From c7fedb760e355859a97bde77d1aa149a321e6a0c Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Thu, 23 Mar 2023 15:29:29 +0900 Subject: [PATCH] Auto Update 2023/03/23 06:29:29 --- 2016/CVE-2016-0638.json | 8 ++-- 2017/CVE-2017-3248.json | 8 ++-- 2017/CVE-2017-5754.json | 8 ++-- 2018/CVE-2018-2628.json | 8 ++-- 2019/CVE-2019-11043.json | 8 ++-- 2019/CVE-2019-17558.json | 8 ++-- 2019/CVE-2019-18634.json | 8 ++-- 2019/CVE-2019-2618.json | 8 ++-- 2019/CVE-2019-5736.json | 8 ++-- 2020/CVE-2020-0218.json | 2 +- 2020/CVE-2020-0242.json | 4 +- 2020/CVE-2020-0245.json | 2 +- 2020/CVE-2020-0796.json | 8 ++-- 2020/CVE-2020-1472.json | 8 ++-- 2020/CVE-2020-14882.json | 8 ++-- 2020/CVE-2020-17527.json | 2 +- 2020/CVE-2020-2551.json | 8 ++-- 2021/CVE-2021-0509.json | 2 +- 2021/CVE-2021-0520.json | 2 +- 2021/CVE-2021-0928.json | 4 +- 2021/CVE-2021-21220.json | 4 +- 2021/CVE-2021-22205.json | 8 ++-- 2021/CVE-2021-3156.json | 8 ++-- 2021/CVE-2021-4034.json | 8 ++-- 2021/CVE-2021-41773.json | 16 +++---- 2021/CVE-2021-42278.json | 8 ++-- 2021/CVE-2021-44228.json | 16 +++---- 2021/CVE-2021-44852.json | 2 +- 2022/CVE-2022-0847.json | 58 ++++++++++++++++++++++++ 2022/CVE-2022-1040.json | 8 ++-- 2022/CVE-2022-1388.json | 62 +++++++++++++++++++++++++ 2022/CVE-2022-20124.json | 31 +++++++++++++ 2022/CVE-2022-20130.json | 31 +++++++++++++ 2022/CVE-2022-20135.json | 31 +++++++++++++ 2022/CVE-2022-20142.json | 29 ++++++++++++ 2022/CVE-2022-20413.json | 2 +- 2022/CVE-2022-20452.json | 12 ++--- 2022/CVE-2022-21449.json | 29 ++++++++++++ 2022/CVE-2022-22954.json | 58 ++++++++++++++++++++++++ 2022/CVE-2022-22965.json | 45 ++++++++++++++---- 2022/CVE-2022-24342.json | 39 ++++++++++++++++ 2022/CVE-2022-24637.json | 8 ++-- 2022/CVE-2022-24706.json | 29 ++++++++++++ 2022/CVE-2022-26134.json | 67 +++++++++++++++++++++++++++ 2022/CVE-2022-26763.json | 31 +++++++++++++ 2022/CVE-2022-26766.json | 31 +++++++++++++ 2022/CVE-2022-28219.json | 29 ++++++++++++ 2022/CVE-2022-29464.json | 66 +++++++++++++++++++++++++-- 2022/CVE-2022-29885.json | 29 ++++++++++++ 2022/CVE-2022-30190.json | 12 ++--- 2022/CVE-2022-30333.json | 29 ++++++++++++ 2022/CVE-2022-30594.json | 31 +++++++++++++ 2022/CVE-2022-30887.json | 31 +++++++++++++ 2022/CVE-2022-30929.json | 31 +++++++++++++ 2022/CVE-2022-33679.json | 8 ++-- 2022/CVE-2022-34718.json | 8 ++-- 2022/CVE-2022-34918.json | 8 ++-- 2022/CVE-2022-39197.json | 16 +++---- 2022/CVE-2022-39952.json | 12 ++--- 2022/CVE-2022-41040.json | 16 +++---- 2022/CVE-2022-41218.json | 12 ++--- 2022/CVE-2022-42475.json | 8 ++-- 2022/CVE-2022-44268.json | 24 +++++----- 2022/CVE-2022-44877.json | 8 ++-- 2022/CVE-2022-45025.json | 8 ++-- 2022/CVE-2022-46463.json | 8 ++-- 2022/CVE-2022-46689.json | 8 ++-- 2023/CVE-2023-21036.json | 10 ++-- 2023/CVE-2023-21716.json | 8 ++-- 2023/CVE-2023-21768.json | 24 +++++----- 2023/CVE-2023-21839.json | 8 ++-- 2023/CVE-2023-23397.json | 24 +++++----- 2023/CVE-2023-23638.json | 8 ++-- 2023/CVE-2023-25136.json | 8 ++-- 2023/CVE-2023-27326.json | 12 ++--- README.md | 98 +++++++++++++++++++++++++++++++++++++++- 76 files changed, 1141 insertions(+), 254 deletions(-) create mode 100644 2022/CVE-2022-20124.json create mode 100644 2022/CVE-2022-20130.json create mode 100644 2022/CVE-2022-20135.json create mode 100644 2022/CVE-2022-24342.json create mode 100644 2022/CVE-2022-26763.json create mode 100644 2022/CVE-2022-26766.json create mode 100644 2022/CVE-2022-30594.json create mode 100644 2022/CVE-2022-30887.json create mode 100644 2022/CVE-2022-30929.json diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 870e8391fa..d7a038886f 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-20T12:19:54Z", + "updated_at": "2023-03-23T04:00:33Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1645, - "watchers_count": 1645, + "stargazers_count": 1646, + "watchers_count": 1646, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1645, + "watchers": 1646, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index b2d72e62b4..18bab85726 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-20T12:19:54Z", + "updated_at": "2023-03-23T04:00:33Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1645, - "watchers_count": 1645, + "stargazers_count": 1646, + "watchers_count": 1646, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1645, + "watchers": 1646, "score": 0 }, { diff --git a/2017/CVE-2017-5754.json b/2017/CVE-2017-5754.json index dc4ad72849..5863907c87 100644 --- a/2017/CVE-2017-5754.json +++ b/2017/CVE-2017-5754.json @@ -52,10 +52,10 @@ "description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.", "fork": false, "created_at": "2018-01-04T23:51:12Z", - "updated_at": "2023-02-27T21:04:33Z", + "updated_at": "2023-03-23T02:55:39Z", "pushed_at": "2018-02-27T05:22:38Z", - "stargazers_count": 546, - "watchers_count": 546, + "stargazers_count": 545, + "watchers_count": 545, "has_discussions": false, "forks_count": 73, "allow_forking": true, @@ -73,7 +73,7 @@ ], "visibility": "public", "forks": 73, - "watchers": 546, + "watchers": 545, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ab406dec2c..f8f3d1b0e2 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,10 +568,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-20T12:19:54Z", + "updated_at": "2023-03-23T04:00:33Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1645, - "watchers_count": 1645, + "stargazers_count": 1646, + "watchers_count": 1646, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -601,7 +601,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1645, + "watchers": 1646, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 08e10248d5..0bf8e09670 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2023-03-15T08:40:26Z", + "updated_at": "2023-03-23T04:39:48Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1760, - "watchers_count": 1760, + "stargazers_count": 1761, + "watchers_count": 1761, "has_discussions": false, "forks_count": 264, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 264, - "watchers": 1760, + "watchers": 1761, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 90debcc773..6843a2b493 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -42,10 +42,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-03-22T11:57:18Z", + "updated_at": "2023-03-23T06:09:07Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3698, - "watchers_count": 3698, + "stargazers_count": 3700, + "watchers_count": 3700, "has_discussions": false, "forks_count": 1067, "allow_forking": true, @@ -74,7 +74,7 @@ ], "visibility": "public", "forks": 1067, - "watchers": 3698, + "watchers": 3700, "score": 0 }, { diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index 9f761ce311..3b6eae0b6e 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -42,10 +42,10 @@ "description": "Proof of Concept for CVE-2019-18634", "fork": false, "created_at": "2020-02-07T18:07:03Z", - "updated_at": "2023-03-21T10:46:48Z", + "updated_at": "2023-03-23T05:39:37Z", "pushed_at": "2021-09-12T02:55:24Z", - "stargazers_count": 162, - "watchers_count": 162, + "stargazers_count": 163, + "watchers_count": 163, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 162, + "watchers": 163, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 17cc2d3330..095fff9c76 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -187,10 +187,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-20T12:19:54Z", + "updated_at": "2023-03-23T04:00:33Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1645, - "watchers_count": 1645, + "stargazers_count": 1646, + "watchers_count": 1646, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -220,7 +220,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1645, + "watchers": 1646, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index b685890972..52a6ac80f4 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -13,10 +13,10 @@ "description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)", "fork": false, "created_at": "2019-02-12T22:07:47Z", - "updated_at": "2023-03-22T09:56:48Z", + "updated_at": "2023-03-23T05:40:33Z", "pushed_at": "2019-02-20T15:35:34Z", - "stargazers_count": 202, - "watchers_count": 202, + "stargazers_count": 204, + "watchers_count": 204, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 202, + "watchers": 204, "score": 0 }, { diff --git a/2020/CVE-2020-0218.json b/2020/CVE-2020-0218.json index 4c8a413f0e..b6b9e9f2e6 100644 --- a/2020/CVE-2020-0218.json +++ b/2020/CVE-2020-0218.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2022-04-22T06:32:40Z", - "updated_at": "2022-04-22T06:35:39Z", + "updated_at": "2023-03-23T01:18:23Z", "pushed_at": "2022-04-22T06:36:40Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2020/CVE-2020-0242.json b/2020/CVE-2020-0242.json index f38d6c9051..53781494f7 100644 --- a/2020/CVE-2020-0242.json +++ b/2020/CVE-2020-0242.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2022-02-23T11:48:10Z", - "updated_at": "2022-02-23T11:55:34Z", + "updated_at": "2023-03-23T01:13:15Z", "pushed_at": "2022-02-23T11:56:14Z", "stargazers_count": 0, "watchers_count": 0, @@ -42,7 +42,7 @@ "description": null, "fork": false, "created_at": "2022-03-30T09:35:35Z", - "updated_at": "2022-03-30T09:44:25Z", + "updated_at": "2023-03-23T01:18:29Z", "pushed_at": "2022-03-30T09:46:17Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2020/CVE-2020-0245.json b/2020/CVE-2020-0245.json index 63e4003e03..d42f693356 100644 --- a/2020/CVE-2020-0245.json +++ b/2020/CVE-2020-0245.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2022-04-01T11:04:45Z", - "updated_at": "2023-01-31T19:42:24Z", + "updated_at": "2023-03-23T01:15:44Z", "pushed_at": "2022-04-01T11:09:04Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index a6146799c3..f197f8e4f8 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1032,10 +1032,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2023-03-18T21:12:43Z", + "updated_at": "2023-03-23T04:40:08Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1240, - "watchers_count": 1240, + "stargazers_count": 1241, + "watchers_count": 1241, "has_discussions": false, "forks_count": 370, "allow_forking": true, @@ -1050,7 +1050,7 @@ ], "visibility": "public", "forks": 370, - "watchers": 1240, + "watchers": 1241, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 94d4f6f4b7..6f039449b0 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -42,10 +42,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2023-03-22T02:02:30Z", + "updated_at": "2023-03-23T04:39:27Z", "pushed_at": "2023-02-16T02:07:09Z", - "stargazers_count": 1562, - "watchers_count": 1562, + "stargazers_count": 1563, + "watchers_count": 1563, "has_discussions": false, "forks_count": 353, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 353, - "watchers": 1562, + "watchers": 1563, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 2afbfcc1c1..f6b0b5ae80 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-03-22T11:57:18Z", + "updated_at": "2023-03-23T06:09:07Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3698, - "watchers_count": 3698, + "stargazers_count": 3700, + "watchers_count": 3700, "has_discussions": false, "forks_count": 1067, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1067, - "watchers": 3698, + "watchers": 3700, "score": 0 }, { diff --git a/2020/CVE-2020-17527.json b/2020/CVE-2020-17527.json index 30f3e2789e..3c379353fc 100644 --- a/2020/CVE-2020-17527.json +++ b/2020/CVE-2020-17527.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2021-02-05T00:18:45Z", - "updated_at": "2022-03-03T22:44:22Z", + "updated_at": "2023-03-23T01:16:32Z", "pushed_at": "2021-02-09T03:15:08Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index b670e72cbc..dd8a833975 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2023-03-20T12:19:54Z", + "updated_at": "2023-03-23T04:00:33Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1645, - "watchers_count": 1645, + "stargazers_count": 1646, + "watchers_count": 1646, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 323, - "watchers": 1645, + "watchers": 1646, "score": 0 }, { diff --git a/2021/CVE-2021-0509.json b/2021/CVE-2021-0509.json index 127b1c21f1..a345d05616 100644 --- a/2021/CVE-2021-0509.json +++ b/2021/CVE-2021-0509.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2022-04-21T06:23:26Z", - "updated_at": "2022-04-21T06:33:37Z", + "updated_at": "2023-03-23T01:17:11Z", "pushed_at": "2022-04-21T06:35:24Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2021/CVE-2021-0520.json b/2021/CVE-2021-0520.json index 99724f0bca..9489ed8ffb 100644 --- a/2021/CVE-2021-0520.json +++ b/2021/CVE-2021-0520.json @@ -71,7 +71,7 @@ "description": null, "fork": false, "created_at": "2022-07-25T11:57:50Z", - "updated_at": "2023-01-31T20:06:46Z", + "updated_at": "2023-03-23T01:16:15Z", "pushed_at": "2022-07-25T12:38:27Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2021/CVE-2021-0928.json b/2021/CVE-2021-0928.json index 5308848bbf..49220b5011 100644 --- a/2021/CVE-2021-0928.json +++ b/2021/CVE-2021-0928.json @@ -18,13 +18,13 @@ "stargazers_count": 66, "watchers_count": 66, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 66, "score": 0 } diff --git a/2021/CVE-2021-21220.json b/2021/CVE-2021-21220.json index 9803d7d7ab..b569a1f744 100644 --- a/2021/CVE-2021-21220.json +++ b/2021/CVE-2021-21220.json @@ -18,13 +18,13 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 7, "score": 0 } diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 1da9d2da99..d8fe5a02f7 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -129,10 +129,10 @@ "description": "CVE-2021-22205& GitLab CE\/EE RCE", "fork": false, "created_at": "2021-10-29T04:30:45Z", - "updated_at": "2023-03-15T15:41:50Z", + "updated_at": "2023-03-23T00:47:38Z", "pushed_at": "2022-11-16T08:14:33Z", - "stargazers_count": 222, - "watchers_count": 222, + "stargazers_count": 223, + "watchers_count": 223, "has_discussions": false, "forks_count": 100, "allow_forking": true, @@ -143,7 +143,7 @@ ], "visibility": "public", "forks": 100, - "watchers": 222, + "watchers": 223, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index fd3a5b5120..a9ce10c253 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -455,10 +455,10 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2023-03-21T12:13:38Z", + "updated_at": "2023-03-23T04:40:59Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 863, - "watchers_count": 863, + "stargazers_count": 864, + "watchers_count": 864, "has_discussions": false, "forks_count": 238, "allow_forking": true, @@ -467,7 +467,7 @@ "topics": [], "visibility": "public", "forks": 238, - "watchers": 863, + "watchers": 864, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 0a933e20a4..949c55b92d 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -164,10 +164,10 @@ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)", "fork": false, "created_at": "2022-01-26T00:56:36Z", - "updated_at": "2023-03-10T12:09:21Z", + "updated_at": "2023-03-23T04:40:32Z", "pushed_at": "2022-02-12T05:22:58Z", - "stargazers_count": 957, - "watchers_count": 957, + "stargazers_count": 958, + "watchers_count": 958, "has_discussions": false, "forks_count": 310, "allow_forking": true, @@ -180,7 +180,7 @@ ], "visibility": "public", "forks": 310, - "watchers": 957, + "watchers": 958, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 0735d05f00..975124e1d1 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -461,10 +461,10 @@ "description": "Path Traversal vulnerability in Apache 2.4.49", "fork": false, "created_at": "2021-10-06T10:04:22Z", - "updated_at": "2021-10-10T18:52:52Z", + "updated_at": "2023-03-23T02:24:39Z", "pushed_at": "2021-10-07T19:39:09Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -473,7 +473,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { @@ -2374,10 +2374,10 @@ "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", - "updated_at": "2023-03-09T22:35:46Z", + "updated_at": "2023-03-23T00:59:39Z", "pushed_at": "2022-03-12T21:30:58Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -2395,7 +2395,7 @@ ], "visibility": "public", "forks": 28, - "watchers": 61, + "watchers": 62, "score": 0 }, { diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 4a3c3673c1..9ee25356ee 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -47,10 +47,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2023-03-22T02:18:39Z", + "updated_at": "2023-03-23T01:18:57Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 545, - "watchers_count": 545, + "stargazers_count": 546, + "watchers_count": 546, "has_discussions": false, "forks_count": 97, "allow_forking": true, @@ -59,7 +59,7 @@ "topics": [], "visibility": "public", "forks": 97, - "watchers": 545, + "watchers": 546, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 6289019968..ccfa921818 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -909,10 +909,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2023-03-21T09:14:18Z", + "updated_at": "2023-03-23T02:34:07Z", "pushed_at": "2023-02-08T23:41:04Z", - "stargazers_count": 1551, - "watchers_count": 1551, + "stargazers_count": 1552, + "watchers_count": 1552, "has_discussions": false, "forks_count": 450, "allow_forking": true, @@ -926,7 +926,7 @@ ], "visibility": "public", "forks": 450, - "watchers": 1551, + "watchers": 1552, "score": 0 }, { @@ -1259,10 +1259,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2023-03-22T06:03:49Z", + "updated_at": "2023-03-23T02:02:57Z", "pushed_at": "2023-03-21T03:01:52Z", - "stargazers_count": 645, - "watchers_count": 645, + "stargazers_count": 646, + "watchers_count": 646, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -1276,7 +1276,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 645, + "watchers": 646, "score": 0 }, { diff --git a/2021/CVE-2021-44852.json b/2021/CVE-2021-44852.json index 0598ecdc9d..4f9e21f755 100644 --- a/2021/CVE-2021-44852.json +++ b/2021/CVE-2021-44852.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-03-22T04:11:03Z", "updated_at": "2023-03-22T14:09:02Z", - "pushed_at": "2023-03-22T20:17:23Z", + "pushed_at": "2023-03-23T01:51:28Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 81b3f53179..5769a00bee 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1865,6 +1865,64 @@ "watchers": 4, "score": 0 }, + { + "id": 510629189, + "name": "dirtypipe-ebpf_detection", + "full_name": "airbus-cert\/dirtypipe-ebpf_detection", + "owner": { + "login": "airbus-cert", + "id": 26453405, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4", + "html_url": "https:\/\/github.com\/airbus-cert" + }, + "html_url": "https:\/\/github.com\/airbus-cert\/dirtypipe-ebpf_detection", + "description": "An eBPF detection program for CVE-2022-0847", + "fork": false, + "created_at": "2022-07-05T07:20:59Z", + "updated_at": "2023-01-16T18:05:15Z", + "pushed_at": "2022-07-05T14:25:46Z", + "stargazers_count": 21, + "watchers_count": 21, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 21, + "score": 0 + }, + { + "id": 510867863, + "name": "Dirty-Pipe", + "full_name": "edr1412\/Dirty-Pipe", + "owner": { + "login": "edr1412", + "id": 40953911, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4", + "html_url": "https:\/\/github.com\/edr1412" + }, + "html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe", + "description": "exp of CVE-2022-0847", + "fork": false, + "created_at": "2022-07-05T19:22:50Z", + "updated_at": "2023-01-31T12:51:32Z", + "pushed_at": "2022-07-05T19:23:27Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 3, + "score": 0 + }, { "id": 520138171, "name": "CVE-2022-0847-DirtyPipe-Exploits", diff --git a/2022/CVE-2022-1040.json b/2022/CVE-2022-1040.json index 79e283b413..02c040d9c3 100644 --- a/2022/CVE-2022-1040.json +++ b/2022/CVE-2022-1040.json @@ -42,10 +42,10 @@ "description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication", "fork": false, "created_at": "2022-08-10T10:38:59Z", - "updated_at": "2023-03-01T11:47:12Z", + "updated_at": "2023-03-23T04:28:30Z", "pushed_at": "2022-10-21T07:55:22Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -63,7 +63,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 16, + "watchers": 17, "score": 0 }, { diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index d1ee79fa28..e7837e6ed5 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -1592,6 +1592,68 @@ "watchers": 3, "score": 0 }, + { + "id": 509548569, + "name": "CVE-2022-1388_refresh", + "full_name": "Luchoane\/CVE-2022-1388_refresh", + "owner": { + "login": "Luchoane", + "id": 40374879, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4", + "html_url": "https:\/\/github.com\/Luchoane" + }, + "html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh", + "description": "PoC for exploiting CVE-2022-1388 on BIG IP F5", + "fork": false, + "created_at": "2022-07-01T18:08:50Z", + "updated_at": "2022-07-07T19:22:09Z", + "pushed_at": "2022-07-01T20:04:27Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 510239425, + "name": "CVE-2022-1388", + "full_name": "jbharucha05\/CVE-2022-1388", + "owner": { + "login": "jbharucha05", + "id": 13020621, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4", + "html_url": "https:\/\/github.com\/jbharucha05" + }, + "html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388", + "description": "CVE-2022-1388, bypassing iControl REST authentication", + "fork": false, + "created_at": "2022-07-04T06:31:56Z", + "updated_at": "2022-07-04T07:08:22Z", + "pushed_at": "2022-07-04T10:37:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2022-1388", + "f5-big-ip-icontrol-rest-rce", + "f5-bigip" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 557286411, "name": "CVE-2022-1388", diff --git a/2022/CVE-2022-20124.json b/2022/CVE-2022-20124.json new file mode 100644 index 0000000000..3c375d25f2 --- /dev/null +++ b/2022/CVE-2022-20124.json @@ -0,0 +1,31 @@ +[ + { + "id": 510660359, + "name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-", + "description": null, + "fork": false, + "created_at": "2022-07-05T08:59:44Z", + "updated_at": "2022-07-05T09:52:45Z", + "pushed_at": "2022-07-05T09:52:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20130.json b/2022/CVE-2022-20130.json new file mode 100644 index 0000000000..64d3262c46 --- /dev/null +++ b/2022/CVE-2022-20130.json @@ -0,0 +1,31 @@ +[ + { + "id": 509461641, + "name": "external_aac_AOSP10_r33_CVE-2022-20130", + "full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130", + "owner": { + "login": "Satheesh575555", + "id": 102573923, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", + "html_url": "https:\/\/github.com\/Satheesh575555" + }, + "html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130", + "description": null, + "fork": false, + "created_at": "2022-07-01T13:16:14Z", + "updated_at": "2022-07-01T13:25:04Z", + "pushed_at": "2022-07-01T13:25:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20135.json b/2022/CVE-2022-20135.json new file mode 100644 index 0000000000..8aa3d25bae --- /dev/null +++ b/2022/CVE-2022-20135.json @@ -0,0 +1,31 @@ +[ + { + "id": 510684846, + "name": "frameworks_base_AOSP10_r33_CVE-2022-20135-", + "full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-", + "description": null, + "fork": false, + "created_at": "2022-07-05T10:15:49Z", + "updated_at": "2022-07-05T10:42:21Z", + "pushed_at": "2022-07-05T10:41:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20142.json b/2022/CVE-2022-20142.json index 656b61c3db..1f2f947b5f 100644 --- a/2022/CVE-2022-20142.json +++ b/2022/CVE-2022-20142.json @@ -1,4 +1,33 @@ [ + { + "id": 510346412, + "name": "frameworks_base_AOSP10_r33_CVE-2022-20142", + "full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142", + "owner": { + "login": "Satheesh575555", + "id": 102573923, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", + "html_url": "https:\/\/github.com\/Satheesh575555" + }, + "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142", + "description": null, + "fork": false, + "created_at": "2022-07-04T12:16:05Z", + "updated_at": "2022-07-04T13:19:53Z", + "pushed_at": "2022-07-04T12:21:52Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 529215266, "name": "frameworks_base_AOSP10_r33_CVE-2022-20142", diff --git a/2022/CVE-2022-20413.json b/2022/CVE-2022-20413.json index e8120adb3b..cf3c3bb651 100644 --- a/2022/CVE-2022-20413.json +++ b/2022/CVE-2022-20413.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2023-01-17T10:33:22Z", - "updated_at": "2023-01-17T11:20:34Z", + "updated_at": "2023-03-23T01:13:28Z", "pushed_at": "2023-01-17T11:20:36Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index f0d73ba305..29caf1fa83 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -13,19 +13,19 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2023-03-19T20:06:21Z", + "updated_at": "2023-03-23T02:11:18Z", "pushed_at": "2023-01-10T16:25:49Z", - "stargazers_count": 180, - "watchers_count": 180, + "stargazers_count": 182, + "watchers_count": 182, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 32, - "watchers": 180, + "forks": 33, + "watchers": 182, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21449.json b/2022/CVE-2022-21449.json index a337743144..7133298ec5 100644 --- a/2022/CVE-2022-21449.json +++ b/2022/CVE-2022-21449.json @@ -202,6 +202,35 @@ "watchers": 0, "score": 0 }, + { + "id": 510875629, + "name": "CVE-2022-21449-I2P-TLS-POC", + "full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC", + "owner": { + "login": "PyterSmithDarkGhost", + "id": 106814901, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4", + "html_url": "https:\/\/github.com\/PyterSmithDarkGhost" + }, + "html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC", + "description": null, + "fork": false, + "created_at": "2022-07-05T19:51:39Z", + "updated_at": "2022-09-01T23:29:48Z", + "pushed_at": "2022-07-05T19:52:05Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0 + }, { "id": 519281774, "name": "CVE-2022-21449-showcase", diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index cee2ea4f8d..04616dde21 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -637,6 +637,64 @@ "watchers": 0, "score": 0 }, + { + "id": 524471767, + "name": "CVE-2022-22954", + "full_name": "amit-pathak009\/CVE-2022-22954", + "owner": { + "login": "amit-pathak009", + "id": 72250138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", + "html_url": "https:\/\/github.com\/amit-pathak009" + }, + "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954", + "description": null, + "fork": false, + "created_at": "2022-08-13T18:00:04Z", + "updated_at": "2022-06-02T01:44:19Z", + "pushed_at": "2022-06-02T01:44:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 524471940, + "name": "CVE-2022-22954-PoC", + "full_name": "amit-pathak009\/CVE-2022-22954-PoC", + "owner": { + "login": "amit-pathak009", + "id": 72250138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", + "html_url": "https:\/\/github.com\/amit-pathak009" + }, + "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC", + "description": null, + "fork": false, + "created_at": "2022-08-13T18:00:39Z", + "updated_at": "2022-06-01T22:41:09Z", + "pushed_at": "2022-06-01T22:41:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 545257457, "name": "VcenterKiller", diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index d00c769ec6..0df1114491 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -125,10 +125,10 @@ "description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit", "fork": false, "created_at": "2022-03-31T00:24:28Z", - "updated_at": "2023-03-20T14:06:59Z", + "updated_at": "2023-03-23T05:59:57Z", "pushed_at": "2022-08-04T18:26:18Z", - "stargazers_count": 282, - "watchers_count": 282, + "stargazers_count": 283, + "watchers_count": 283, "has_discussions": false, "forks_count": 220, "allow_forking": true, @@ -137,7 +137,7 @@ "topics": [], "visibility": "public", "forks": 220, - "watchers": 282, + "watchers": 283, "score": 0 }, { @@ -1896,6 +1896,35 @@ "watchers": 72, "score": 0 }, + { + "id": 510562121, + "name": "CVE-2022-22965", + "full_name": "trhacknon\/CVE-2022-22965", + "owner": { + "login": "trhacknon", + "id": 98242014, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", + "html_url": "https:\/\/github.com\/trhacknon" + }, + "html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22965", + "description": null, + "fork": false, + "created_at": "2022-07-05T02:30:29Z", + "updated_at": "2022-09-27T23:19:26Z", + "pushed_at": "2022-07-05T02:32:04Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 4, + "score": 0 + }, { "id": 510569312, "name": "Spring4Shell-CVE-2022-22965", @@ -2055,10 +2084,10 @@ "description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。", "fork": false, "created_at": "2022-12-28T04:50:16Z", - "updated_at": "2023-03-22T08:28:32Z", + "updated_at": "2023-03-23T03:52:50Z", "pushed_at": "2022-12-29T03:32:45Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -2067,7 +2096,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 61, + "watchers": 63, "score": 0 }, { diff --git a/2022/CVE-2022-24342.json b/2022/CVE-2022-24342.json new file mode 100644 index 0000000000..c0114266b3 --- /dev/null +++ b/2022/CVE-2022-24342.json @@ -0,0 +1,39 @@ +[ + { + "id": 509870464, + "name": "CVE-2022-24342", + "full_name": "yuriisanin\/CVE-2022-24342", + "owner": { + "login": "yuriisanin", + "id": 11749007, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4", + "html_url": "https:\/\/github.com\/yuriisanin" + }, + "html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-24342", + "description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication", + "fork": false, + "created_at": "2022-07-02T22:04:29Z", + "updated_at": "2023-02-12T21:01:11Z", + "pushed_at": "2022-07-05T17:31:35Z", + "stargazers_count": 34, + "watchers_count": 34, + "has_discussions": false, + "forks_count": 6, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "csrf", + "cve", + "cve-2022-24342", + "exploit", + "jetbrains", + "teamcity", + "vulnerability" + ], + "visibility": "public", + "forks": 6, + "watchers": 34, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24637.json b/2022/CVE-2022-24637.json index ad57adca3d..408ff606fb 100644 --- a/2022/CVE-2022-24637.json +++ b/2022/CVE-2022-24637.json @@ -100,10 +100,10 @@ "description": "Open Web Analytics (OWA) - Unauthenticated Remote Code Execution", "fork": false, "created_at": "2022-10-08T21:12:35Z", - "updated_at": "2023-03-22T21:44:56Z", + "updated_at": "2023-03-23T01:10:51Z", "pushed_at": "2022-10-12T17:14:54Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -116,7 +116,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2022/CVE-2022-24706.json b/2022/CVE-2022-24706.json index 005bcb96fc..70ddb064e3 100644 --- a/2022/CVE-2022-24706.json +++ b/2022/CVE-2022-24706.json @@ -57,6 +57,35 @@ "watchers": 0, "score": 0 }, + { + "id": 510182546, + "name": "CVE-2022-24706", + "full_name": "superzerosec\/CVE-2022-24706", + "owner": { + "login": "superzerosec", + "id": 57648217, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4", + "html_url": "https:\/\/github.com\/superzerosec" + }, + "html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-24706", + "description": "CVE-2022-24706 POC exploit", + "fork": false, + "created_at": "2022-07-04T02:06:27Z", + "updated_at": "2022-07-04T02:06:27Z", + "pushed_at": "2022-07-04T02:06:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 533101052, "name": "CVE-2022-24706-CouchDB-Exploit", diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 66062e9ffc..e9052e5ab8 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -1280,6 +1280,35 @@ "watchers": 0, "score": 0 }, + { + "id": 510402169, + "name": "TryHackMe-Atlassian-CVE-2022-26134", + "full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134", + "owner": { + "login": "r1skkam", + "id": 58542375, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4", + "html_url": "https:\/\/github.com\/r1skkam" + }, + "html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134", + "description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.", + "fork": false, + "created_at": "2022-07-04T15:00:21Z", + "updated_at": "2022-07-19T02:30:51Z", + "pushed_at": "2022-07-04T16:49:41Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, { "id": 510586350, "name": "CVE-2022-26134", @@ -1314,6 +1343,44 @@ "watchers": 10, "score": 0 }, + { + "id": 510624422, + "name": "CVE-2022-26134", + "full_name": "Debajyoti0-0\/CVE-2022-26134", + "owner": { + "login": "Debajyoti0-0", + "id": 79437050, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4", + "html_url": "https:\/\/github.com\/Debajyoti0-0" + }, + "html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134", + "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).", + "fork": false, + "created_at": "2022-07-05T07:04:50Z", + "updated_at": "2022-07-10T08:52:10Z", + "pushed_at": "2022-07-05T09:40:39Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "atlassian-confluence", + "cve-2022-26134", + "infosec", + "ognl-injection-vulnerability", + "payload", + "python", + "rce", + "unauthenticated" + ], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 + }, { "id": 510946912, "name": "cve-2022-26134", diff --git a/2022/CVE-2022-26763.json b/2022/CVE-2022-26763.json new file mode 100644 index 0000000000..0e6526a6f4 --- /dev/null +++ b/2022/CVE-2022-26763.json @@ -0,0 +1,31 @@ +[ + { + "id": 509675215, + "name": "PCICrash", + "full_name": "zhuowei\/PCICrash", + "owner": { + "login": "zhuowei", + "id": 704768, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4", + "html_url": "https:\/\/github.com\/zhuowei" + }, + "html_url": "https:\/\/github.com\/zhuowei\/PCICrash", + "description": "PCIDriverKit proof-of-concept for CVE-2022-26763", + "fork": false, + "created_at": "2022-07-02T06:15:29Z", + "updated_at": "2022-09-15T17:20:03Z", + "pushed_at": "2022-07-02T06:15:40Z", + "stargazers_count": 36, + "watchers_count": 36, + "has_discussions": false, + "forks_count": 4, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 4, + "watchers": 36, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26766.json b/2022/CVE-2022-26766.json new file mode 100644 index 0000000000..3d549753a1 --- /dev/null +++ b/2022/CVE-2022-26766.json @@ -0,0 +1,31 @@ +[ + { + "id": 509675427, + "name": "CoreTrustDemo", + "full_name": "zhuowei\/CoreTrustDemo", + "owner": { + "login": "zhuowei", + "id": 704768, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4", + "html_url": "https:\/\/github.com\/zhuowei" + }, + "html_url": "https:\/\/github.com\/zhuowei\/CoreTrustDemo", + "description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1", + "fork": false, + "created_at": "2022-07-02T06:16:33Z", + "updated_at": "2023-02-26T02:08:22Z", + "pushed_at": "2022-07-02T17:14:41Z", + "stargazers_count": 74, + "watchers_count": 74, + "has_discussions": false, + "forks_count": 12, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 12, + "watchers": 74, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28219.json b/2022/CVE-2022-28219.json index f07cb82b26..a408c68aa8 100644 --- a/2022/CVE-2022-28219.json +++ b/2022/CVE-2022-28219.json @@ -28,6 +28,35 @@ "watchers": 38, "score": 0 }, + { + "id": 509605278, + "name": "manageengine-auditad-cve-2022-28219", + "full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219", + "owner": { + "login": "rbowes-r7", + "id": 104588115, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4", + "html_url": "https:\/\/github.com\/rbowes-r7" + }, + "html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219", + "description": null, + "fork": false, + "created_at": "2022-07-01T22:40:46Z", + "updated_at": "2022-07-19T13:50:08Z", + "pushed_at": "2022-07-05T22:13:12Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0 + }, { "id": 518384320, "name": "CVE-2022-28219-Like", diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index c5f363b300..4cc09d54e0 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2023-03-09T07:34:27Z", + "updated_at": "2023-03-23T03:39:44Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 345, - "watchers_count": 345, + "stargazers_count": 346, + "watchers_count": 346, "has_discussions": false, "forks_count": 89, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 89, - "watchers": 345, + "watchers": 346, "score": 0 }, { @@ -554,6 +554,64 @@ "watchers": 4, "score": 0 }, + { + "id": 524474931, + "name": "CVE-2022-29464", + "full_name": "amit-pathak009\/CVE-2022-29464", + "owner": { + "login": "amit-pathak009", + "id": 72250138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", + "html_url": "https:\/\/github.com\/amit-pathak009" + }, + "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464", + "description": null, + "fork": false, + "created_at": "2022-08-13T18:14:43Z", + "updated_at": "2022-05-19T21:24:13Z", + "pushed_at": "2022-05-19T21:24:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 524475053, + "name": "CVE-2022-29464-mass", + "full_name": "amit-pathak009\/CVE-2022-29464-mass", + "owner": { + "login": "amit-pathak009", + "id": 72250138, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4", + "html_url": "https:\/\/github.com\/amit-pathak009" + }, + "html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass", + "description": null, + "fork": false, + "created_at": "2022-08-13T18:15:18Z", + "updated_at": "2023-01-11T06:21:01Z", + "pushed_at": "2022-05-29T19:16:06Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 2, + "score": 0 + }, { "id": 540011346, "name": "CVE-2022-29464", diff --git a/2022/CVE-2022-29885.json b/2022/CVE-2022-29885.json index 049f063d7e..ecc43149a6 100644 --- a/2022/CVE-2022-29885.json +++ b/2022/CVE-2022-29885.json @@ -27,5 +27,34 @@ "forks": 4, "watchers": 4, "score": 0 + }, + { + "id": 509388193, + "name": "CVE-2022-29885", + "full_name": "iveresk\/CVE-2022-29885", + "owner": { + "login": "iveresk", + "id": 28754633, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", + "html_url": "https:\/\/github.com\/iveresk" + }, + "html_url": "https:\/\/github.com\/iveresk\/CVE-2022-29885", + "description": "Apache Tomcat DoS (CVE-2022-29885) Exploit", + "fork": false, + "created_at": "2022-07-01T09:02:10Z", + "updated_at": "2023-01-24T17:20:21Z", + "pushed_at": "2022-07-05T06:23:18Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 2af01d5db5..167aadee13 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -2044,20 +2044,20 @@ }, { "id": 508614565, - "name": "CVE-2022-30190_PowerPoint", - "full_name": "Gra3s\/CVE-2022-30190_PowerPoint", + "name": "CVE-2022-30190_EXP_PowerPoint", + "full_name": "Gra3s\/CVE-2022-30190_EXP_PowerPoint", "owner": { "login": "Gra3s", "id": 76804515, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76804515?v=4", "html_url": "https:\/\/github.com\/Gra3s" }, - "html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_PowerPoint", - "description": "CVE-2022-30190 exp on PowerPoint", + "html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_EXP_PowerPoint", + "description": "This is exploit of CVE-2022-30190 on PowerPoint.", "fork": false, "created_at": "2022-06-29T08:48:12Z", - "updated_at": "2023-02-27T09:18:22Z", - "pushed_at": "2022-06-30T01:27:36Z", + "updated_at": "2023-03-23T03:19:30Z", + "pushed_at": "2023-03-23T03:18:46Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, diff --git a/2022/CVE-2022-30333.json b/2022/CVE-2022-30333.json index 5477b9db81..b7efd96188 100644 --- a/2022/CVE-2022-30333.json +++ b/2022/CVE-2022-30333.json @@ -1,4 +1,33 @@ [ + { + "id": 510563141, + "name": "CVE-2022-30333-PoC", + "full_name": "TheL1ghtVn\/CVE-2022-30333-PoC", + "owner": { + "login": "TheL1ghtVn", + "id": 89027345, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027345?v=4", + "html_url": "https:\/\/github.com\/TheL1ghtVn" + }, + "html_url": "https:\/\/github.com\/TheL1ghtVn\/CVE-2022-30333-PoC", + "description": null, + "fork": false, + "created_at": "2022-07-05T02:35:12Z", + "updated_at": "2022-11-19T19:17:38Z", + "pushed_at": "2022-07-05T02:58:30Z", + "stargazers_count": 14, + "watchers_count": 14, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 14, + "score": 0 + }, { "id": 514420724, "name": "unrar-cve-2022-30333-poc", diff --git a/2022/CVE-2022-30594.json b/2022/CVE-2022-30594.json new file mode 100644 index 0000000000..dc45e8bbdf --- /dev/null +++ b/2022/CVE-2022-30594.json @@ -0,0 +1,31 @@ +[ + { + "id": 510304709, + "name": "linux-4.19.72_CVE-2022-30594", + "full_name": "nidhi7598\/linux-4.19.72_CVE-2022-30594", + "owner": { + "login": "nidhi7598", + "id": 106973537, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4", + "html_url": "https:\/\/github.com\/nidhi7598" + }, + "html_url": "https:\/\/github.com\/nidhi7598\/linux-4.19.72_CVE-2022-30594", + "description": null, + "fork": false, + "created_at": "2022-07-04T10:01:05Z", + "updated_at": "2023-03-08T01:26:26Z", + "pushed_at": "2022-07-04T10:18:57Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30887.json b/2022/CVE-2022-30887.json new file mode 100644 index 0000000000..26fa6ca150 --- /dev/null +++ b/2022/CVE-2022-30887.json @@ -0,0 +1,31 @@ +[ + { + "id": 510479826, + "name": "CVE-2022-30887", + "full_name": "MuallimNaci\/CVE-2022-30887", + "owner": { + "login": "MuallimNaci", + "id": 87265009, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87265009?v=4", + "html_url": "https:\/\/github.com\/MuallimNaci" + }, + "html_url": "https:\/\/github.com\/MuallimNaci\/CVE-2022-30887", + "description": null, + "fork": false, + "created_at": "2022-07-04T19:24:56Z", + "updated_at": "2022-12-08T03:15:35Z", + "pushed_at": "2022-07-04T19:30:52Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30929.json b/2022/CVE-2022-30929.json new file mode 100644 index 0000000000..a39df0b2e4 --- /dev/null +++ b/2022/CVE-2022-30929.json @@ -0,0 +1,31 @@ +[ + { + "id": 511398695, + "name": "CVE-2022-30929", + "full_name": "nanaao\/CVE-2022-30929", + "owner": { + "login": "nanaao", + "id": 77666853, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4", + "html_url": "https:\/\/github.com\/nanaao" + }, + "html_url": "https:\/\/github.com\/nanaao\/CVE-2022-30929", + "description": "CVE-2022-30929 POC", + "fork": false, + "created_at": "2022-07-07T05:44:56Z", + "updated_at": "2023-01-31T12:52:11Z", + "pushed_at": "2022-07-04T06:19:57Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33679.json b/2022/CVE-2022-33679.json index aa5247976d..37a15babc2 100644 --- a/2022/CVE-2022-33679.json +++ b/2022/CVE-2022-33679.json @@ -13,10 +13,10 @@ "description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html", "fork": false, "created_at": "2022-11-02T18:38:01Z", - "updated_at": "2023-03-19T16:45:01Z", + "updated_at": "2023-03-23T03:07:58Z", "pushed_at": "2022-12-13T15:26:57Z", - "stargazers_count": 368, - "watchers_count": 368, + "stargazers_count": 369, + "watchers_count": 369, "has_discussions": false, "forks_count": 68, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 68, - "watchers": 368, + "watchers": 369, "score": 0 }, { diff --git a/2022/CVE-2022-34718.json b/2022/CVE-2022-34718.json index 321f786be6..30ce9446cd 100644 --- a/2022/CVE-2022-34718.json +++ b/2022/CVE-2022-34718.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-10-03T11:39:25Z", - "updated_at": "2023-03-16T16:47:02Z", + "updated_at": "2023-03-23T05:31:28Z", "pushed_at": "2022-10-10T08:57:29Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 42, + "watchers": 43, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json index f483df597c..8375290ebb 100644 --- a/2022/CVE-2022-34918.json +++ b/2022/CVE-2022-34918.json @@ -158,10 +158,10 @@ "description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC", "fork": false, "created_at": "2022-08-02T09:52:02Z", - "updated_at": "2023-03-21T15:29:04Z", + "updated_at": "2023-03-23T01:26:56Z", "pushed_at": "2022-09-15T03:19:28Z", - "stargazers_count": 201, - "watchers_count": 201, + "stargazers_count": 202, + "watchers_count": 202, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -170,7 +170,7 @@ "topics": [], "visibility": "public", "forks": 37, - "watchers": 201, + "watchers": 202, "score": 0 }, { diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index 9861fa3880..f3c6cbaeee 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -220,10 +220,10 @@ "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "fork": false, "created_at": "2022-09-26T08:58:21Z", - "updated_at": "2023-03-22T01:49:51Z", + "updated_at": "2023-03-23T03:27:19Z", "pushed_at": "2022-09-26T13:20:38Z", - "stargazers_count": 235, - "watchers_count": 235, + "stargazers_count": 236, + "watchers_count": 236, "has_discussions": false, "forks_count": 41, "allow_forking": true, @@ -236,7 +236,7 @@ ], "visibility": "public", "forks": 41, - "watchers": 235, + "watchers": 236, "score": 0 }, { @@ -253,10 +253,10 @@ "description": "CVE-2022-39197 bug fix patch", "fork": false, "created_at": "2022-10-09T04:06:23Z", - "updated_at": "2022-10-17T06:58:26Z", + "updated_at": "2023-03-23T03:34:03Z", "pushed_at": "2022-10-09T05:50:49Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -265,7 +265,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2022/CVE-2022-39952.json b/2022/CVE-2022-39952.json index 450348f8a4..f867a27377 100644 --- a/2022/CVE-2022-39952.json +++ b/2022/CVE-2022-39952.json @@ -13,19 +13,19 @@ "description": "POC for CVE-2022-39952", "fork": false, "created_at": "2023-02-20T15:12:33Z", - "updated_at": "2023-03-17T15:46:52Z", + "updated_at": "2023-03-23T02:11:24Z", "pushed_at": "2023-02-25T08:52:03Z", - "stargazers_count": 249, - "watchers_count": 249, + "stargazers_count": 250, + "watchers_count": 250, "has_discussions": false, - "forks_count": 49, + "forks_count": 50, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 49, - "watchers": 249, + "forks": 50, + "watchers": 250, "score": 0 }, { diff --git a/2022/CVE-2022-41040.json b/2022/CVE-2022-41040.json index 8bee384087..774ff14f7d 100644 --- a/2022/CVE-2022-41040.json +++ b/2022/CVE-2022-41040.json @@ -13,10 +13,10 @@ "description": "CVE-2022-41040 nuclei template", "fork": false, "created_at": "2022-10-02T11:26:57Z", - "updated_at": "2023-01-14T21:54:26Z", + "updated_at": "2023-03-23T04:19:54Z", "pushed_at": "2022-10-02T11:55:35Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 15, + "watchers": 16, "score": 0 }, { @@ -199,10 +199,10 @@ "description": null, "fork": false, "created_at": "2022-10-14T17:01:17Z", - "updated_at": "2022-11-01T16:13:17Z", + "updated_at": "2023-03-23T04:20:35Z", "pushed_at": "2022-10-15T09:10:41Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -211,7 +211,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2022/CVE-2022-41218.json b/2022/CVE-2022-41218.json index 94fd43ce05..82559d0cc6 100644 --- a/2022/CVE-2022-41218.json +++ b/2022/CVE-2022-41218.json @@ -13,19 +13,19 @@ "description": "Vulnerability Details for CVE-2022-41218", "fork": false, "created_at": "2022-09-30T07:12:23Z", - "updated_at": "2023-03-22T21:55:50Z", + "updated_at": "2023-03-23T04:55:28Z", "pushed_at": "2022-10-09T05:26:03Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, - "watchers": 18, + "forks": 7, + "watchers": 24, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-42475.json b/2022/CVE-2022-42475.json index 60368edf2b..d15257f254 100644 --- a/2022/CVE-2022-42475.json +++ b/2022/CVE-2022-42475.json @@ -46,10 +46,10 @@ "description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon", "fork": false, "created_at": "2023-02-23T10:04:58Z", - "updated_at": "2023-03-22T13:01:41Z", + "updated_at": "2023-03-23T04:32:01Z", "pushed_at": "2023-03-14T08:41:51Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -58,7 +58,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 72, + "watchers": 73, "score": 0 }, { diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index 3b6936a426..e138c64875 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -13,10 +13,10 @@ "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator", "fork": false, "created_at": "2023-02-02T15:34:28Z", - "updated_at": "2023-03-22T02:38:48Z", + "updated_at": "2023-03-23T02:28:07Z", "pushed_at": "2023-02-02T16:53:37Z", - "stargazers_count": 217, - "watchers_count": 217, + "stargazers_count": 218, + "watchers_count": 218, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 217, + "watchers": 218, "score": 0 }, { @@ -281,10 +281,10 @@ "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit", "fork": false, "created_at": "2023-02-13T02:00:51Z", - "updated_at": "2023-03-22T13:41:58Z", + "updated_at": "2023-03-23T01:15:57Z", "pushed_at": "2023-03-22T11:33:44Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -306,7 +306,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 }, { @@ -352,10 +352,10 @@ "description": null, "fork": false, "created_at": "2023-03-22T21:26:20Z", - "updated_at": "2023-03-22T21:26:20Z", + "updated_at": "2023-03-23T05:43:33Z", "pushed_at": "2023-03-22T21:26:41Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -364,7 +364,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-44877.json b/2022/CVE-2022-44877.json index b0aae36b19..74ff483f00 100644 --- a/2022/CVE-2022-44877.json +++ b/2022/CVE-2022-44877.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-01-05T17:29:10Z", - "updated_at": "2023-03-09T07:29:56Z", + "updated_at": "2023-03-23T04:19:43Z", "pushed_at": "2023-01-05T17:40:18Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 101, + "watchers_count": 101, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 100, + "watchers": 101, "score": 0 }, { diff --git a/2022/CVE-2022-45025.json b/2022/CVE-2022-45025.json index be56b192f9..75c2762800 100644 --- a/2022/CVE-2022-45025.json +++ b/2022/CVE-2022-45025.json @@ -13,10 +13,10 @@ "description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)", "fork": false, "created_at": "2022-12-09T22:48:38Z", - "updated_at": "2023-02-23T12:25:38Z", + "updated_at": "2023-03-23T02:55:51Z", "pushed_at": "2022-12-11T13:37:22Z", - "stargazers_count": 88, - "watchers_count": 88, + "stargazers_count": 87, + "watchers_count": 87, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 18, - "watchers": 88, + "watchers": 87, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json index 3738f805cb..4933905e3f 100644 --- a/2022/CVE-2022-46463.json +++ b/2022/CVE-2022-46463.json @@ -42,10 +42,10 @@ "description": "CVE-2022-46463(Harbor 未授权)", "fork": false, "created_at": "2023-01-17T14:58:14Z", - "updated_at": "2023-03-10T06:55:23Z", + "updated_at": "2023-03-23T01:47:52Z", "pushed_at": "2023-01-19T12:47:21Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 12, + "watchers": 13, "score": 0 }, { diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 80cab36168..a8ac45e903 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -71,10 +71,10 @@ "description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.", "fork": false, "created_at": "2022-12-26T06:56:35Z", - "updated_at": "2023-03-22T14:40:25Z", + "updated_at": "2023-03-23T06:01:04Z", "pushed_at": "2023-02-21T04:16:19Z", - "stargazers_count": 777, - "watchers_count": 777, + "stargazers_count": 778, + "watchers_count": 778, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 777, + "watchers": 778, "score": 0 }, { diff --git a/2023/CVE-2023-21036.json b/2023/CVE-2023-21036.json index 68fa0c35bc..7f341b6781 100644 --- a/2023/CVE-2023-21036.json +++ b/2023/CVE-2023-21036.json @@ -39,13 +39,13 @@ "html_url": "https:\/\/github.com\/infobyte" }, "html_url": "https:\/\/github.com\/infobyte\/CVE-2023-21036", - "description": "Detection an sanitization for Acropalypse Now - CVE-2023-21036", + "description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036", "fork": false, "created_at": "2023-03-22T14:59:42Z", - "updated_at": "2023-03-23T00:27:58Z", + "updated_at": "2023-03-23T04:28:15Z", "pushed_at": "2023-03-22T19:19:26Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 10, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21716.json b/2023/CVE-2023-21716.json index c8f49a3b70..aff488716e 100644 --- a/2023/CVE-2023-21716.json +++ b/2023/CVE-2023-21716.json @@ -71,10 +71,10 @@ "description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).", "fork": false, "created_at": "2023-03-08T06:20:45Z", - "updated_at": "2023-03-21T12:38:03Z", + "updated_at": "2023-03-23T04:35:27Z", "pushed_at": "2023-03-08T06:21:58Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 53, + "watchers": 54, "score": 0 }, { diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index c75d514b8a..3cc809da93 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,10 +13,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2023-03-22T12:55:45Z", + "updated_at": "2023-03-23T01:27:35Z", "pushed_at": "2023-03-10T08:58:44Z", - "stargazers_count": 322, - "watchers_count": 322, + "stargazers_count": 323, + "watchers_count": 323, "has_discussions": false, "forks_count": 121, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 121, - "watchers": 322, + "watchers": 323, "score": 0 }, { @@ -71,10 +71,10 @@ "description": "Using CVE-2023-21768 to manual map kernel mode driver ", "fork": false, "created_at": "2023-03-10T19:08:28Z", - "updated_at": "2023-03-21T16:18:45Z", + "updated_at": "2023-03-23T02:31:50Z", "pushed_at": "2023-03-10T20:16:53Z", - "stargazers_count": 91, - "watchers_count": 91, + "stargazers_count": 92, + "watchers_count": 92, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -91,7 +91,7 @@ ], "visibility": "public", "forks": 28, - "watchers": 91, + "watchers": 92, "score": 0 }, { @@ -166,10 +166,10 @@ "description": "CVE-2023-21768 Windows 11 22H2 系统本地提权 POC", "fork": false, "created_at": "2023-03-22T07:24:36Z", - "updated_at": "2023-03-22T16:12:37Z", + "updated_at": "2023-03-23T02:42:13Z", "pushed_at": "2023-03-22T07:34:53Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -178,7 +178,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 06f27976bf..70de4aa364 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -13,10 +13,10 @@ "description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)", "fork": false, "created_at": "2023-02-13T03:42:27Z", - "updated_at": "2023-03-20T14:32:11Z", + "updated_at": "2023-03-23T03:55:00Z", "pushed_at": "2023-03-03T03:30:04Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 474, + "watchers_count": 474, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 69, - "watchers": 473, + "watchers": 474, "score": 0 }, { diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index ed82a3b392..3ea672a980 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -129,10 +129,10 @@ "description": "Simple PoC in PowerShell for CVE-2023-23397", "fork": false, "created_at": "2023-03-16T19:10:37Z", - "updated_at": "2023-03-22T12:02:43Z", + "updated_at": "2023-03-23T03:17:42Z", "pushed_at": "2023-03-16T19:29:49Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -151,7 +151,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 14, + "watchers": 16, "score": 0 }, { @@ -173,13 +173,13 @@ "stargazers_count": 239, "watchers_count": 239, "has_discussions": false, - "forks_count": 35, + "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 35, + "forks": 36, "watchers": 239, "score": 0 }, @@ -371,12 +371,12 @@ "description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.", "fork": false, "created_at": "2023-03-20T16:31:54Z", - "updated_at": "2023-03-22T23:36:32Z", + "updated_at": "2023-03-23T05:40:30Z", "pushed_at": "2023-03-20T16:55:25Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -384,8 +384,8 @@ "cve-2023-23397" ], "visibility": "public", - "forks": 3, - "watchers": 23, + "forks": 5, + "watchers": 26, "score": 0 }, { diff --git a/2023/CVE-2023-23638.json b/2023/CVE-2023-23638.json index 1d26909167..b7d842bbdc 100644 --- a/2023/CVE-2023-23638.json +++ b/2023/CVE-2023-23638.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-03-22T11:23:44Z", - "updated_at": "2023-03-22T11:41:06Z", + "updated_at": "2023-03-23T02:18:12Z", "pushed_at": "2023-03-22T11:41:03Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index 5e943a6bc4..d4f4a34530 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -71,10 +71,10 @@ "description": "OpenSSH 9.1 vulnerability mass scan and exploit", "fork": false, "created_at": "2023-02-22T19:44:08Z", - "updated_at": "2023-03-21T10:57:03Z", + "updated_at": "2023-03-23T01:54:37Z", "pushed_at": "2023-03-07T10:43:36Z", - "stargazers_count": 86, - "watchers_count": 86, + "stargazers_count": 87, + "watchers_count": 87, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 86, + "watchers": 87, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-27326.json b/2023/CVE-2023-27326.json index a80f35d952..334f7c4b7b 100644 --- a/2023/CVE-2023-27326.json +++ b/2023/CVE-2023-27326.json @@ -13,19 +13,19 @@ "description": "VM Escape for Parallels Desktop <18.1.1", "fork": false, "created_at": "2023-03-20T11:47:54Z", - "updated_at": "2023-03-22T21:59:29Z", + "updated_at": "2023-03-23T05:55:32Z", "pushed_at": "2023-03-20T12:51:29Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 122, + "watchers_count": 122, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 13, - "watchers": 116, + "forks": 14, + "watchers": 122, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index c7ed4b60c3..82daad5080 100644 --- a/README.md +++ b/README.md @@ -242,7 +242,12 @@ A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticate ### CVE-2023-23138 - [OmarAtallahh/CVE-2023-23138](https://github.com/OmarAtallahh/CVE-2023-23138) -### CVE-2023-23192 +### CVE-2023-23192 (2023-03-22) + + +IS Decisions UserLock MFA 11.01 is vulnerable to authentication bypass using scheduled task. + + - [pinarsadioglu/CVE-2023-23192](https://github.com/pinarsadioglu/CVE-2023-23192) - [Penkyzduyi/CVE-2023-23192](https://github.com/Penkyzduyi/CVE-2023-23192) @@ -732,6 +737,8 @@ A flaw was found in the way the "flags" member of the new pipe buffer - [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher) - [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape) - [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits) +- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection) +- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe) - [eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits) - [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847) - [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape) @@ -984,6 +991,8 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5. - [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC) - [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388) - [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388) +- [Luchoane/CVE-2022-1388_refresh](https://github.com/Luchoane/CVE-2022-1388_refresh) +- [jbharucha05/CVE-2022-1388](https://github.com/jbharucha05/CVE-2022-1388) - [On-Cyber-War/CVE-2022-1388](https://github.com/On-Cyber-War/CVE-2022-1388) - [OnCyberWar/CVE-2022-1388](https://github.com/OnCyberWar/CVE-2022-1388) - [revanmalang/CVE-2022-1388](https://github.com/revanmalang/CVE-2022-1388) @@ -1374,6 +1383,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther - [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007) - [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007) +### CVE-2022-20124 (2022-06-15) + + +In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036 + + +- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-) + ### CVE-2022-20126 (2022-06-15) @@ -1385,6 +1402,14 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo ### CVE-2022-20128 - [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128) +### CVE-2022-20130 (2022-06-15) + + +In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979 + + +- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130) + ### CVE-2022-20133 (2022-06-15) @@ -1393,6 +1418,14 @@ In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of - [nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133](https://github.com/nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133) +### CVE-2022-20135 (2022-06-15) + + +In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465 + + +- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-) + ### CVE-2022-20138 (2022-06-15) @@ -1409,6 +1442,7 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962 +- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142) - [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142) ### CVE-2022-20186 (2022-06-15) @@ -1599,6 +1633,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o - [thack1/CVE-2022-21449](https://github.com/thack1/CVE-2022-21449) - [Damok82/SignChecker](https://github.com/Damok82/SignChecker) - [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449) +- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC) - [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase) - [davwwwx/CVE-2022-21449](https://github.com/davwwwx/CVE-2022-21449) @@ -2048,6 +2083,8 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution - [badboy-sft/CVE-2022-22954](https://github.com/badboy-sft/CVE-2022-22954) - [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954) - [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954) +- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954) +- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC) - [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller) - [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_) - [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954) @@ -2149,6 +2186,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t - [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965) - [cxzero/CVE-2022-22965-spring4shell](https://github.com/cxzero/CVE-2022-22965-spring4shell) - [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan) +- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965) - [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965) - [iloveflag/Fast-CVE-2022-22965](https://github.com/iloveflag/Fast-CVE-2022-22965) - [ClemExp/CVE-2022-22965-PoC](https://github.com/ClemExp/CVE-2022-22965-PoC) @@ -2534,6 +2572,14 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System - [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181) +### CVE-2022-24342 (2022-02-25) + + +In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible. + + +- [yuriisanin/CVE-2022-24342](https://github.com/yuriisanin/CVE-2022-24342) + ### CVE-2022-24348 (2022-02-04) @@ -2652,6 +2698,7 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d - [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit) - [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-) +- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706) - [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit) ### CVE-2022-24707 (2022-02-23) @@ -3057,7 +3104,9 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134) - [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134) - [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU) +- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134) - [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134) +- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134) - [f4yd4-s3c/cve-2022-26134](https://github.com/f4yd4-s3c/cve-2022-26134) - [coskper-papa/CVE-2022-26134](https://github.com/coskper-papa/CVE-2022-26134) - [p4b3l1t0/confusploit](https://github.com/p4b3l1t0/confusploit) @@ -3183,6 +3232,22 @@ A use after free issue was addressed with improved memory management. This issue - [Dylbin/flow_divert](https://github.com/Dylbin/flow_divert) +### CVE-2022-26763 (2022-05-26) + + +An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges. + + +- [zhuowei/PCICrash](https://github.com/zhuowei/PCICrash) + +### CVE-2022-26766 (2022-05-26) + + +A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation. + + +- [zhuowei/CoreTrustDemo](https://github.com/zhuowei/CoreTrustDemo) + ### CVE-2022-26809 (2022-04-15) @@ -3431,6 +3496,7 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe - [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219) +- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219) - [aeifkz/CVE-2022-28219-Like](https://github.com/aeifkz/CVE-2022-28219-Like) ### CVE-2022-28281 (2022-12-22) @@ -3705,6 +3771,8 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code - [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464) - [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464) - [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464) +- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464) +- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass) - [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464) - [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464) - [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-) @@ -3811,6 +3879,7 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20 - [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885) +- [iveresk/CVE-2022-29885](https://github.com/iveresk/CVE-2022-29885) ### CVE-2022-29932 (2022-05-11) @@ -3947,7 +4016,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi - [Cerebrovinny/follina-CVE-2022-30190](https://github.com/Cerebrovinny/follina-CVE-2022-30190) - [ethicalblue/Follina-CVE-2022-30190-Sample](https://github.com/ethicalblue/Follina-CVE-2022-30190-Sample) - [Lucaskrell/go_follina](https://github.com/Lucaskrell/go_follina) -- [Gra3s/CVE-2022-30190_PowerPoint](https://github.com/Gra3s/CVE-2022-30190_PowerPoint) +- [Gra3s/CVE-2022-30190_EXP_PowerPoint](https://github.com/Gra3s/CVE-2022-30190_EXP_PowerPoint) - [EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-](https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-) - [jeffreybxu/five-nights-at-follina-s](https://github.com/jeffreybxu/five-nights-at-follina-s) - [winstxnhdw/CVE-2022-30190](https://github.com/winstxnhdw/CVE-2022-30190) @@ -3990,6 +4059,7 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected. +- [TheL1ghtVn/CVE-2022-30333-PoC](https://github.com/TheL1ghtVn/CVE-2022-30333-PoC) - [rbowes-r7/unrar-cve-2022-30333-poc](https://github.com/rbowes-r7/unrar-cve-2022-30333-poc) - [J0hnbX/CVE-2022-30333](https://github.com/J0hnbX/CVE-2022-30333) - [aslitsecurity/Zimbra-CVE-2022-30333](https://github.com/aslitsecurity/Zimbra-CVE-2022-30333) @@ -4100,6 +4170,14 @@ liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandl - [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks) +### CVE-2022-30594 (2022-05-12) + + +The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. + + +- [nidhi7598/linux-4.19.72_CVE-2022-30594](https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594) + ### CVE-2022-30600 (2022-05-18) @@ -4127,6 +4205,22 @@ Gitea before 1.16.7 does not escape git fetch remote. - [wuhan005/CVE-2022-30781](https://github.com/wuhan005/CVE-2022-30781) +### CVE-2022-30887 (2022-05-20) + + +Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file. + + +- [MuallimNaci/CVE-2022-30887](https://github.com/MuallimNaci/CVE-2022-30887) + +### CVE-2022-30929 (2022-07-06) + + +Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper. + + +- [nanaao/CVE-2022-30929](https://github.com/nanaao/CVE-2022-30929) + ### CVE-2022-31007 (2022-05-31)