diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index fc1dc7f847..1327d573b2 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -13,13 +13,13 @@ "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", "fork": false, "created_at": "2013-09-22T21:20:31Z", - "updated_at": "2021-04-25T13:06:08Z", + "updated_at": "2021-04-27T08:47:41Z", "pushed_at": "2017-04-24T14:16:56Z", - "stargazers_count": 301, - "watchers_count": 301, + "stargazers_count": 302, + "watchers_count": 302, "forks_count": 92, "forks": 92, - "watchers": 301, + "watchers": 302, "score": 0 }, { diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index ae65464fe8..92a587dd49 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-26T15:04:21Z", + "updated_at": "2021-04-27T06:58:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1007, - "watchers_count": 1007, + "stargazers_count": 1008, + "watchers_count": 1008, "forks_count": 229, "forks": 229, - "watchers": 1007, + "watchers": 1008, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 4514565d79..33530ea815 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-26T15:04:21Z", + "updated_at": "2021-04-27T06:58:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1007, - "watchers_count": 1007, + "stargazers_count": 1008, + "watchers_count": 1008, "forks_count": 229, "forks": 229, - "watchers": 1007, + "watchers": 1008, "score": 0 }, { diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 6633b43683..41c8fc6056 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -59,7 +59,7 @@ "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "fork": false, "created_at": "2017-11-21T05:55:53Z", - "updated_at": "2021-04-20T08:13:24Z", + "updated_at": "2021-04-27T05:09:39Z", "pushed_at": "2017-11-29T03:33:53Z", "stargazers_count": 489, "watchers_count": 489, diff --git a/2017/CVE-2017-12635.json b/2017/CVE-2017-12635.json index 320d368893..a962096757 100644 --- a/2017/CVE-2017-12635.json +++ b/2017/CVE-2017-12635.json @@ -13,13 +13,13 @@ "description": "Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 \/ 2.x < 2.1.1 - Remote Privilege Escalation", "fork": false, "created_at": "2019-11-07T20:02:31Z", - "updated_at": "2020-12-22T00:04:57Z", + "updated_at": "2021-04-27T04:39:00Z", "pushed_at": "2019-12-15T15:19:00Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 1, "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0 }, { diff --git a/2017/CVE-2017-12636.json b/2017/CVE-2017-12636.json index d628ade7fc..717773f61e 100644 --- a/2017/CVE-2017-12636.json +++ b/2017/CVE-2017-12636.json @@ -17,8 +17,8 @@ "pushed_at": "2018-08-25T12:01:24Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 4, - "forks": 4, + "forks_count": 5, + "forks": 5, "watchers": 0, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 6ed465e811..66cca0f2cd 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-26T15:04:21Z", + "updated_at": "2021-04-27T06:58:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1007, - "watchers_count": 1007, + "stargazers_count": 1008, + "watchers_count": 1008, "forks_count": 229, "forks": 229, - "watchers": 1007, + "watchers": 1008, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index c1b1205f72..7f3320425e 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -36,13 +36,13 @@ "description": "海康威视未授权访问检测poc及口令爆破", "fork": false, "created_at": "2020-11-12T09:02:10Z", - "updated_at": "2021-04-24T18:18:01Z", + "updated_at": "2021-04-27T08:25:45Z", "pushed_at": "2020-11-19T08:58:04Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 2, "forks": 2, - "watchers": 22, + "watchers": 23, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index f1cbbeba8d..38f43d8f69 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -59,13 +59,13 @@ "description": "Exploit written in Python for CVE-2018-15473 with threading and export formats", "fork": false, "created_at": "2018-08-21T00:09:56Z", - "updated_at": "2021-04-21T08:54:06Z", + "updated_at": "2021-04-27T07:31:47Z", "pushed_at": "2020-08-18T00:00:15Z", - "stargazers_count": 437, - "watchers_count": 437, + "stargazers_count": 438, + "watchers_count": 438, "forks_count": 150, "forks": 150, - "watchers": 437, + "watchers": 438, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 367288dc5b..c0bb638bb4 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-26T15:04:21Z", + "updated_at": "2021-04-27T06:58:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1007, - "watchers_count": 1007, + "stargazers_count": 1008, + "watchers_count": 1008, "forks_count": 229, "forks": 229, - "watchers": 1007, + "watchers": 1008, "score": 0 }, { diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 0544472277..2ba789e613 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -473,8 +473,8 @@ "description": null, "fork": false, "created_at": "2020-10-18T14:01:59Z", - "updated_at": "2021-04-26T03:15:53Z", - "pushed_at": "2021-04-26T03:15:16Z", + "updated_at": "2021-04-27T05:19:53Z", + "pushed_at": "2021-04-27T05:19:51Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 8f1bf891aa..38e732a0e6 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -270,8 +270,8 @@ "pushed_at": "2018-04-26T15:40:28Z", "stargazers_count": 85, "watchers_count": 85, - "forks_count": 43, - "forks": 43, + "forks_count": 42, + "forks": 42, "watchers": 85, "score": 0 }, diff --git a/2019/CVE-2019-12725.json b/2019/CVE-2019-12725.json new file mode 100644 index 0000000000..00d1ce944f --- /dev/null +++ b/2019/CVE-2019-12725.json @@ -0,0 +1,25 @@ +[ + { + "id": 361970258, + "name": "CVE-2019-12725", + "full_name": "givemefivw\/CVE-2019-12725", + "owner": { + "login": "givemefivw", + "id": 65514141, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4", + "html_url": "https:\/\/github.com\/givemefivw" + }, + "html_url": "https:\/\/github.com\/givemefivw\/CVE-2019-12725", + "description": "CVE-2019-12725 ZeroShell 远程命令执行漏洞", + "fork": false, + "created_at": "2021-04-27T03:36:33Z", + "updated_at": "2021-04-27T03:41:35Z", + "pushed_at": "2021-04-27T03:41:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-13025.json b/2019/CVE-2019-13025.json index eaa209435a..80321c4260 100644 --- a/2019/CVE-2019-13025.json +++ b/2019/CVE-2019-13025.json @@ -13,13 +13,13 @@ "description": "Connect Box CH7465LG (CVE-2019-13025)", "fork": false, "created_at": "2019-10-01T20:53:47Z", - "updated_at": "2021-04-22T19:30:47Z", + "updated_at": "2021-04-27T03:21:23Z", "pushed_at": "2019-10-04T18:40:51Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 6, "forks": 6, - "watchers": 31, + "watchers": 32, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 7444df0c51..4f580101d1 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-04-26T09:34:44Z", + "updated_at": "2021-04-27T09:10:34Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2533, - "watchers_count": 2533, - "forks_count": 735, - "forks": 735, - "watchers": 2533, + "stargazers_count": 2535, + "watchers_count": 2535, + "forks_count": 737, + "forks": 737, + "watchers": 2535, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 3258e96aff..25af07d8eb 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -59,13 +59,13 @@ "description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.", "fork": false, "created_at": "2020-01-11T00:08:27Z", - "updated_at": "2021-04-19T10:41:54Z", + "updated_at": "2021-04-27T04:00:07Z", "pushed_at": "2020-01-22T20:23:51Z", - "stargazers_count": 527, - "watchers_count": 527, + "stargazers_count": 528, + "watchers_count": 528, "forks_count": 122, "forks": 122, - "watchers": 527, + "watchers": 528, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 612cba4ebd..9d3c059045 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-26T15:04:21Z", + "updated_at": "2021-04-27T06:58:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1007, - "watchers_count": 1007, + "stargazers_count": 1008, + "watchers_count": 1008, "forks_count": 229, "forks": 229, - "watchers": 1007, + "watchers": 1008, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 6917d0aa57..ee210810c5 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -224,8 +224,8 @@ "pushed_at": "2019-06-21T03:33:05Z", "stargazers_count": 146, "watchers_count": 146, - "forks_count": 63, - "forks": 63, + "forks_count": 62, + "forks": 62, "watchers": 146, "score": 0 }, diff --git a/2019/CVE-2019-6260.json b/2019/CVE-2019-6260.json index 5f0e8f4977..9e9d1e06b5 100644 --- a/2019/CVE-2019-6260.json +++ b/2019/CVE-2019-6260.json @@ -13,8 +13,8 @@ "description": "A Test and Debug Tool for ASPEED BMC AHB Interfaces", "fork": false, "created_at": "2019-02-21T22:49:53Z", - "updated_at": "2021-04-27T02:28:56Z", - "pushed_at": "2021-04-27T02:28:52Z", + "updated_at": "2021-04-27T03:35:46Z", + "pushed_at": "2021-04-27T03:35:44Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 8, diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index ab5019675c..d26e23274b 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,13 +13,13 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2021-04-22T19:20:28Z", + "updated_at": "2021-04-27T09:11:05Z", "pushed_at": "2020-06-17T13:41:23Z", - "stargazers_count": 360, - "watchers_count": 360, + "stargazers_count": 361, + "watchers_count": 361, "forks_count": 64, "forks": 64, - "watchers": 360, + "watchers": 361, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 87a505ca88..a67677df46 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-04-26T09:34:44Z", + "updated_at": "2021-04-27T09:10:34Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2533, - "watchers_count": 2533, - "forks_count": 735, - "forks": 735, - "watchers": 2533, + "stargazers_count": 2535, + "watchers_count": 2535, + "forks_count": 737, + "forks": 737, + "watchers": 2535, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 7ee74d1c9a..f6219019bb 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-04-27T02:51:22Z", + "updated_at": "2021-04-27T08:07:39Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 678, - "watchers_count": 678, - "forks_count": 188, - "forks": 188, - "watchers": 678, + "stargazers_count": 682, + "watchers_count": 682, + "forks_count": 191, + "forks": 191, + "watchers": 682, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17530.json b/2020/CVE-2020-17530.json index 47b26bb843..4a39a32079 100644 --- a/2020/CVE-2020-17530.json +++ b/2020/CVE-2020-17530.json @@ -40,8 +40,8 @@ "pushed_at": "2020-12-18T00:57:50Z", "stargazers_count": 40, "watchers_count": 40, - "forks_count": 20, - "forks": 20, + "forks_count": 19, + "forks": 19, "watchers": 40, "score": 0 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 61439bd52c..f499c46ce5 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-26T15:04:21Z", + "updated_at": "2021-04-27T06:58:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1007, - "watchers_count": 1007, + "stargazers_count": 1008, + "watchers_count": 1008, "forks_count": 229, "forks": 229, - "watchers": 1007, + "watchers": 1008, "score": 0 }, { diff --git a/2020/CVE-2020-8840.json b/2020/CVE-2020-8840.json index b517976f37..6b9cc6bd4e 100644 --- a/2020/CVE-2020-8840.json +++ b/2020/CVE-2020-8840.json @@ -59,13 +59,13 @@ "description": "CVE-2020-8840:FasterXML\/jackson-databind 远程代码执行漏洞", "fork": false, "created_at": "2020-02-24T07:43:12Z", - "updated_at": "2021-04-04T20:18:12Z", + "updated_at": "2021-04-27T07:19:06Z", "pushed_at": "2020-02-24T07:45:37Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "forks_count": 8, "forks": 8, - "watchers": 24, + "watchers": 25, "score": 0 }, { diff --git a/2021/CVE-2021-11123.json b/2021/CVE-2021-11123.json new file mode 100644 index 0000000000..ae87db6bb0 --- /dev/null +++ b/2021/CVE-2021-11123.json @@ -0,0 +1,25 @@ +[ + { + "id": 361967513, + "name": "cve-2021-11123", + "full_name": "chenanu123\/cve-2021-11123", + "owner": { + "login": "chenanu123", + "id": 59187344, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59187344?v=4", + "html_url": "https:\/\/github.com\/chenanu123" + }, + "html_url": "https:\/\/github.com\/chenanu123\/cve-2021-11123", + "description": "测试用的", + "fork": false, + "created_at": "2021-04-27T03:23:24Z", + "updated_at": "2021-04-27T03:23:26Z", + "pushed_at": "2021-04-27T03:23:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index a1b19b1fed..f6d7f71a3d 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,13 +13,13 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2021-04-25T06:53:32Z", + "updated_at": "2021-04-27T07:48:44Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 281, - "watchers_count": 281, + "stargazers_count": 282, + "watchers_count": 282, "forks_count": 66, "forks": 66, - "watchers": 281, + "watchers": 282, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "CVE-2021-1732 poc & exp; tested on 20H2", "fork": false, "created_at": "2021-04-23T08:21:54Z", - "updated_at": "2021-04-26T19:19:33Z", + "updated_at": "2021-04-27T08:27:04Z", "pushed_at": "2021-04-23T08:28:53Z", - "stargazers_count": 37, - "watchers_count": 37, - "forks_count": 8, - "forks": 8, - "watchers": 37, + "stargazers_count": 39, + "watchers_count": 39, + "forks_count": 9, + "forks": 9, + "watchers": 39, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "Read my blog for more info - ", "fork": false, "created_at": "2021-04-25T12:55:15Z", - "updated_at": "2021-04-25T15:12:48Z", + "updated_at": "2021-04-27T08:09:49Z", "pushed_at": "2021-04-25T14:16:30Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "forks": 1, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1782.json b/2021/CVE-2021-1782.json index d07a96f567..8ac82c4adb 100644 --- a/2021/CVE-2021-1782.json +++ b/2021/CVE-2021-1782.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-10T14:38:05Z", - "updated_at": "2021-04-22T13:41:30Z", + "updated_at": "2021-04-27T07:29:37Z", "pushed_at": "2021-02-10T14:39:04Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 4, "forks": 4, - "watchers": 20, + "watchers": 22, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json index 0535e82cad..7f3418215d 100644 --- a/2021/CVE-2021-21123.json +++ b/2021/CVE-2021-21123.json @@ -13,13 +13,13 @@ "description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...", "fork": false, "created_at": "2021-03-22T11:53:57Z", - "updated_at": "2021-04-23T00:46:54Z", + "updated_at": "2021-04-27T06:27:27Z", "pushed_at": "2021-03-22T18:24:20Z", - "stargazers_count": 104, - "watchers_count": 104, - "forks_count": 14, - "forks": 14, - "watchers": 104, + "stargazers_count": 105, + "watchers_count": 105, + "forks_count": 15, + "forks": 15, + "watchers": 105, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22192.json b/2021/CVE-2021-22192.json index 0d5a191b13..fd4bd2d9a1 100644 --- a/2021/CVE-2021-22192.json +++ b/2021/CVE-2021-22192.json @@ -13,13 +13,13 @@ "description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞", "fork": false, "created_at": "2021-03-27T07:09:46Z", - "updated_at": "2021-04-26T10:43:20Z", - "pushed_at": "2021-04-26T10:43:18Z", - "stargazers_count": 19, - "watchers_count": 19, + "updated_at": "2021-04-27T09:10:33Z", + "pushed_at": "2021-04-27T07:08:19Z", + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 3, "forks": 3, - "watchers": 19, + "watchers": 20, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 2e5db88cb0..6edea9c411 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-04-27T02:51:22Z", + "updated_at": "2021-04-27T08:07:39Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 678, - "watchers_count": 678, - "forks_count": 188, - "forks": 188, - "watchers": 678, + "stargazers_count": 682, + "watchers_count": 682, + "forks_count": 191, + "forks": 191, + "watchers": 682, "score": 0 }, { diff --git a/2021/CVE-2021-26868.json b/2021/CVE-2021-26868.json index 1520a884b9..cb0d571400 100644 --- a/2021/CVE-2021-26868.json +++ b/2021/CVE-2021-26868.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-04-26T14:21:30Z", - "updated_at": "2021-04-27T02:07:52Z", + "updated_at": "2021-04-27T04:29:35Z", "pushed_at": "2021-04-26T14:23:48Z", - "stargazers_count": 5, - "watchers_count": 5, - "forks_count": 0, - "forks": 0, - "watchers": 5, + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 1, + "forks": 1, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-30481.json b/2021/CVE-2021-30481.json index 4eb1d9c5a0..e6cfc5a7c8 100644 --- a/2021/CVE-2021-30481.json +++ b/2021/CVE-2021-30481.json @@ -13,13 +13,13 @@ "description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481", "fork": false, "created_at": "2021-04-17T01:29:31Z", - "updated_at": "2021-04-25T06:42:29Z", + "updated_at": "2021-04-27T08:58:39Z", "pushed_at": "2021-04-20T16:00:46Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "forks_count": 4, "forks": 4, - "watchers": 32, + "watchers": 33, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index ab8aea1ab3..9d263b6009 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2021-04-24T16:03:04Z", + "updated_at": "2021-04-27T06:19:08Z", "pushed_at": "2021-01-29T13:59:07Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 107, + "watchers_count": 107, "forks_count": 21, "forks": 21, - "watchers": 106, + "watchers": 107, "score": 0 }, { @@ -59,13 +59,13 @@ "description": null, "fork": false, "created_at": "2021-01-25T08:42:28Z", - "updated_at": "2021-04-25T14:13:29Z", + "updated_at": "2021-04-27T06:53:20Z", "pushed_at": "2021-01-25T08:49:59Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 1, "forks": 1, - "watchers": 8, + "watchers": 9, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 09ed4f2ec2..dfe6b04242 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -404,13 +404,13 @@ "description": null, "fork": false, "created_at": "2021-01-31T03:38:37Z", - "updated_at": "2021-02-01T05:02:49Z", + "updated_at": "2021-04-27T07:32:37Z", "pushed_at": "2021-01-31T04:02:08Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 6, - "forks": 6, - "watchers": 4, + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 8, + "forks": 8, + "watchers": 6, "score": 0 }, { @@ -661,8 +661,8 @@ "pushed_at": "2021-02-03T22:28:14Z", "stargazers_count": 38, "watchers_count": 38, - "forks_count": 17, - "forks": 17, + "forks_count": 18, + "forks": 18, "watchers": 38, "score": 0 }, @@ -891,8 +891,8 @@ "pushed_at": "2021-03-30T14:44:38Z", "stargazers_count": 284, "watchers_count": 284, - "forks_count": 46, - "forks": 46, + "forks_count": 47, + "forks": 47, "watchers": 284, "score": 0 }, diff --git a/2021/CVE-2021-3449.json b/2021/CVE-2021-3449.json index a8af6ad59c..a8453ee245 100644 --- a/2021/CVE-2021-3449.json +++ b/2021/CVE-2021-3449.json @@ -13,13 +13,13 @@ "description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻", "fork": false, "created_at": "2021-03-26T01:09:25Z", - "updated_at": "2021-04-26T18:21:45Z", + "updated_at": "2021-04-27T03:31:23Z", "pushed_at": "2021-04-26T18:21:42Z", - "stargazers_count": 189, - "watchers_count": 189, + "stargazers_count": 190, + "watchers_count": 190, "forks_count": 33, "forks": 33, - "watchers": 189, + "watchers": 190, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 0ad53cbe2e..98a1b2a7fd 100644 --- a/README.md +++ b/README.md @@ -291,6 +291,9 @@ The overlayfs implementation in the linux kernel did not properly validate with ### CVE-2021-9999 - [Reach-Z/CVE-2021-9999](https://github.com/Reach-Z/CVE-2021-9999) +### CVE-2021-11123 +- [chenanu123/cve-2021-11123](https://github.com/chenanu123/cve-2021-11123) + ### CVE-2021-21014 (2021-02-11) @@ -7345,6 +7348,14 @@ DOSBox 0.74-2 has Incorrect Access Control. - [Alexandre-Bartel/CVE-2019-12594](https://github.com/Alexandre-Bartel/CVE-2019-12594) +### CVE-2019-12725 (2019-07-19) + + +Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters. + + +- [givemefivw/CVE-2019-12725](https://github.com/givemefivw/CVE-2019-12725) + ### CVE-2019-12735 (2019-06-05)