diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index 0024be7b1c..f48836013f 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -13,10 +13,10 @@ "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", "fork": false, "created_at": "2013-09-22T21:20:31Z", - "updated_at": "2022-02-08T10:30:35Z", + "updated_at": "2022-02-10T16:01:00Z", "pushed_at": "2017-04-24T14:16:56Z", - "stargazers_count": 333, - "watchers_count": 333, + "stargazers_count": 334, + "watchers_count": 334, "forks_count": 102, "allow_forking": true, "is_template": false, @@ -25,7 +25,7 @@ ], "visibility": "public", "forks": 102, - "watchers": 333, + "watchers": 334, "score": 0 }, { diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 07c1f323d4..d90d5d9a88 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-02-10T00:55:25Z", + "updated_at": "2022-02-10T13:15:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1282, - "watchers_count": 1282, + "stargazers_count": 1284, + "watchers_count": 1284, "forks_count": 281, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 281, - "watchers": 1282, + "watchers": 1284, "score": 0 }, { diff --git a/2015/CVE-2015-3306.json b/2015/CVE-2015-3306.json index 23244fc515..20e817790d 100644 --- a/2015/CVE-2015-3306.json +++ b/2015/CVE-2015-3306.json @@ -17,12 +17,12 @@ "pushed_at": "2015-04-22T12:54:22Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 2, "score": 0 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index e6b768cf6d..2d0875d13b 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-02-10T00:55:25Z", + "updated_at": "2022-02-10T13:15:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1282, - "watchers_count": 1282, + "stargazers_count": 1284, + "watchers_count": 1284, "forks_count": 281, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 281, - "watchers": 1282, + "watchers": 1284, "score": 0 }, { diff --git a/2017/CVE-2017-1000117.json b/2017/CVE-2017-1000117.json index cb0b2dd32f..b753152dd7 100644 --- a/2017/CVE-2017-1000117.json +++ b/2017/CVE-2017-1000117.json @@ -269,33 +269,6 @@ "watchers": 0, "score": 0 }, - { - "id": 100437085, - "name": "CVE-2017-1000117", - "full_name": "bells17\/CVE-2017-1000117", - "owner": { - "login": "bells17", - "id": 2158863, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2158863?v=4", - "html_url": "https:\/\/github.com\/bells17" - }, - "html_url": "https:\/\/github.com\/bells17\/CVE-2017-1000117", - "description": "https:\/\/github.com\/greymd\/CVE-2017-1000117 の勉強用", - "fork": false, - "created_at": "2017-08-16T02:04:02Z", - "updated_at": "2017-10-13T17:48:19Z", - "pushed_at": "2017-08-16T09:35:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 100437171, "name": "CVE-2017-1000117", diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 2832d39282..e7df75aa0c 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-02-10T00:55:25Z", + "updated_at": "2022-02-10T13:15:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1282, - "watchers_count": 1282, + "stargazers_count": 1284, + "watchers_count": 1284, "forks_count": 281, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 281, - "watchers": 1282, + "watchers": 1284, "score": 0 }, { diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index 692cd0223e..6d3aa124a6 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -207,17 +207,17 @@ "description": "iis6 exploit 2017 CVE-2017-7269", "fork": false, "created_at": "2017-04-05T23:21:12Z", - "updated_at": "2022-02-09T11:41:19Z", + "updated_at": "2022-02-10T17:43:29Z", "pushed_at": "2017-04-05T23:29:03Z", - "stargazers_count": 50, - "watchers_count": 50, - "forks_count": 50, + "stargazers_count": 51, + "watchers_count": 51, + "forks_count": 51, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 50, - "watchers": 50, + "forks": 51, + "watchers": 51, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index b68aac95b9..16be72c799 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -67,11 +67,11 @@ "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)", "fork": false, "created_at": "2017-05-26T00:58:25Z", - "updated_at": "2022-01-25T13:18:49Z", + "updated_at": "2022-02-10T12:59:33Z", "pushed_at": "2017-10-31T16:20:29Z", - "stargazers_count": 298, - "watchers_count": 298, - "forks_count": 99, + "stargazers_count": 299, + "watchers_count": 299, + "forks_count": 100, "allow_forking": true, "is_template": false, "topics": [ @@ -82,8 +82,8 @@ "sambacry" ], "visibility": "public", - "forks": 99, - "watchers": 298, + "forks": 100, + "watchers": 299, "score": 0 }, { diff --git a/2018/CVE-2018-11776.json b/2018/CVE-2018-11776.json index 02bb45ca64..21eea92966 100644 --- a/2018/CVE-2018-11776.json +++ b/2018/CVE-2018-11776.json @@ -445,17 +445,17 @@ "description": "Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.", "fork": false, "created_at": "2019-10-10T13:09:50Z", - "updated_at": "2021-12-29T12:20:55Z", + "updated_at": "2022-02-10T13:13:45Z", "pushed_at": "2020-07-30T21:35:38Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 4, + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 10, + "forks": 5, + "watchers": 11, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 1e4038795d..4a4a76b81c 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-02-10T00:55:25Z", + "updated_at": "2022-02-10T13:15:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1282, - "watchers_count": 1282, + "stargazers_count": 1284, + "watchers_count": 1284, "forks_count": 281, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 281, - "watchers": 1282, + "watchers": 1284, "score": 0 }, { diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 8a1e991399..7bd5fd5bb1 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -40,10 +40,10 @@ "description": "CVE-2018-8120 Windows LPE exploit", "fork": false, "created_at": "2018-05-19T02:43:15Z", - "updated_at": "2022-01-28T19:25:17Z", + "updated_at": "2022-02-10T15:08:14Z", "pushed_at": "2018-05-30T13:09:54Z", - "stargazers_count": 471, - "watchers_count": 471, + "stargazers_count": 472, + "watchers_count": 472, "forks_count": 205, "allow_forking": true, "is_template": false, @@ -54,7 +54,7 @@ ], "visibility": "public", "forks": 205, - "watchers": 471, + "watchers": 472, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 96e1f113d4..517c889fe0 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,10 +40,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-02-10T05:40:35Z", + "updated_at": "2022-02-10T14:53:23Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3155, - "watchers_count": 3155, + "stargazers_count": 3156, + "watchers_count": 3156, "forks_count": 938, "allow_forking": true, "is_template": false, @@ -70,7 +70,7 @@ ], "visibility": "public", "forks": 938, - "watchers": 3155, + "watchers": 3156, "score": 0 }, { diff --git a/2019/CVE-2019-17662.json b/2019/CVE-2019-17662.json index 4d4c1bb5f3..eca64c879c 100644 --- a/2019/CVE-2019-17662.json +++ b/2019/CVE-2019-17662.json @@ -13,17 +13,17 @@ "description": "Exploit code for CVE-2019-17662", "fork": false, "created_at": "2021-08-31T19:30:09Z", - "updated_at": "2021-12-09T11:55:45Z", + "updated_at": "2022-02-10T17:45:30Z", "pushed_at": "2021-09-12T14:43:25Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 3570684c8b..6e3575f4f4 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-02-10T00:55:25Z", + "updated_at": "2022-02-10T13:15:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1282, - "watchers_count": 1282, + "stargazers_count": 1284, + "watchers_count": 1284, "forks_count": 281, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 281, - "watchers": 1282, + "watchers": 1284, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index adad6c8c8e..db24b41e2c 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-02-10T05:40:35Z", + "updated_at": "2022-02-10T14:53:23Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3155, - "watchers_count": 3155, + "stargazers_count": 3156, + "watchers_count": 3156, "forks_count": 938, "allow_forking": true, "is_template": false, @@ -43,7 +43,7 @@ ], "visibility": "public", "forks": 938, - "watchers": 3155, + "watchers": 3156, "score": 0 }, { diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json index ed3d72efe3..a365ffcace 100644 --- a/2020/CVE-2020-17087.json +++ b/2020/CVE-2020-17087.json @@ -67,17 +67,17 @@ "description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow", "fork": false, "created_at": "2021-07-02T16:03:16Z", - "updated_at": "2022-01-07T13:00:44Z", + "updated_at": "2022-02-10T13:34:04Z", "pushed_at": "2021-08-15T16:41:05Z", - "stargazers_count": 119, - "watchers_count": 119, + "stargazers_count": 120, + "watchers_count": 120, "forks_count": 37, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 37, - "watchers": 119, + "watchers": 120, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 41bd96b040..f48ad5b98f 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-02-10T00:55:25Z", + "updated_at": "2022-02-10T13:15:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1282, - "watchers_count": 1282, + "stargazers_count": 1284, + "watchers_count": 1284, "forks_count": 281, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 281, - "watchers": 1282, + "watchers": 1284, "score": 0 }, { diff --git a/2021/CVE-2021-0326.json b/2021/CVE-2021-0326.json index 4df3e60ad1..21ce465c58 100644 --- a/2021/CVE-2021-0326.json +++ b/2021/CVE-2021-0326.json @@ -13,17 +13,17 @@ "description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326", "fork": false, "created_at": "2022-01-17T21:35:19Z", - "updated_at": "2022-02-10T11:52:51Z", + "updated_at": "2022-02-10T18:08:13Z", "pushed_at": "2022-01-26T07:00:31Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 2, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 6, + "forks": 4, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index fbfd01fe44..8f85f63102 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -84,10 +84,10 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2022-02-06T15:27:17Z", + "updated_at": "2022-02-10T17:29:49Z", "pushed_at": "2021-12-30T12:26:11Z", - "stargazers_count": 341, - "watchers_count": 341, + "stargazers_count": 342, + "watchers_count": 342, "forks_count": 132, "allow_forking": true, "is_template": false, @@ -96,7 +96,7 @@ ], "visibility": "public", "forks": 132, - "watchers": 341, + "watchers": 342, "score": 0 }, { diff --git a/2021/CVE-2021-24084.json b/2021/CVE-2021-24084.json index b58f7e1cf7..206b7764dc 100644 --- a/2021/CVE-2021-24084.json +++ b/2021/CVE-2021-24084.json @@ -13,17 +13,17 @@ "description": "Windows MDM LPE", "fork": false, "created_at": "2021-11-27T00:37:07Z", - "updated_at": "2021-12-14T03:53:35Z", + "updated_at": "2022-02-10T13:34:38Z", "pushed_at": "2021-11-27T00:38:33Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, - "watchers": 8, + "watchers": 9, "score": 0 }, { diff --git a/2021/CVE-2021-25741.json b/2021/CVE-2021-25741.json index 45c6f3c849..c1f7f44704 100644 --- a/2021/CVE-2021-25741.json +++ b/2021/CVE-2021-25741.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2021-25741 vulnerability", "fork": false, "created_at": "2022-01-19T14:05:20Z", - "updated_at": "2022-01-28T15:21:29Z", + "updated_at": "2022-02-10T16:09:08Z", "pushed_at": "2022-01-19T19:15:36Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 12, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 3e3c8b8fdd..59cc85e406 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -1131,17 +1131,17 @@ "description": "Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)", "fork": false, "created_at": "2021-12-04T22:38:30Z", - "updated_at": "2021-12-05T20:05:20Z", - "pushed_at": "2022-02-10T07:51:54Z", - "stargazers_count": 4, - "watchers_count": 4, + "updated_at": "2022-02-10T15:36:56Z", + "pushed_at": "2022-02-10T15:20:42Z", + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 851a700ed1..8f1f346cd2 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1108,12 +1108,12 @@ "pushed_at": "2022-01-03T15:07:26Z", "stargazers_count": 134, "watchers_count": 134, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 134, "score": 0 }, diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 066664d4e7..2a3da7f689 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -130,17 +130,17 @@ "description": null, "fork": false, "created_at": "2021-06-14T20:08:20Z", - "updated_at": "2022-02-10T09:23:03Z", + "updated_at": "2022-02-10T16:11:32Z", "pushed_at": "2021-08-31T16:59:09Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 6, + "watchers": 7, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 32ce820a61..a47fbeb521 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -73,17 +73,17 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2022-02-10T11:56:40Z", + "updated_at": "2022-02-10T13:00:12Z", "pushed_at": "2022-01-30T14:22:23Z", - "stargazers_count": 1221, - "watchers_count": 1221, + "stargazers_count": 1222, + "watchers_count": 1222, "forks_count": 355, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 355, - "watchers": 1221, + "watchers": 1222, "score": 0 }, { @@ -154,10 +154,10 @@ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)", "fork": false, "created_at": "2022-01-26T00:56:36Z", - "updated_at": "2022-02-10T11:30:46Z", + "updated_at": "2022-02-10T17:07:21Z", "pushed_at": "2022-01-29T06:22:16Z", - "stargazers_count": 729, - "watchers_count": 729, + "stargazers_count": 731, + "watchers_count": 731, "forks_count": 232, "allow_forking": true, "is_template": false, @@ -168,7 +168,7 @@ ], "visibility": "public", "forks": 232, - "watchers": 729, + "watchers": 731, "score": 0 }, { @@ -354,17 +354,17 @@ "description": "Exploit for CVE-2021-4034", "fork": false, "created_at": "2022-01-26T03:33:47Z", - "updated_at": "2022-02-04T01:08:01Z", + "updated_at": "2022-02-10T15:50:25Z", "pushed_at": "2022-01-27T11:57:05Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 15, - "watchers": 92, + "watchers": 93, "score": 0 }, { @@ -902,10 +902,10 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2022-02-10T07:33:49Z", + "updated_at": "2022-02-10T14:57:02Z", "pushed_at": "2022-01-27T20:09:24Z", - "stargazers_count": 408, - "watchers_count": 408, + "stargazers_count": 409, + "watchers_count": 409, "forks_count": 67, "allow_forking": true, "is_template": false, @@ -914,7 +914,7 @@ ], "visibility": "public", "forks": 67, - "watchers": 408, + "watchers": 409, "score": 0 }, { @@ -1228,17 +1228,17 @@ "description": "Python exploit code for CVE-2021-4034 (pwnkit)", "fork": false, "created_at": "2022-01-26T17:53:16Z", - "updated_at": "2022-02-09T06:16:10Z", + "updated_at": "2022-02-10T18:13:22Z", "pushed_at": "2022-01-28T00:29:15Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 13, - "watchers": 40, + "watchers": 42, "score": 0 }, { @@ -1722,7 +1722,7 @@ "fork": false, "created_at": "2022-01-27T10:26:46Z", "updated_at": "2022-01-27T13:44:20Z", - "pushed_at": "2022-02-10T10:55:04Z", + "pushed_at": "2022-02-10T18:13:40Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 4573c2db42..6f79a9ca5b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -3434,17 +3434,17 @@ "description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload", "fork": false, "created_at": "2021-12-13T01:55:51Z", - "updated_at": "2022-02-10T06:56:39Z", + "updated_at": "2022-02-10T12:17:46Z", "pushed_at": "2021-12-13T09:18:19Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 15, - "watchers": 32, + "watchers": 33, "score": 0 }, { @@ -3542,17 +3542,17 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-02-10T08:50:38Z", + "updated_at": "2022-02-10T14:51:13Z", "pushed_at": "2022-02-06T03:18:29Z", - "stargazers_count": 2709, - "watchers_count": 2709, + "stargazers_count": 2710, + "watchers_count": 2710, "forks_count": 654, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 654, - "watchers": 2709, + "watchers": 2710, "score": 0 }, { @@ -4726,7 +4726,7 @@ "pushed_at": "2021-12-17T17:23:57Z", "stargazers_count": 29, "watchers_count": 29, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [ @@ -4738,7 +4738,7 @@ "vulnerability" ], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 29, "score": 0 }, @@ -5965,12 +5965,12 @@ "pushed_at": "2022-02-03T20:02:09Z", "stargazers_count": 336, "watchers_count": 336, - "forks_count": 93, + "forks_count": 94, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 93, + "forks": 94, "watchers": 336, "score": 0 }, @@ -9462,12 +9462,12 @@ "pushed_at": "2021-12-25T11:26:49Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 }, diff --git a/2022/CVE-2022-0185.json b/2022/CVE-2022-0185.json index e8ec76981f..1d478b5506 100644 --- a/2022/CVE-2022-0185.json +++ b/2022/CVE-2022-0185.json @@ -13,17 +13,17 @@ "description": "CVE-2022-0185", "fork": false, "created_at": "2022-01-19T06:19:38Z", - "updated_at": "2022-02-10T10:04:27Z", + "updated_at": "2022-02-10T12:40:27Z", "pushed_at": "2022-01-25T17:00:16Z", - "stargazers_count": 259, - "watchers_count": 259, + "stargazers_count": 260, + "watchers_count": 260, "forks_count": 31, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 31, - "watchers": 259, + "watchers": 260, "score": 0 }, { diff --git a/2022/CVE-2022-20699.json b/2022/CVE-2022-20699.json index 602b62727f..03c1371be7 100644 --- a/2022/CVE-2022-20699.json +++ b/2022/CVE-2022-20699.json @@ -13,17 +13,44 @@ "description": "Cisco Anyconnect VPN unauth RCE (rwx stack)", "fork": false, "created_at": "2022-02-07T15:53:21Z", - "updated_at": "2022-02-10T12:09:39Z", + "updated_at": "2022-02-10T17:35:24Z", "pushed_at": "2022-02-07T15:55:03Z", - "stargazers_count": 63, - "watchers_count": 63, - "forks_count": 16, + "stargazers_count": 70, + "watchers_count": 70, + "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 16, - "watchers": 63, + "forks": 19, + "watchers": 70, + "score": 0 + }, + { + "id": 457817909, + "name": "CVE-2022-20699", + "full_name": "puckiestyle\/CVE-2022-20699", + "owner": { + "login": "puckiestyle", + "id": 57447087, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", + "html_url": "https:\/\/github.com\/puckiestyle" + }, + "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2022-20699", + "description": null, + "fork": false, + "created_at": "2022-02-10T14:40:25Z", + "updated_at": "2022-02-10T14:40:40Z", + "pushed_at": "2022-02-10T14:40:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index 00822113cc..9e5ad7e719 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -13,17 +13,17 @@ "description": "win32k LPE ", "fork": false, "created_at": "2022-01-27T03:44:10Z", - "updated_at": "2022-02-10T09:24:02Z", + "updated_at": "2022-02-10T12:41:53Z", "pushed_at": "2022-01-27T04:18:18Z", - "stargazers_count": 352, - "watchers_count": 352, + "stargazers_count": 353, + "watchers_count": 353, "forks_count": 96, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 96, - "watchers": 352, + "watchers": 353, "score": 0 }, { diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 1c588967eb..4a8dc7157d 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,11 +13,11 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-02-10T12:15:24Z", + "updated_at": "2022-02-10T17:23:52Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 304, - "watchers_count": 304, - "forks_count": 52, + "stargazers_count": 314, + "watchers_count": 314, + "forks_count": 54, "allow_forking": true, "is_template": false, "topics": [ @@ -25,8 +25,8 @@ "cve-2022-22718" ], "visibility": "public", - "forks": 52, - "watchers": 304, + "forks": 54, + "watchers": 314, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23808.json b/2022/CVE-2022-23808.json new file mode 100644 index 0000000000..671ccb0a28 --- /dev/null +++ b/2022/CVE-2022-23808.json @@ -0,0 +1,47 @@ +[ + { + "id": 454474679, + "name": "CVE-2022-23808", + "full_name": "dipakpanchal456\/CVE-2022-23808", + "owner": { + "login": "dipakpanchal456", + "id": 31427462, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31427462?v=4", + "html_url": "https:\/\/github.com\/dipakpanchal456" + }, + "html_url": "https:\/\/github.com\/dipakpanchal456\/CVE-2022-23808", + "description": "phpMyAdmin XSS ", + "fork": false, + "created_at": "2022-02-01T17:02:03Z", + "updated_at": "2022-02-10T18:03:12Z", + "pushed_at": "2022-02-03T16:21:01Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [ + "bugbounty", + "cross-site-scripting", + "database", + "exploit", + "exploitation", + "hacking", + "infosec", + "owasp", + "owasp-top-10", + "pentesting", + "phpmyadmin", + "poc", + "redteam", + "redteaming", + "vulnerability", + "xss", + "zeroday" + ], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24348.json b/2022/CVE-2022-24348.json index 95d8813731..8ebb30489d 100644 --- a/2022/CVE-2022-24348.json +++ b/2022/CVE-2022-24348.json @@ -25,32 +25,5 @@ "forks": 1, "watchers": 0, "score": 0 - }, - { - "id": 457721752, - "name": "helm-sample", - "full_name": "mochizuki875\/helm-sample", - "owner": { - "login": "mochizuki875", - "id": 37737691, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37737691?v=4", - "html_url": "https:\/\/github.com\/mochizuki875" - }, - "html_url": "https:\/\/github.com\/mochizuki875\/helm-sample", - "description": "CVE-2022-24348 Test", - "fork": false, - "created_at": "2022-02-10T09:55:41Z", - "updated_at": "2022-02-10T09:58:20Z", - "pushed_at": "2022-02-10T10:54:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index cefc05c9c5..8d94b98f81 100644 --- a/README.md +++ b/README.md @@ -31,8 +31,14 @@ A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was - [numanturle/CVE-2022-0332](https://github.com/numanturle/CVE-2022-0332) -### CVE-2022-20699 +### CVE-2022-20699 (-) + + +Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. + + - [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699) +- [puckiestyle/CVE-2022-20699](https://github.com/puckiestyle/CVE-2022-20699) ### CVE-2022-21241 (2022-02-08) @@ -187,6 +193,14 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta - [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378) +### CVE-2022-23808 (2022-01-21) + + +An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection. + + +- [dipakpanchal456/CVE-2022-23808](https://github.com/dipakpanchal456/CVE-2022-23808) + ### CVE-2022-23967 (2022-01-26) @@ -210,7 +224,6 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t - [jkroepke/CVE-2022-24348-2](https://github.com/jkroepke/CVE-2022-24348-2) -- [mochizuki875/helm-sample](https://github.com/mochizuki875/helm-sample) ### CVE-2022-24693 - [lukejenkins/CVE-2022-24693](https://github.com/lukejenkins/CVE-2022-24693) @@ -3976,7 +3989,12 @@ SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution. - [manuelz120/CVE-2021-45897](https://github.com/manuelz120/CVE-2021-45897) -### CVE-2021-45901 +### CVE-2021-45901 (2022-02-10) + + +The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists. + + - [9lyph/CVE-2021-45901](https://github.com/9lyph/CVE-2021-45901) ### CVE-2021-46005 (2022-01-18) @@ -18324,7 +18342,6 @@ A malicious third-party can give a crafted "ssh://..." URL to an unsus - [shogo82148/Fix-CVE-2017-1000117](https://github.com/shogo82148/Fix-CVE-2017-1000117) - [sasairc/CVE-2017-1000117_wasawasa](https://github.com/sasairc/CVE-2017-1000117_wasawasa) - [Shadow5523/CVE-2017-1000117-test](https://github.com/Shadow5523/CVE-2017-1000117-test) -- [bells17/CVE-2017-1000117](https://github.com/bells17/CVE-2017-1000117) - [ieee0824/CVE-2017-1000117](https://github.com/ieee0824/CVE-2017-1000117) - [rootclay/CVE-2017-1000117](https://github.com/rootclay/CVE-2017-1000117) - [ieee0824/CVE-2017-1000117-sl](https://github.com/ieee0824/CVE-2017-1000117-sl)