2022-27666.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-27666",
"fork": false,
"created_at": "2022-03-23T22:54:28Z",
- "updated_at": "2022-07-03T14:03:11Z",
+ "updated_at": "2022-07-06T17:15:55Z",
"pushed_at": "2022-03-28T18:21:00Z",
- "stargazers_count": 170,
- "watchers_count": 170,
+ "stargazers_count": 169,
+ "watchers_count": 169,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
- "watchers": 170,
+ "watchers": 169,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index ad6a12e32b..24874cede3 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -105,10 +105,10 @@
"description": "Microsoft Office Word Rce 复现(CVE-2022-30190)",
"fork": false,
"created_at": "2022-05-31T12:15:18Z",
- "updated_at": "2022-06-28T07:08:28Z",
+ "updated_at": "2022-07-06T15:44:45Z",
"pushed_at": "2022-05-31T12:27:50Z",
- "stargazers_count": 37,
- "watchers_count": 37,
+ "stargazers_count": 38,
+ "watchers_count": 38,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@@ -116,7 +116,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 37,
+ "watchers": 38,
"score": 0
},
{
@@ -654,10 +654,10 @@
"description": "MSDT protocol disabler (CVE-2022-30190 patch tool)",
"fork": false,
"created_at": "2022-06-02T02:47:34Z",
- "updated_at": "2022-06-26T10:10:48Z",
+ "updated_at": "2022-07-06T13:37:08Z",
"pushed_at": "2022-06-26T10:10:37Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -665,7 +665,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0
},
{
diff --git a/2022/CVE-2022-30525.json b/2022/CVE-2022-30525.json
index dbf74ead73..3990b23aa7 100644
--- a/2022/CVE-2022-30525.json
+++ b/2022/CVE-2022-30525.json
@@ -46,10 +46,10 @@
"description": "Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)",
"fork": false,
"created_at": "2022-05-13T12:03:28Z",
- "updated_at": "2022-06-13T09:29:09Z",
+ "updated_at": "2022-07-06T15:08:36Z",
"pushed_at": "2022-05-13T12:29:47Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 19,
+ "watchers": 20,
"score": 0
},
{
@@ -214,10 +214,10 @@
"description": "Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection",
"fork": false,
"created_at": "2022-05-18T15:22:17Z",
- "updated_at": "2022-06-03T11:27:40Z",
+ "updated_at": "2022-07-06T15:20:20Z",
"pushed_at": "2022-05-19T11:29:16Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -225,7 +225,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 3,
+ "watchers": 4,
"score": 0
},
{
diff --git a/2022/CVE-2022-31749.json b/2022/CVE-2022-31749.json
index 419806a8e0..6daf1553f8 100644
--- a/2022/CVE-2022-31749.json
+++ b/2022/CVE-2022-31749.json
@@ -46,8 +46,8 @@
"description": "Simple PoC-checker for CVE-2022-31749 by 1vere$k",
"fork": false,
"created_at": "2022-07-06T09:15:49Z",
- "updated_at": "2022-07-06T09:22:10Z",
- "pushed_at": "2022-07-06T09:15:50Z",
+ "updated_at": "2022-07-06T12:34:20Z",
+ "pushed_at": "2022-07-06T12:35:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
diff --git a/README.md b/README.md
index 162a025edc..c2cecd7427 100644
--- a/README.md
+++ b/README.md
@@ -1907,6 +1907,9 @@ The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal
- [nonamecoder/CVE-2022-27254](https://github.com/nonamecoder/CVE-2022-27254)
+### CVE-2022-27255
+- [infobyte/cve-2022-27255](https://github.com/infobyte/cve-2022-27255)
+
### CVE-2022-27438 (2022-06-06)
@@ -2518,7 +2521,12 @@ H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerabi
- [arozx/CVE-2022-30910](https://github.com/arozx/CVE-2022-30910)
-### CVE-2022-30929
+### CVE-2022-30929 (2022-07-06)
+
+
+Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.
+
+
- [AgainstTheLight/CVE-2022-30929](https://github.com/AgainstTheLight/CVE-2022-30929)
### CVE-2022-31245 (2022-05-20)
@@ -8667,6 +8675,7 @@ In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the use
PHPGurukul Car Rental Project v1.0 allows Remote Code Execution via an executable file in an upload of a new profile image.
+- [FULLSHADE/CVE-2020-5509](https://github.com/FULLSHADE/CVE-2020-5509)
- [5l1v3r1/CVE-2020-5509](https://github.com/5l1v3r1/CVE-2020-5509)
### CVE-2020-5837 (2020-05-11)
@@ -16877,7 +16886,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- [111ddea/cve-2018-2894](https://github.com/111ddea/cve-2018-2894)
- [LandGrey/CVE-2018-2894](https://github.com/LandGrey/CVE-2018-2894)
- [jas502n/CVE-2018-2894](https://github.com/jas502n/CVE-2018-2894)
-- [k8gege/PyLadon](https://github.com/k8gege/PyLadon)
### CVE-2018-3191 (2018-10-16)
@@ -18128,7 +18136,6 @@ Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <=
An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
-- [wildkindcc/CVE-2018-9276](https://github.com/wildkindcc/CVE-2018-9276)
- [andyfeili/CVE-2018-9276](https://github.com/andyfeili/CVE-2018-9276)
- [A1vinSmith/CVE-2018-9276](https://github.com/A1vinSmith/CVE-2018-9276)
@@ -18889,7 +18896,6 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut
- [Bilelxdz/Laravel-CVE-2018-15133](https://github.com/Bilelxdz/Laravel-CVE-2018-15133)
- [Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader](https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader)
- [iansangaji/laravel-rce-cve-2018-15133](https://github.com/iansangaji/laravel-rce-cve-2018-15133)
-- [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133)
- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133)
- [PwnedShell/Larascript](https://github.com/PwnedShell/Larascript)
- [AzhariKun/CVE-2018-15133](https://github.com/AzhariKun/CVE-2018-15133)
@@ -18937,7 +18943,6 @@ OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not dela
- [coollce/CVE-2018-15473_burte](https://github.com/coollce/CVE-2018-15473_burte)
- [Dirty-Racoon/CVE-2018-15473-py3](https://github.com/Dirty-Racoon/CVE-2018-15473-py3)
- [Sait-Nuri/CVE-2018-15473](https://github.com/Sait-Nuri/CVE-2018-15473)
-- [WildfootW/CVE-2018-15473_OpenSSH_7.7](https://github.com/WildfootW/CVE-2018-15473_OpenSSH_7.7)
- [MrDottt/CVE-2018-15473](https://github.com/MrDottt/CVE-2018-15473)
- [66quentin/shodan-CVE-2018-15473](https://github.com/66quentin/shodan-CVE-2018-15473)
- [0xrobiul/CVE-2018-15473](https://github.com/0xrobiul/CVE-2018-15473)
@@ -19683,14 +19688,6 @@ Multiple buffer overflow vulnerabilities have been found in Ken Silverman Build
- [Alexandre-Bartel/CVE-2018-20343](https://github.com/Alexandre-Bartel/CVE-2018-20343)
-### CVE-2018-20433 (2018-12-24)
-
-
-c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
-
-
-- [shanika04/cp30_XXE_partial_fix](https://github.com/shanika04/cp30_XXE_partial_fix)
-
### CVE-2018-20434 (2019-04-24)
@@ -21331,7 +21328,7 @@ Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem
- [RandomRobbieBF/phpunit-brute](https://github.com/RandomRobbieBF/phpunit-brute)
- [cyberharsh/Php-unit-CVE-2017-9841](https://github.com/cyberharsh/Php-unit-CVE-2017-9841)
- [ludy-dev/PHPUnit_eval-stdin_RCE](https://github.com/ludy-dev/PHPUnit_eval-stdin_RCE)
-- [rdpwn/laravel-phpunit-rce-masscaner](https://github.com/rdpwn/laravel-phpunit-rce-masscaner)
+- [incogbyte/laravel-phpunit-rce-masscaner](https://github.com/incogbyte/laravel-phpunit-rce-masscaner)
- [akr3ch/CVE-2017-9841](https://github.com/akr3ch/CVE-2017-9841)
- [p1ckzi/CVE-2017-9841](https://github.com/p1ckzi/CVE-2017-9841)
- [jax7sec/CVE-2017-9841](https://github.com/jax7sec/CVE-2017-9841)
@@ -23439,6 +23436,14 @@ The register method in the UsersModelRegistration class in controllers/user.php
- [cved-sources/cve-2016-8870](https://github.com/cved-sources/cve-2016-8870)
+### CVE-2016-9066 (2018-06-11)
+
+
+A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
+
+
+- [saelo/foxpwn](https://github.com/saelo/foxpwn)
+
### CVE-2016-9079 (2018-06-11)