diff --git a/2014/CVE-2014-0282.json b/2014/CVE-2014-0282.json
index 8781cb2510..e0653aa59e 100644
--- a/2014/CVE-2014-0282.json
+++ b/2014/CVE-2014-0282.json
@@ -13,10 +13,10 @@
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
"fork": false,
"created_at": "2021-05-17T04:39:32Z",
- "updated_at": "2022-06-22T14:03:31Z",
+ "updated_at": "2022-08-29T13:26:40Z",
"pushed_at": "2021-11-18T11:07:54Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 12,
- "watchers": 17,
+ "watchers": 18,
"score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json
index a633020ce8..328ccb0e52 100644
--- a/2017/CVE-2017-5753.json
+++ b/2017/CVE-2017-5753.json
@@ -13,10 +13,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
- "updated_at": "2022-07-27T07:08:53Z",
+ "updated_at": "2022-08-29T13:11:56Z",
"pushed_at": "2018-01-10T01:14:44Z",
- "stargazers_count": 711,
- "watchers_count": 711,
+ "stargazers_count": 712,
+ "watchers_count": 712,
"forks_count": 181,
"allow_forking": true,
"is_template": false,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 181,
- "watchers": 711,
+ "watchers": 712,
"score": 0
},
{
diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json
index 899b0de579..7852fd31e7 100644
--- a/2018/CVE-2018-13379.json
+++ b/2018/CVE-2018-13379.json
@@ -136,13 +136,13 @@
"pushed_at": "2020-05-21T03:59:30Z",
"stargazers_count": 0,
"watchers_count": 0,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 0,
"score": 0
},
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index e09991df1b..8aa16d3939 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -2364,13 +2364,13 @@
"pushed_at": "2019-08-19T02:52:11Z",
"stargazers_count": 115,
"watchers_count": 115,
- "forks_count": 59,
+ "forks_count": 60,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 59,
+ "forks": 60,
"watchers": 115,
"score": 0
},
diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json
index ad2fca023f..3be13c01eb 100644
--- a/2019/CVE-2019-11358.json
+++ b/2019/CVE-2019-11358.json
@@ -118,7 +118,7 @@
"fork": false,
"created_at": "2021-03-08T11:34:11Z",
"updated_at": "2022-08-23T23:40:06Z",
- "pushed_at": "2022-08-29T06:19:11Z",
+ "pushed_at": "2022-08-29T16:26:45Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 27,
diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json
index 036b064d74..a1c7246bac 100644
--- a/2019/CVE-2019-11932.json
+++ b/2019/CVE-2019-11932.json
@@ -13,10 +13,10 @@
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
- "updated_at": "2022-06-22T18:36:44Z",
+ "updated_at": "2022-08-29T14:57:59Z",
"pushed_at": "2021-03-19T17:23:25Z",
- "stargazers_count": 256,
- "watchers_count": 256,
+ "stargazers_count": 257,
+ "watchers_count": 257,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
- "watchers": 256,
+ "watchers": 257,
"score": 0
},
{
@@ -243,10 +243,10 @@
"description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
"fork": false,
"created_at": "2019-10-23T08:02:15Z",
- "updated_at": "2022-03-07T21:13:41Z",
+ "updated_at": "2022-08-29T14:52:46Z",
"pushed_at": "2019-10-23T08:25:48Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 13,
+ "watchers_count": 13,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@@ -254,7 +254,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 12,
+ "watchers": 13,
"score": 0
},
{
diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json
index 2cf5a761a8..50f9ca70bc 100644
--- a/2019/CVE-2019-5736.json
+++ b/2019/CVE-2019-5736.json
@@ -41,7 +41,7 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
- "updated_at": "2022-08-23T13:22:52Z",
+ "updated_at": "2022-08-29T13:14:23Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 593,
"watchers_count": 593,
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index 3794065c9e..b4693795bc 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -1638,10 +1638,10 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
- "updated_at": "2022-08-21T10:15:45Z",
+ "updated_at": "2022-08-29T16:07:53Z",
"pushed_at": "2022-03-30T14:02:04Z",
- "stargazers_count": 187,
- "watchers_count": 187,
+ "stargazers_count": 188,
+ "watchers_count": 188,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@@ -1649,7 +1649,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
- "watchers": 187,
+ "watchers": 188,
"score": 0
},
{
@@ -1867,10 +1867,10 @@
"description": null,
"fork": false,
"created_at": "2020-11-10T02:35:34Z",
- "updated_at": "2020-12-25T09:08:30Z",
+ "updated_at": "2022-08-29T17:16:37Z",
"pushed_at": "2020-12-25T09:08:28Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -1878,7 +1878,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
},
{
@@ -2240,10 +2240,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-08T07:52:26Z",
- "updated_at": "2022-06-08T08:29:19Z",
+ "updated_at": "2022-08-29T17:16:35Z",
"pushed_at": "2022-06-10T13:48:58Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -2251,7 +2251,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json
index 5f58d80606..6a852bd831 100644
--- a/2020/CVE-2020-1350.json
+++ b/2020/CVE-2020-1350.json
@@ -233,13 +233,13 @@
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 232,
"watchers_count": 232,
- "forks_count": 51,
+ "forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 51,
+ "forks": 52,
"watchers": 232,
"score": 0
},
@@ -285,10 +285,10 @@
"description": "CVE-2020-1350 Proof-of-Concept",
"fork": false,
"created_at": "2020-07-17T05:41:19Z",
- "updated_at": "2022-03-16T16:44:01Z",
+ "updated_at": "2022-08-29T16:44:17Z",
"pushed_at": "2020-07-27T16:20:06Z",
- "stargazers_count": 9,
- "watchers_count": 9,
+ "stargazers_count": 10,
+ "watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -296,7 +296,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 9,
+ "watchers": 10,
"score": 0
},
{
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 76297caf8e..a7131fcd54 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -41,18 +41,18 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
- "updated_at": "2022-08-26T21:23:19Z",
+ "updated_at": "2022-08-29T16:47:07Z",
"pushed_at": "2021-12-08T10:31:54Z",
- "stargazers_count": 1492,
- "watchers_count": 1492,
- "forks_count": 341,
+ "stargazers_count": 1493,
+ "watchers_count": 1493,
+ "forks_count": 342,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 341,
- "watchers": 1492,
+ "forks": 342,
+ "watchers": 1493,
"score": 0
},
{
@@ -97,18 +97,18 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
- "updated_at": "2022-08-20T15:11:40Z",
+ "updated_at": "2022-08-29T16:46:57Z",
"pushed_at": "2020-11-03T09:45:24Z",
- "stargazers_count": 947,
- "watchers_count": 947,
- "forks_count": 262,
+ "stargazers_count": 948,
+ "watchers_count": 948,
+ "forks_count": 263,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 262,
- "watchers": 947,
+ "forks": 263,
+ "watchers": 948,
"score": 0
},
{
@@ -160,10 +160,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
- "updated_at": "2022-08-28T17:01:38Z",
+ "updated_at": "2022-08-29T13:46:57Z",
"pushed_at": "2020-10-15T18:31:15Z",
- "stargazers_count": 459,
- "watchers_count": 459,
+ "stargazers_count": 460,
+ "watchers_count": 460,
"forks_count": 131,
"allow_forking": true,
"is_template": false,
@@ -171,7 +171,7 @@
"topics": [],
"visibility": "public",
"forks": 131,
- "watchers": 459,
+ "watchers": 460,
"score": 0
},
{
@@ -188,10 +188,10 @@
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false,
"created_at": "2020-09-14T19:27:14Z",
- "updated_at": "2022-08-23T19:47:40Z",
+ "updated_at": "2022-08-29T15:49:42Z",
"pushed_at": "2020-09-16T14:05:27Z",
- "stargazers_count": 159,
- "watchers_count": 159,
+ "stargazers_count": 160,
+ "watchers_count": 160,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
@@ -199,7 +199,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
- "watchers": 159,
+ "watchers": 160,
"score": 0
},
{
@@ -1661,10 +1661,10 @@
"description": "ZeroLogon exploitation script,One-click recovery of domain controller machine Hash",
"fork": false,
"created_at": "2022-08-26T09:06:04Z",
- "updated_at": "2022-08-29T03:07:56Z",
+ "updated_at": "2022-08-29T13:40:45Z",
"pushed_at": "2022-08-27T04:33:43Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -1675,7 +1675,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 4,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 46c1dc156c..d656a71a1e 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -313,10 +313,10 @@
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
- "updated_at": "2022-08-27T14:33:02Z",
+ "updated_at": "2022-08-29T14:58:49Z",
"pushed_at": "2022-03-29T02:08:45Z",
- "stargazers_count": 123,
- "watchers_count": 123,
+ "stargazers_count": 124,
+ "watchers_count": 124,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@@ -324,7 +324,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
- "watchers": 123,
+ "watchers": 124,
"score": 0
},
{
diff --git a/2020/CVE-2020-9715.json b/2020/CVE-2020-9715.json
index e0c989c4f2..21fdba66a7 100644
--- a/2020/CVE-2020-9715.json
+++ b/2020/CVE-2020-9715.json
@@ -26,5 +26,33 @@
"forks": 0,
"watchers": 4,
"score": 0
+ },
+ {
+ "id": 530258491,
+ "name": "CVE-2020-9715",
+ "full_name": "WonjunChun\/CVE-2020-9715",
+ "owner": {
+ "login": "WonjunChun",
+ "id": 40604592,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40604592?v=4",
+ "html_url": "https:\/\/github.com\/WonjunChun"
+ },
+ "html_url": "https:\/\/github.com\/WonjunChun\/CVE-2020-9715",
+ "description": "Adobe Acrobat Reader UAF vulnerability Exploit code",
+ "fork": false,
+ "created_at": "2022-08-29T14:33:40Z",
+ "updated_at": "2022-08-29T14:33:40Z",
+ "pushed_at": "2022-08-29T14:33:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index d3cb0ddde5..3d3e9daa5b 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
- "updated_at": "2022-08-24T21:07:58Z",
+ "updated_at": "2022-08-29T15:28:10Z",
"pushed_at": "2021-07-20T15:28:13Z",
- "stargazers_count": 1597,
- "watchers_count": 1597,
+ "stargazers_count": 1598,
+ "watchers_count": 1598,
"forks_count": 575,
"allow_forking": true,
"is_template": false,
@@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 575,
- "watchers": 1597,
+ "watchers": 1598,
"score": 0
},
{
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 8641454c48..e6583f13b9 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -86,10 +86,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
- "updated_at": "2022-08-23T11:12:37Z",
+ "updated_at": "2022-08-29T15:03:49Z",
"pushed_at": "2021-12-30T12:26:11Z",
- "stargazers_count": 401,
- "watchers_count": 401,
+ "stargazers_count": 402,
+ "watchers_count": 402,
"forks_count": 140,
"allow_forking": true,
"is_template": false,
@@ -99,7 +99,7 @@
],
"visibility": "public",
"forks": 140,
- "watchers": 401,
+ "watchers": 402,
"score": 0
},
{
@@ -144,10 +144,10 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
- "updated_at": "2022-08-27T15:50:38Z",
+ "updated_at": "2022-08-29T15:04:35Z",
"pushed_at": "2021-02-25T16:05:02Z",
- "stargazers_count": 196,
- "watchers_count": 196,
+ "stargazers_count": 197,
+ "watchers_count": 197,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
@@ -155,7 +155,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
- "watchers": 196,
+ "watchers": 197,
"score": 0
},
{
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index 77a6cb2e60..a030f883f8 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -69,10 +69,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
- "updated_at": "2022-08-15T15:41:33Z",
+ "updated_at": "2022-08-29T12:45:33Z",
"pushed_at": "2022-01-16T15:54:14Z",
- "stargazers_count": 150,
- "watchers_count": 150,
+ "stargazers_count": 149,
+ "watchers_count": 149,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@@ -87,7 +87,7 @@
],
"visibility": "public",
"forks": 32,
- "watchers": 150,
+ "watchers": 149,
"score": 0
},
{
diff --git a/2021/CVE-2021-22555.json b/2021/CVE-2021-22555.json
index 3714c6e567..2329cc5111 100644
--- a/2021/CVE-2021-22555.json
+++ b/2021/CVE-2021-22555.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-22555 exploit rewritten with pipe primitive",
"fork": false,
"created_at": "2022-04-05T06:35:25Z",
- "updated_at": "2022-07-25T15:33:23Z",
+ "updated_at": "2022-08-29T15:47:11Z",
"pushed_at": "2022-05-18T03:10:10Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 19,
+ "watchers": 20,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-25801.json b/2021/CVE-2021-25801.json
new file mode 100644
index 0000000000..80b61b3f37
--- /dev/null
+++ b/2021/CVE-2021-25801.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 484198736,
+ "name": "VLC_CVE-2021-25801_Analysis",
+ "full_name": "DShankle\/VLC_CVE-2021-25801_Analysis",
+ "owner": {
+ "login": "DShankle",
+ "id": 44985044,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
+ "html_url": "https:\/\/github.com\/DShankle"
+ },
+ "html_url": "https:\/\/github.com\/DShankle\/VLC_CVE-2021-25801_Analysis",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-04-21T20:41:18Z",
+ "updated_at": "2022-08-29T17:16:48Z",
+ "pushed_at": "2022-04-21T21:09:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-25804.json b/2021/CVE-2021-25804.json
new file mode 100644
index 0000000000..b933c67812
--- /dev/null
+++ b/2021/CVE-2021-25804.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 495571729,
+ "name": "VLC_CVE-2021-25804_Analysis",
+ "full_name": "DShankle\/VLC_CVE-2021-25804_Analysis",
+ "owner": {
+ "login": "DShankle",
+ "id": 44985044,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
+ "html_url": "https:\/\/github.com\/DShankle"
+ },
+ "html_url": "https:\/\/github.com\/DShankle\/VLC_CVE-2021-25804_Analysis",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-23T20:58:56Z",
+ "updated_at": "2022-08-29T17:19:40Z",
+ "pushed_at": "2022-08-29T17:48:33Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
index cfd9f4b8be..f1b0605e88 100644
--- a/2021/CVE-2021-34527.json
+++ b/2021/CVE-2021-34527.json
@@ -69,10 +69,10 @@
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
- "updated_at": "2022-08-29T06:55:25Z",
+ "updated_at": "2022-08-29T16:46:37Z",
"pushed_at": "2022-08-26T12:13:22Z",
- "stargazers_count": 43,
- "watchers_count": 43,
+ "stargazers_count": 46,
+ "watchers_count": 46,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 43,
+ "watchers": 46,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json
index 3814a19d03..b25924b1b8 100644
--- a/2021/CVE-2021-36260.json
+++ b/2021/CVE-2021-36260.json
@@ -29,5 +29,33 @@
"forks": 4,
"watchers": 24,
"score": 0
+ },
+ {
+ "id": 530277219,
+ "name": "Simple-CVE-2021-36260",
+ "full_name": "TakenoSite\/Simple-CVE-2021-36260",
+ "owner": {
+ "login": "TakenoSite",
+ "id": 84880497,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84880497?v=4",
+ "html_url": "https:\/\/github.com\/TakenoSite"
+ },
+ "html_url": "https:\/\/github.com\/TakenoSite\/Simple-CVE-2021-36260",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-29T15:21:11Z",
+ "updated_at": "2022-08-29T15:34:05Z",
+ "pushed_at": "2022-08-29T16:49:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 13e0c88052..587c7280c4 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -1856,10 +1856,10 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
- "updated_at": "2022-08-28T08:43:25Z",
+ "updated_at": "2022-08-29T13:58:13Z",
"pushed_at": "2022-04-19T12:33:32Z",
- "stargazers_count": 307,
- "watchers_count": 307,
+ "stargazers_count": 308,
+ "watchers_count": 308,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@@ -1867,7 +1867,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
- "watchers": 307,
+ "watchers": 308,
"score": 0
},
{
diff --git a/2021/CVE-2021-40438.json b/2021/CVE-2021-40438.json
index 45209ec8df..ac29187f67 100644
--- a/2021/CVE-2021-40438.json
+++ b/2021/CVE-2021-40438.json
@@ -13,10 +13,10 @@
"description": "Apache forward request CVE",
"fork": false,
"created_at": "2022-04-03T15:24:24Z",
- "updated_at": "2022-08-05T15:05:41Z",
+ "updated_at": "2022-08-29T18:18:59Z",
"pushed_at": "2022-04-03T18:34:35Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 4,
+ "watchers": 5,
"score": 0
},
{
diff --git a/2021/CVE-2021-4154.json b/2021/CVE-2021-4154.json
index ab8010ff2e..404e23c290 100644
--- a/2021/CVE-2021-4154.json
+++ b/2021/CVE-2021-4154.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-4154 exploit",
"fork": false,
"created_at": "2022-08-11T05:46:27Z",
- "updated_at": "2022-08-27T06:02:03Z",
+ "updated_at": "2022-08-29T12:39:01Z",
"pushed_at": "2022-08-11T06:00:10Z",
- "stargazers_count": 32,
- "watchers_count": 32,
+ "stargazers_count": 31,
+ "watchers_count": 31,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 32,
+ "watchers": 31,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index caf3ef8fce..389db7db00 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
- "updated_at": "2022-08-29T06:27:08Z",
+ "updated_at": "2022-08-29T17:01:41Z",
"pushed_at": "2021-12-16T09:50:15Z",
- "stargazers_count": 1132,
- "watchers_count": 1132,
+ "stargazers_count": 1134,
+ "watchers_count": 1134,
"forks_count": 296,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 296,
- "watchers": 1132,
+ "watchers": 1134,
"score": 0
},
{
diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json
index 56e56527bf..eb50502a8e 100644
--- a/2021/CVE-2021-43798.json
+++ b/2021/CVE-2021-43798.json
@@ -73,7 +73,7 @@
"description": "grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL",
"fork": false,
"created_at": "2021-12-08T03:43:31Z",
- "updated_at": "2022-06-10T09:19:43Z",
+ "updated_at": "2022-08-29T13:52:48Z",
"pushed_at": "2022-01-27T08:35:29Z",
"stargazers_count": 13,
"watchers_count": 13,
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index c91cb4ee26..fbeefed916 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -454,10 +454,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
- "updated_at": "2022-08-28T16:47:43Z",
+ "updated_at": "2022-08-29T13:00:39Z",
"pushed_at": "2022-03-20T16:33:49Z",
- "stargazers_count": 1459,
- "watchers_count": 1459,
+ "stargazers_count": 1460,
+ "watchers_count": 1460,
"forks_count": 407,
"allow_forking": true,
"is_template": false,
@@ -470,7 +470,7 @@
],
"visibility": "public",
"forks": 407,
- "watchers": 1459,
+ "watchers": 1460,
"score": 0
},
{
@@ -1584,34 +1584,6 @@
"watchers": 8,
"score": 0
},
- {
- "id": 437721429,
- "name": "log4j-nullroute",
- "full_name": "0xRyan\/log4j-nullroute",
- "owner": {
- "login": "0xRyan",
- "id": 87556614,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87556614?v=4",
- "html_url": "https:\/\/github.com\/0xRyan"
- },
- "html_url": "https:\/\/github.com\/0xRyan\/log4j-nullroute",
- "description": "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes",
- "fork": false,
- "created_at": "2021-12-13T03:15:42Z",
- "updated_at": "2022-01-27T18:05:54Z",
- "pushed_at": "2021-12-14T23:03:03Z",
- "stargazers_count": 4,
- "watchers_count": 4,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 4,
- "score": 0
- },
{
"id": 437729534,
"name": "CVE-2021-44228",
@@ -2009,34 +1981,6 @@
"watchers": 4,
"score": 0
},
- {
- "id": 437917354,
- "name": "Fix-CVE-2021-44228",
- "full_name": "AlexandreHeroux\/Fix-CVE-2021-44228",
- "owner": {
- "login": "AlexandreHeroux",
- "id": 28022186,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28022186?v=4",
- "html_url": "https:\/\/github.com\/AlexandreHeroux"
- },
- "html_url": "https:\/\/github.com\/AlexandreHeroux\/Fix-CVE-2021-44228",
- "description": "Apply class remove process from ear\/war\/jar\/zip archive, see https:\/\/logging.apache.org\/log4j\/2.x\/",
- "fork": false,
- "created_at": "2021-12-13T15:04:31Z",
- "updated_at": "2022-01-14T22:38:29Z",
- "pushed_at": "2021-12-15T02:02:51Z",
- "stargazers_count": 5,
- "watchers_count": 5,
- "forks_count": 4,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 4,
- "watchers": 5,
- "score": 0
- },
{
"id": 437919806,
"name": "log4j-CVE-2021-44228-test",
@@ -2927,36 +2871,6 @@
"watchers": 27,
"score": 0
},
- {
- "id": 438423480,
- "name": "CVE-2021-44228",
- "full_name": "0xThiebaut\/CVE-2021-44228",
- "owner": {
- "login": "0xThiebaut",
- "id": 46688461,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46688461?v=4",
- "html_url": "https:\/\/github.com\/0xThiebaut"
- },
- "html_url": "https:\/\/github.com\/0xThiebaut\/CVE-2021-44228",
- "description": "CVE-2021-44228 Response Scripts",
- "fork": false,
- "created_at": "2021-12-14T22:50:05Z",
- "updated_at": "2021-12-15T00:30:22Z",
- "pushed_at": "2021-12-15T00:27:46Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "cve-2021-44228"
- ],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0
- },
{
"id": 438432868,
"name": "CVE-2021-44228_scanner",
diff --git a/2022/CVE-2022-0540.json b/2022/CVE-2022-0540.json
index 387898db96..53371ed3aa 100644
--- a/2022/CVE-2022-0540.json
+++ b/2022/CVE-2022-0540.json
@@ -13,10 +13,10 @@
"description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)",
"fork": false,
"created_at": "2022-05-25T10:47:04Z",
- "updated_at": "2022-08-29T11:00:02Z",
+ "updated_at": "2022-08-29T15:13:30Z",
"pushed_at": "2022-05-25T13:43:16Z",
- "stargazers_count": 48,
- "watchers_count": 48,
+ "stargazers_count": 49,
+ "watchers_count": 49,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 10,
- "watchers": 48,
+ "watchers": 49,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index ff9a257a53..6d2833d5ee 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -1410,6 +1410,34 @@
"watchers": 3,
"score": 0
},
+ {
+ "id": 470139953,
+ "name": "CVE-2022-0847-DirtyPipe-Container-Breakout",
+ "full_name": "jpts\/CVE-2022-0847-DirtyPipe-Container-Breakout",
+ "owner": {
+ "login": "jpts",
+ "id": 5352661,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5352661?v=4",
+ "html_url": "https:\/\/github.com\/jpts"
+ },
+ "html_url": "https:\/\/github.com\/jpts\/CVE-2022-0847-DirtyPipe-Container-Breakout",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-03-15T12:00:17Z",
+ "updated_at": "2022-08-29T12:54:21Z",
+ "pushed_at": "2022-04-20T22:07:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ },
{
"id": 470957000,
"name": "CVE-2022-0847_DirtyPipe_Exploits",
diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json
index 89ada1fa21..3727d3aee5 100644
--- a/2022/CVE-2022-1388.json
+++ b/2022/CVE-2022-1388.json
@@ -237,10 +237,10 @@
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
"fork": false,
"created_at": "2022-05-09T10:34:38Z",
- "updated_at": "2022-08-29T11:40:22Z",
+ "updated_at": "2022-08-29T16:57:28Z",
"pushed_at": "2022-05-16T12:40:51Z",
- "stargazers_count": 67,
- "watchers_count": 67,
+ "stargazers_count": 70,
+ "watchers_count": 70,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@@ -248,7 +248,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 67,
+ "watchers": 70,
"score": 0
},
{
@@ -321,10 +321,10 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
- "updated_at": "2022-08-17T14:28:13Z",
+ "updated_at": "2022-08-29T14:20:43Z",
"pushed_at": "2022-05-09T20:52:07Z",
- "stargazers_count": 216,
- "watchers_count": 216,
+ "stargazers_count": 217,
+ "watchers_count": 217,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
@@ -332,7 +332,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
- "watchers": 216,
+ "watchers": 217,
"score": 0
},
{
diff --git a/2022/CVE-2022-1802.json b/2022/CVE-2022-1802.json
index ca24b25363..0ad81496fb 100644
--- a/2022/CVE-2022-1802.json
+++ b/2022/CVE-2022-1802.json
@@ -13,18 +13,18 @@
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
- "updated_at": "2022-08-27T13:13:18Z",
+ "updated_at": "2022-08-29T17:57:51Z",
"pushed_at": "2022-08-26T00:48:33Z",
- "stargazers_count": 79,
- "watchers_count": 79,
- "forks_count": 22,
+ "stargazers_count": 86,
+ "watchers_count": 86,
+ "forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 22,
- "watchers": 79,
+ "forks": 23,
+ "watchers": 86,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json
index d59f5d1e41..551de1a813 100644
--- a/2022/CVE-2022-21907.json
+++ b/2022/CVE-2022-21907.json
@@ -180,7 +180,7 @@
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
- "updated_at": "2022-08-29T06:57:02Z",
+ "updated_at": "2022-08-29T13:38:12Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 11,
"watchers_count": 11,
diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json
index 1794a6c99c..0a449a0e19 100644
--- a/2022/CVE-2022-21971.json
+++ b/2022/CVE-2022-21971.json
@@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
- "updated_at": "2022-08-25T07:50:03Z",
+ "updated_at": "2022-08-29T16:45:47Z",
"pushed_at": "2022-02-26T20:45:19Z",
- "stargazers_count": 282,
- "watchers_count": 282,
+ "stargazers_count": 283,
+ "watchers_count": 283,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 63,
- "watchers": 282,
+ "watchers": 283,
"score": 0
},
{
diff --git a/2022/CVE-2022-22814.json b/2022/CVE-2022-22814.json
new file mode 100644
index 0000000000..18eb3e69da
--- /dev/null
+++ b/2022/CVE-2022-22814.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 496813493,
+ "name": "CVE-2022-22814_PoC",
+ "full_name": "DShankle\/CVE-2022-22814_PoC",
+ "owner": {
+ "login": "DShankle",
+ "id": 44985044,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
+ "html_url": "https:\/\/github.com\/DShankle"
+ },
+ "html_url": "https:\/\/github.com\/DShankle\/CVE-2022-22814_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-05-27T00:33:39Z",
+ "updated_at": "2022-08-29T17:18:20Z",
+ "pushed_at": "2022-08-16T20:20:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 3f63b7b5e7..69ce652ac2 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-22947",
"fork": false,
"created_at": "2022-03-02T11:58:55Z",
- "updated_at": "2022-08-25T08:29:23Z",
+ "updated_at": "2022-08-29T15:05:17Z",
"pushed_at": "2022-03-03T14:03:30Z",
- "stargazers_count": 184,
- "watchers_count": 184,
+ "stargazers_count": 185,
+ "watchers_count": 185,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
- "watchers": 184,
+ "watchers": 185,
"score": 0
},
{
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index f726194405..3e9a302323 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -1864,14 +1864,14 @@
{
"id": 519718211,
"name": "CVE-2022-22965",
- "full_name": "iyamrotrix\/CVE-2022-22965",
+ "full_name": "iyamroshan\/CVE-2022-22965",
"owner": {
- "login": "iyamrotrix",
+ "login": "iyamroshan",
"id": 109761382,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109761382?v=4",
- "html_url": "https:\/\/github.com\/iyamrotrix"
+ "html_url": "https:\/\/github.com\/iyamroshan"
},
- "html_url": "https:\/\/github.com\/iyamrotrix\/CVE-2022-22965",
+ "html_url": "https:\/\/github.com\/iyamroshan\/CVE-2022-22965",
"description": "Exploit for SpringShell.",
"fork": false,
"created_at": "2022-07-31T08:21:59Z",
diff --git a/2022/CVE-2022-24637.json b/2022/CVE-2022-24637.json
deleted file mode 100644
index 8d4469eb07..0000000000
--- a/2022/CVE-2022-24637.json
+++ /dev/null
@@ -1,30 +0,0 @@
-[
- {
- "id": 529972571,
- "name": "cve-2022-24637_open-web-analytics-info-disclosure-to-rce",
- "full_name": "watchdog2000\/cve-2022-24637_open-web-analytics-info-disclosure-to-rce",
- "owner": {
- "login": "watchdog2000",
- "id": 63520692,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63520692?v=4",
- "html_url": "https:\/\/github.com\/watchdog2000"
- },
- "html_url": "https:\/\/github.com\/watchdog2000\/cve-2022-24637_open-web-analytics-info-disclosure-to-rce",
- "description": "Based on https:\/\/devel0pment.de\/?p=2494",
- "fork": false,
- "created_at": "2022-08-28T20:30:24Z",
- "updated_at": "2022-08-29T06:44:04Z",
- "pushed_at": "2022-08-28T20:39:44Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 1,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json
index 1bbabf21bd..c32296b7b0 100644
--- a/2022/CVE-2022-25636.json
+++ b/2022/CVE-2022-25636.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
- "updated_at": "2022-08-19T02:37:36Z",
+ "updated_at": "2022-08-29T14:13:38Z",
"pushed_at": "2022-03-07T17:18:19Z",
- "stargazers_count": 396,
- "watchers_count": 396,
+ "stargazers_count": 397,
+ "watchers_count": 397,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
@@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
- "watchers": 396,
+ "watchers": 397,
"score": 0
},
{
diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json
index 7268c1c0fa..bc8342023b 100644
--- a/2022/CVE-2022-2588.json
+++ b/2022/CVE-2022-2588.json
@@ -13,7 +13,7 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
- "updated_at": "2022-08-28T11:04:21Z",
+ "updated_at": "2022-08-29T15:41:40Z",
"pushed_at": "2022-08-11T06:04:18Z",
"stargazers_count": 78,
"watchers_count": 78,
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index f9f942f513..cf9901d4e9 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -13,8 +13,8 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
- "updated_at": "2022-08-29T08:43:28Z",
- "pushed_at": "2022-08-24T15:46:31Z",
+ "updated_at": "2022-08-29T16:30:40Z",
+ "pushed_at": "2022-08-29T12:54:56Z",
"stargazers_count": 695,
"watchers_count": 695,
"forks_count": 130,
diff --git a/2022/CVE-2022-28381.json b/2022/CVE-2022-28381.json
new file mode 100644
index 0000000000..41ab391d18
--- /dev/null
+++ b/2022/CVE-2022-28381.json
@@ -0,0 +1,30 @@
+[
+ {
+ "id": 528577166,
+ "name": "CVE-2022-28381_PoC",
+ "full_name": "DShankle\/CVE-2022-28381_PoC",
+ "owner": {
+ "login": "DShankle",
+ "id": 44985044,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
+ "html_url": "https:\/\/github.com\/DShankle"
+ },
+ "html_url": "https:\/\/github.com\/DShankle\/CVE-2022-28381_PoC",
+ "description": null,
+ "fork": false,
+ "created_at": "2022-08-24T20:04:58Z",
+ "updated_at": "2022-08-29T17:20:43Z",
+ "pushed_at": "2022-08-24T20:05:00Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json
index 7bd9b44c7f..a14fae0b78 100644
--- a/2022/CVE-2022-34918.json
+++ b/2022/CVE-2022-34918.json
@@ -153,10 +153,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
- "updated_at": "2022-08-29T07:25:23Z",
+ "updated_at": "2022-08-29T16:27:09Z",
"pushed_at": "2022-08-13T08:14:07Z",
- "stargazers_count": 155,
- "watchers_count": 155,
+ "stargazers_count": 156,
+ "watchers_count": 156,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
- "watchers": 155,
+ "watchers": 156,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-37042.json b/2022/CVE-2022-37042.json
index be444b0b13..ca8dc7b968 100644
--- a/2022/CVE-2022-37042.json
+++ b/2022/CVE-2022-37042.json
@@ -17,13 +17,13 @@
"pushed_at": "2022-08-18T18:41:13Z",
"stargazers_count": 5,
"watchers_count": 5,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 5,
"score": 0
},
@@ -42,7 +42,7 @@
"fork": false,
"created_at": "2022-08-25T10:43:13Z",
"updated_at": "2022-08-27T17:13:41Z",
- "pushed_at": "2022-08-25T10:56:45Z",
+ "pushed_at": "2022-08-29T16:56:10Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
diff --git a/README.md b/README.md
index 21ab19d986..3524fa705c 100644
--- a/README.md
+++ b/README.md
@@ -214,6 +214,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
- [githublihaha/DirtyPIPE-CVE-2022-0847](https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847)
- [phuonguno98/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits)
- [MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker](https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker)
+- [jpts/CVE-2022-0847-DirtyPipe-Container-Breakout](https://github.com/jpts/CVE-2022-0847-DirtyPipe-Container-Breakout)
- [logm1lo/CVE-2022-0847_DirtyPipe_Exploits](https://github.com/logm1lo/CVE-2022-0847_DirtyPipe_Exploits)
- [LudovicPatho/CVE-2022-0847_dirty-pipe](https://github.com/LudovicPatho/CVE-2022-0847_dirty-pipe)
- [DanaEpp/pwncat_dirtypipe](https://github.com/DanaEpp/pwncat_dirtypipe)
@@ -917,6 +918,14 @@ Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is uniqu
- [ahmetfurkans/CVE-2022-22718](https://github.com/ahmetfurkans/CVE-2022-22718)
+### CVE-2022-22814 (2022-03-10)
+
+
+The System Diagnosis service of MyASUS before 3.1.2.0 allows privilege escalation.
+
+
+- [DShankle/CVE-2022-22814_PoC](https://github.com/DShankle/CVE-2022-22814_PoC)
+
### CVE-2022-22822 (2022-01-07)
@@ -1173,7 +1182,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
- [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan)
- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965)
- [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965)
-- [iyamrotrix/CVE-2022-22965](https://github.com/iyamrotrix/CVE-2022-22965)
+- [iyamroshan/CVE-2022-22965](https://github.com/iyamroshan/CVE-2022-22965)
### CVE-2022-22968 (2022-04-14)
@@ -1550,14 +1559,6 @@ Denial of Service (DoS) in the Z-Wave S0 NonceGet protocol specification in Sili
- [ITSecLab-HSEL/CVE-2022-24611](https://github.com/ITSecLab-HSEL/CVE-2022-24611)
-### CVE-2022-24637 (2022-03-18)
-
-
-Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
-
-
-- [watchdog2000/cve-2022-24637_open-web-analytics-info-disclosure-to-rce](https://github.com/watchdog2000/cve-2022-24637_open-web-analytics-info-disclosure-to-rce)
-
### CVE-2022-24644 (2022-03-07)
@@ -2302,6 +2303,14 @@ An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0
- [ahsentekdemir/CVE-2022-28346](https://github.com/ahsentekdemir/CVE-2022-28346)
- [pthlong9991/CVE-2022-28346](https://github.com/pthlong9991/CVE-2022-28346)
+### CVE-2022-28381 (2022-04-03)
+
+
+Mediaserver.exe in ALLMediaServer 1.6 has a stack-based buffer overflow that allows remote attackers to execute arbitrary code via a long string to TCP port 888, a related issue to CVE-2017-17932.
+
+
+- [DShankle/CVE-2022-28381_PoC](https://github.com/DShankle/CVE-2022-28381_PoC)
+
### CVE-2022-28452 (2022-04-29)
@@ -3261,7 +3270,12 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD
### CVE-2022-36163
- [MaherAzzouzi/CVE-2022-36163](https://github.com/MaherAzzouzi/CVE-2022-36163)
-### CVE-2022-36200
+### CVE-2022-36200 (2022-08-29)
+
+
+In FiberHome VDSL2 Modem HG150-Ub_V3.0, Credentials of Admin are submitted in URL, which can be logged/sniffed.
+
+
- [afaq1337/CVE-2022-36200](https://github.com/afaq1337/CVE-2022-36200)
### CVE-2022-36271
@@ -5217,6 +5231,22 @@ A security issue was discovered in Kubernetes where a user may be able to create
- [Betep0k/CVE-2021-25741](https://github.com/Betep0k/CVE-2021-25741)
+### CVE-2021-25801 (2021-07-26)
+
+
+A buffer overflow vulnerability in the __Parse_indx component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file.
+
+
+- [DShankle/VLC_CVE-2021-25801_Analysis](https://github.com/DShankle/VLC_CVE-2021-25801_Analysis)
+
+### CVE-2021-25804 (2021-07-26)
+
+
+A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Player 3.0.11 can a denial of service (DOS) in the application.
+
+
+- [DShankle/VLC_CVE-2021-25804_Analysis](https://github.com/DShankle/VLC_CVE-2021-25804_Analysis)
+
### CVE-2021-25837 (2021-02-08)
@@ -6298,6 +6328,7 @@ A command injection vulnerability in the web server of some Hikvision product. D
- [Cuerz/CVE-2021-36260](https://github.com/Cuerz/CVE-2021-36260)
+- [TakenoSite/Simple-CVE-2021-36260](https://github.com/TakenoSite/Simple-CVE-2021-36260)
### CVE-2021-36460 (2022-04-25)
@@ -7298,7 +7329,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell)
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
-- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan)
- [rubo77/log4j_checker_beta](https://github.com/rubo77/log4j_checker_beta)
@@ -7313,7 +7343,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [0xsyr0/Log4Shell](https://github.com/0xsyr0/Log4Shell)
- [manuel-alvarez-alvarez/log4j-cve-2021-44228](https://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228)
- [Koupah/MC-Log4j-Patcher](https://github.com/Koupah/MC-Log4j-Patcher)
-- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
- [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228)
- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips)
@@ -7342,7 +7371,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [razz0r/CVE-2021-44228-Mass-RCE](https://github.com/razz0r/CVE-2021-44228-Mass-RCE)
- [xsultan/log4jshield](https://github.com/xsultan/log4jshield)
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
-- [0xThiebaut/CVE-2021-44228](https://github.com/0xThiebaut/CVE-2021-44228)
- [CERTCC/CVE-2021-44228_scanner](https://github.com/CERTCC/CVE-2021-44228_scanner)
- [dbzoo/log4j_scanner](https://github.com/dbzoo/log4j_scanner)
- [jeremyrsellars/CVE-2021-44228_scanner](https://github.com/jeremyrsellars/CVE-2021-44228_scanner)
@@ -10447,6 +10475,7 @@ Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 20
- [lsw29475/CVE-2020-9715](https://github.com/lsw29475/CVE-2020-9715)
+- [WonjunChun/CVE-2020-9715](https://github.com/WonjunChun/CVE-2020-9715)
### CVE-2020-9758 (2020-03-09)