From 24d539b8ae5b0f531f6ed8950352936aad5d38c8 Mon Sep 17 00:00:00 2001 From: motikan2010-bot <k.agena1993@gmail.com> Date: Fri, 26 Feb 2021 00:09:00 +0900 Subject: [PATCH] Auto Update 2021/02/26 00:09:00 --- 2014/CVE-2014-4210.json | 12 ++-- 2016/CVE-2016-0189.json | 8 +-- 2016/CVE-2016-0638.json | 12 ++-- 2017/CVE-2017-3248.json | 12 ++-- 2018/CVE-2018-12463.json | 4 +- 2018/CVE-2018-2628.json | 12 ++-- 2018/CVE-2018-5955.json | 8 +-- 2019/CVE-2019-0708.json | 8 +-- 2019/CVE-2019-15846.json | 8 +-- 2019/CVE-2019-17558.json | 12 ++-- 2019/CVE-2019-2618.json | 12 ++-- 2020/CVE-2020-0753.json | 23 ------- 2020/CVE-2020-0787.json | 4 +- 2020/CVE-2020-1472.json | 8 +-- 2020/CVE-2020-14882.json | 35 ++++++++-- 2020/CVE-2020-14883.json | 23 +++++++ 2020/CVE-2020-17519.json | 23 +++++++ 2020/CVE-2020-1938.json | 46 ------------- 2020/CVE-2020-2551.json | 12 ++-- 2020/CVE-2020-8597.json | 4 +- 2020/CVE-2020-9992.json | 8 +-- 2021/CVE-2021-1782.json | 12 ++-- 2021/CVE-2021-21972.json | 143 +++++++++++++++++++++++++++++---------- 2021/CVE-2021-24085.json | 8 +-- 2021/CVE-2021-3156.json | 16 ++--- README.md | 9 ++- 26 files changed, 277 insertions(+), 205 deletions(-) diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index cbb1ef7b82..807a608398 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-24T09:09:53Z", + "updated_at": "2021-02-25T12:50:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 924, - "watchers_count": 924, - "forks_count": 217, - "forks": 217, - "watchers": 924, + "stargazers_count": 926, + "watchers_count": 926, + "forks_count": 218, + "forks": 218, + "watchers": 926, "score": 0 }, { diff --git a/2016/CVE-2016-0189.json b/2016/CVE-2016-0189.json index aebcc95e40..d1dbe90677 100644 --- a/2016/CVE-2016-0189.json +++ b/2016/CVE-2016-0189.json @@ -13,13 +13,13 @@ "description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)", "fork": false, "created_at": "2016-06-22T23:03:30Z", - "updated_at": "2021-02-24T05:29:30Z", + "updated_at": "2021-02-25T12:01:42Z", "pushed_at": "2016-06-23T00:47:50Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 108, + "watchers_count": 108, "forks_count": 59, "forks": 59, - "watchers": 109, + "watchers": 108, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index ea0f6cb03d..daa23b381a 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-24T09:09:53Z", + "updated_at": "2021-02-25T12:50:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 924, - "watchers_count": 924, - "forks_count": 217, - "forks": 217, - "watchers": 924, + "stargazers_count": 926, + "watchers_count": 926, + "forks_count": 218, + "forks": 218, + "watchers": 926, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 39149d25fc..eb74b361b1 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-24T09:09:53Z", + "updated_at": "2021-02-25T12:50:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 924, - "watchers_count": 924, - "forks_count": 217, - "forks": 217, - "watchers": 924, + "stargazers_count": 926, + "watchers_count": 926, + "forks_count": 218, + "forks": 218, + "watchers": 926, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-12463.json b/2018/CVE-2018-12463.json index 236944a548..e2bd231fb6 100644 --- a/2018/CVE-2018-12463.json +++ b/2018/CVE-2018-12463.json @@ -17,8 +17,8 @@ "pushed_at": "2018-07-17T08:13:34Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 4, "score": 0 } diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ebb68734f2..341c7fe5f6 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-24T09:09:53Z", + "updated_at": "2021-02-25T12:50:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 924, - "watchers_count": 924, - "forks_count": 217, - "forks": 217, - "watchers": 924, + "stargazers_count": 926, + "watchers_count": 926, + "forks_count": 218, + "forks": 218, + "watchers": 926, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index ac84d788aa..4cdfd010b2 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-02-25T01:40:37Z", + "updated_at": "2021-02-25T09:23:41Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 371, - "watchers_count": 371, + "stargazers_count": 372, + "watchers_count": 372, "forks_count": 85, "forks": 85, - "watchers": 371, + "watchers": 372, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 390bb619f2..92f7f34955 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2244,13 +2244,13 @@ "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", - "updated_at": "2021-02-24T12:03:22Z", + "updated_at": "2021-02-25T12:42:32Z", "pushed_at": "2021-02-06T00:24:21Z", - "stargazers_count": 178, - "watchers_count": 178, + "stargazers_count": 179, + "watchers_count": 179, "forks_count": 69, "forks": 69, - "watchers": 178, + "watchers": 179, "score": 0 }, { diff --git a/2019/CVE-2019-15846.json b/2019/CVE-2019-15846.json index a518a8407b..ad17e55c0b 100644 --- a/2019/CVE-2019-15846.json +++ b/2019/CVE-2019-15846.json @@ -13,13 +13,13 @@ "description": "PoC materials to exploit CVE-2019-15846", "fork": false, "created_at": "2019-10-09T15:19:58Z", - "updated_at": "2021-02-17T01:29:27Z", + "updated_at": "2021-02-25T12:07:17Z", "pushed_at": "2019-10-10T09:55:59Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "forks_count": 9, "forks": 9, - "watchers": 26, + "watchers": 27, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index e3d7409f53..57e43140aa 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-02-24T08:30:09Z", + "updated_at": "2021-02-25T11:33:30Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2352, - "watchers_count": 2352, - "forks_count": 665, - "forks": 665, - "watchers": 2352, + "stargazers_count": 2353, + "watchers_count": 2353, + "forks_count": 666, + "forks": 666, + "watchers": 2353, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 77bfe45356..bdc861c16a 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-24T09:09:53Z", + "updated_at": "2021-02-25T12:50:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 924, - "watchers_count": 924, - "forks_count": 217, - "forks": 217, - "watchers": 924, + "stargazers_count": 926, + "watchers_count": 926, + "forks_count": 218, + "forks": 218, + "watchers": 926, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0753.json b/2020/CVE-2020-0753.json index f5f570c68f..047370189b 100644 --- a/2020/CVE-2020-0753.json +++ b/2020/CVE-2020-0753.json @@ -21,28 +21,5 @@ "forks": 11, "watchers": 14, "score": 0 - }, - { - "id": 242502226, - "name": "CVE-2020-0753-and-CVE-2020-0754", - "full_name": "VikasVarshney\/CVE-2020-0753-and-CVE-2020-0754", - "owner": { - "login": "VikasVarshney", - "id": 3353731, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3353731?v=4", - "html_url": "https:\/\/github.com\/VikasVarshney" - }, - "html_url": "https:\/\/github.com\/VikasVarshney\/CVE-2020-0753-and-CVE-2020-0754", - "description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six unfixed Window DOS Vulnerabilities.", - "fork": false, - "created_at": "2020-02-23T11:10:49Z", - "updated_at": "2020-03-11T13:36:15Z", - "pushed_at": "2020-02-22T13:57:48Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 13, - "forks": 13, - "watchers": 3, - "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 034a0f9d60..70447f0704 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -17,8 +17,8 @@ "pushed_at": "2020-09-11T07:38:22Z", "stargazers_count": 503, "watchers_count": 503, - "forks_count": 124, - "forks": 124, + "forks_count": 125, + "forks": 125, "watchers": 503, "score": 0 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 135b696516..ccf663cc0a 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2021-02-23T18:28:09Z", + "updated_at": "2021-02-25T11:07:20Z", "pushed_at": "2020-10-21T12:10:28Z", - "stargazers_count": 1245, - "watchers_count": 1245, + "stargazers_count": 1246, + "watchers_count": 1246, "forks_count": 289, "forks": 289, - "watchers": 1245, + "watchers": 1246, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index f9d41a0dd4..705842757a 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-02-24T08:30:09Z", + "updated_at": "2021-02-25T11:33:30Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2352, - "watchers_count": 2352, - "forks_count": 665, - "forks": 665, - "watchers": 2352, + "stargazers_count": 2353, + "watchers_count": 2353, + "forks_count": 666, + "forks": 666, + "watchers": 2353, "score": 0 }, { @@ -573,5 +573,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 342244938, + "name": "CVE-2020-14882", + "full_name": "milo2012\/CVE-2020-14882", + "owner": { + "login": "milo2012", + "id": 905335, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4", + "html_url": "https:\/\/github.com\/milo2012" + }, + "html_url": "https:\/\/github.com\/milo2012\/CVE-2020-14882", + "description": "CVE-2020-14882", + "fork": false, + "created_at": "2021-02-25T12:57:08Z", + "updated_at": "2021-02-25T12:58:49Z", + "pushed_at": "2021-02-25T12:58:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 0b665e44a7..e5386c59c1 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -67,5 +67,28 @@ "forks": 0, "watchers": 3, "score": 0 + }, + { + "id": 342220518, + "name": "westone-CVE-2020-14883-scanner", + "full_name": "Osyanina\/westone-CVE-2020-14883-scanner", + "owner": { + "login": "Osyanina", + "id": 78467376, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4", + "html_url": "https:\/\/github.com\/Osyanina" + }, + "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2020-14883-scanner", + "description": "A vulnerability scanner that detects CVE-2020-14883 vulnerabilities.", + "fork": false, + "created_at": "2021-02-25T11:21:56Z", + "updated_at": "2021-02-25T11:28:40Z", + "pushed_at": "2021-02-25T11:28:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17519.json b/2020/CVE-2020-17519.json index ef736e40e0..8425668b9a 100644 --- a/2020/CVE-2020-17519.json +++ b/2020/CVE-2020-17519.json @@ -159,5 +159,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 342216598, + "name": "westone-CVE-2020-17519-scanner", + "full_name": "Osyanina\/westone-CVE-2020-17519-scanner", + "owner": { + "login": "Osyanina", + "id": 78467376, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4", + "html_url": "https:\/\/github.com\/Osyanina" + }, + "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2020-17519-scanner", + "description": "A vulnerability scanner that detects CVE-2020-17519 vulnerabilities.", + "fork": false, + "created_at": "2021-02-25T11:06:05Z", + "updated_at": "2021-02-25T11:27:31Z", + "pushed_at": "2021-02-25T11:27:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 2ed31ba4b9..6f66729750 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -114,29 +114,6 @@ "watchers": 3, "score": 0 }, - { - "id": 242163769, - "name": "CVE-2020-1938TomcatAjpScanner", - "full_name": "woaiqiukui\/CVE-2020-1938TomcatAjpScanner", - "owner": { - "login": "woaiqiukui", - "id": 49117752, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49117752?v=4", - "html_url": "https:\/\/github.com\/woaiqiukui" - }, - "html_url": "https:\/\/github.com\/woaiqiukui\/CVE-2020-1938TomcatAjpScanner", - "description": "批量扫描TomcatAJP漏洞", - "fork": false, - "created_at": "2020-02-21T14:55:40Z", - "updated_at": "2021-01-26T08:06:51Z", - "pushed_at": "2020-02-22T01:58:22Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 2, - "forks": 2, - "watchers": 10, - "score": 0 - }, { "id": 242193832, "name": "tomcat-cve-2020-1938-check", @@ -160,29 +137,6 @@ "watchers": 3, "score": 0 }, - { - "id": 242284250, - "name": "GhostCat-LFI-exp", - "full_name": "ze0r\/GhostCat-LFI-exp", - "owner": { - "login": "ze0r", - "id": 43227253, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4", - "html_url": "https:\/\/github.com\/ze0r" - }, - "html_url": "https:\/\/github.com\/ze0r\/GhostCat-LFI-exp", - "description": "CVE-2020-1938", - "fork": false, - "created_at": "2020-02-22T05:17:09Z", - "updated_at": "2020-12-23T12:17:04Z", - "pushed_at": "2020-02-22T05:23:53Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 7, - "forks": 7, - "watchers": 10, - "score": 0 - }, { "id": 242345920, "name": "CNVD-2020-10487-Bulk-verification", diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index ffb0309f80..9cc3f345fe 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-24T09:09:53Z", + "updated_at": "2021-02-25T12:50:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 924, - "watchers_count": 924, - "forks_count": 217, - "forks": 217, - "watchers": 924, + "stargazers_count": 926, + "watchers_count": 926, + "forks_count": 218, + "forks": 218, + "watchers": 926, "score": 0 }, { diff --git a/2020/CVE-2020-8597.json b/2020/CVE-2020-8597.json index 11198953a1..d89d64a227 100644 --- a/2020/CVE-2020-8597.json +++ b/2020/CVE-2020-8597.json @@ -17,8 +17,8 @@ "pushed_at": "2020-03-10T19:01:21Z", "stargazers_count": 63, "watchers_count": 63, - "forks_count": 24, - "forks": 24, + "forks_count": 25, + "forks": 25, "watchers": 63, "score": 0 }, diff --git a/2020/CVE-2020-9992.json b/2020/CVE-2020-9992.json index d5e1d067ef..1d9feac44b 100644 --- a/2020/CVE-2020-9992.json +++ b/2020/CVE-2020-9992.json @@ -13,13 +13,13 @@ "description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device", "fork": false, "created_at": "2020-09-16T23:35:22Z", - "updated_at": "2021-02-21T15:40:41Z", + "updated_at": "2021-02-25T12:43:06Z", "pushed_at": "2020-09-23T14:52:06Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "forks_count": 9, "forks": 9, - "watchers": 48, + "watchers": 49, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1782.json b/2021/CVE-2021-1782.json index 980b1d3624..6e95ad5092 100644 --- a/2021/CVE-2021-1782.json +++ b/2021/CVE-2021-1782.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-10T14:38:05Z", - "updated_at": "2021-02-24T08:36:35Z", + "updated_at": "2021-02-25T12:54:58Z", "pushed_at": "2021-02-10T14:39:04Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 1, - "forks": 1, - "watchers": 13, + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 2, + "forks": 2, + "watchers": 14, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 20e2b6aba5..b7c615564d 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-24T09:56:21Z", - "updated_at": "2021-02-25T08:29:59Z", + "updated_at": "2021-02-25T11:05:47Z", "pushed_at": "2021-02-25T01:19:09Z", - "stargazers_count": 50, - "watchers_count": 50, - "forks_count": 35, - "forks": 35, - "watchers": 50, + "stargazers_count": 53, + "watchers_count": 53, + "forks_count": 36, + "forks": 36, + "watchers": 53, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2021-02-25T09:03:30Z", + "updated_at": "2021-02-25T14:19:05Z", "pushed_at": "2021-02-25T05:45:59Z", - "stargazers_count": 104, - "watchers_count": 104, - "forks_count": 47, - "forks": 47, - "watchers": 104, + "stargazers_count": 126, + "watchers_count": 126, + "forks_count": 54, + "forks": 54, + "watchers": 126, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "Proof of Concept Exploit for vCenter CVE-2021-21972", "fork": false, "created_at": "2021-02-24T16:31:34Z", - "updated_at": "2021-02-25T09:04:53Z", + "updated_at": "2021-02-25T14:36:33Z", "pushed_at": "2021-02-24T18:51:10Z", - "stargazers_count": 36, - "watchers_count": 36, - "forks_count": 12, - "forks": 12, - "watchers": 36, + "stargazers_count": 45, + "watchers_count": 45, + "forks_count": 16, + "forks": 16, + "watchers": 45, "score": 0 }, { @@ -105,8 +105,8 @@ "description": "A vulnerability scanner that detects CVE-2021-21972 vulnerabilities.", "fork": false, "created_at": "2021-02-25T03:19:25Z", - "updated_at": "2021-02-25T05:38:43Z", - "pushed_at": "2021-02-25T05:36:57Z", + "updated_at": "2021-02-25T11:27:10Z", + "pushed_at": "2021-02-25T11:27:08Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -128,13 +128,13 @@ "description": null, "fork": false, "created_at": "2021-02-25T05:10:06Z", - "updated_at": "2021-02-25T06:40:55Z", + "updated_at": "2021-02-25T14:09:45Z", "pushed_at": "2021-02-25T05:49:19Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 1, + "forks": 1, + "watchers": 9, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "CVE-2021-21972", "fork": false, "created_at": "2021-02-25T05:16:38Z", - "updated_at": "2021-02-25T06:35:11Z", + "updated_at": "2021-02-25T15:03:09Z", "pushed_at": "2021-02-25T05:21:50Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 2, + "forks": 2, + "watchers": 8, "score": 0 }, { @@ -197,13 +197,82 @@ "description": "VMware vCenter 未授权RCE(CVE-2021-21972)", "fork": false, "created_at": "2021-02-25T07:17:21Z", - "updated_at": "2021-02-25T08:31:54Z", - "pushed_at": "2021-02-25T07:32:59Z", - "stargazers_count": 2, - "watchers_count": 2, + "updated_at": "2021-02-25T13:38:18Z", + "pushed_at": "2021-02-25T09:54:53Z", + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 0, "forks": 0, - "watchers": 2, + "watchers": 7, + "score": 0 + }, + { + "id": 342190619, + "name": "CVE-2021-21972", + "full_name": "L-pin\/CVE-2021-21972", + "owner": { + "login": "L-pin", + "id": 23657203, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23657203?v=4", + "html_url": "https:\/\/github.com\/L-pin" + }, + "html_url": "https:\/\/github.com\/L-pin\/CVE-2021-21972", + "description": null, + "fork": false, + "created_at": "2021-02-25T09:28:17Z", + "updated_at": "2021-02-25T09:54:49Z", + "pushed_at": "2021-02-25T09:54:48Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 342203695, + "name": "CVE-2021-21972", + "full_name": "B1anda0\/CVE-2021-21972", + "owner": { + "login": "B1anda0", + "id": 74232513, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4", + "html_url": "https:\/\/github.com\/B1anda0" + }, + "html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-21972", + "description": "VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本", + "fork": false, + "created_at": "2021-02-25T10:16:20Z", + "updated_at": "2021-02-25T11:35:04Z", + "pushed_at": "2021-02-25T10:26:53Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 342246923, + "name": "CVE-2021-21972", + "full_name": "renini\/CVE-2021-21972", + "owner": { + "login": "renini", + "id": 1587083, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1587083?v=4", + "html_url": "https:\/\/github.com\/renini" + }, + "html_url": "https:\/\/github.com\/renini\/CVE-2021-21972", + "description": "CVE-2021-21972", + "fork": false, + "created_at": "2021-02-25T13:04:37Z", + "updated_at": "2021-02-25T13:15:22Z", + "pushed_at": "2021-02-25T13:11:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-24085.json b/2021/CVE-2021-24085.json index 50b8ffe47b..d3c789bb12 100644 --- a/2021/CVE-2021-24085.json +++ b/2021/CVE-2021-24085.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-15T14:41:25Z", - "updated_at": "2021-02-24T22:20:06Z", + "updated_at": "2021-02-25T10:16:36Z", "pushed_at": "2021-02-15T15:11:00Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 4, "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index d409ca82e0..fbe8db3c38 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -381,13 +381,13 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2021-02-24T19:41:25Z", + "updated_at": "2021-02-25T11:35:49Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 612, - "watchers_count": 612, + "stargazers_count": 613, + "watchers_count": 613, "forks_count": 173, "forks": 173, - "watchers": 612, + "watchers": 613, "score": 0 }, { @@ -726,13 +726,13 @@ "description": "CVE-2021-3156漏洞复现", "fork": false, "created_at": "2021-02-07T11:09:51Z", - "updated_at": "2021-02-24T04:59:21Z", + "updated_at": "2021-02-25T11:05:51Z", "pushed_at": "2021-02-07T11:10:01Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/README.md b/README.md index f0d051a3bd..a60743cca8 100644 --- a/README.md +++ b/README.md @@ -211,6 +211,9 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v - [milo2012/CVE-2021-21972](https://github.com/milo2012/CVE-2021-21972) - [Udyz/CVE-2021-21972](https://github.com/Udyz/CVE-2021-21972) - [conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972](https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972) +- [L-pin/CVE-2021-21972](https://github.com/L-pin/CVE-2021-21972) +- [B1anda0/CVE-2021-21972](https://github.com/B1anda0/CVE-2021-21972) +- [renini/CVE-2021-21972](https://github.com/renini/CVE-2021-21972) ### CVE-2021-24085 - [sourceincite/CVE-2021-24085](https://github.com/sourceincite/CVE-2021-24085) @@ -527,7 +530,6 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER) </code> - [afang5472/CVE-2020-0753-and-CVE-2020-0754](https://github.com/afang5472/CVE-2020-0753-and-CVE-2020-0754) -- [VikasVarshney/CVE-2020-0753-and-CVE-2020-0754](https://github.com/VikasVarshney/CVE-2020-0753-and-CVE-2020-0754) ### CVE-2020-0787 (2020-03-12) @@ -898,9 +900,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc - [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC) - [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner) - [dacade/CVE-2020-1938](https://github.com/dacade/CVE-2020-1938) -- [woaiqiukui/CVE-2020-1938TomcatAjpScanner](https://github.com/woaiqiukui/CVE-2020-1938TomcatAjpScanner) - [fatal0/tomcat-cve-2020-1938-check](https://github.com/fatal0/tomcat-cve-2020-1938-check) -- [ze0r/GhostCat-LFI-exp](https://github.com/ze0r/GhostCat-LFI-exp) - [delsadan/CNVD-2020-10487-Bulk-verification](https://github.com/delsadan/CNVD-2020-10487-Bulk-verification) - [00theway/Ghostcat-CNVD-2020-10487](https://github.com/00theway/Ghostcat-CNVD-2020-10487) - [shaunmclernon/ghostcat-verification](https://github.com/shaunmclernon/ghostcat-verification) @@ -2863,6 +2863,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [securitysqs/poc](https://github.com/securitysqs/poc) - [ShmilySec/CVE-2020-14882](https://github.com/ShmilySec/CVE-2020-14882) - [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic) +- [milo2012/CVE-2020-14882](https://github.com/milo2012/CVE-2020-14882) ### CVE-2020-14883 (2020-10-21) @@ -2873,6 +2874,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [murataydemir/CVE-2020-14883](https://github.com/murataydemir/CVE-2020-14883) - [B1anda0/CVE-2020-14883](https://github.com/B1anda0/CVE-2020-14883) - [fan1029/CVE-2020-14883EXP](https://github.com/fan1029/CVE-2020-14883EXP) +- [Osyanina/westone-CVE-2020-14883-scanner](https://github.com/Osyanina/westone-CVE-2020-14883-scanner) ### CVE-2020-14947 (2020-06-30) @@ -3236,6 +3238,7 @@ A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as - [murataydemir/CVE-2020-17519](https://github.com/murataydemir/CVE-2020-17519) - [radbsie/CVE-2020-17519-Exp](https://github.com/radbsie/CVE-2020-17519-Exp) - [yaunsky/CVE-2020-17519-Apache-Flink](https://github.com/yaunsky/CVE-2020-17519-Apache-Flink) +- [Osyanina/westone-CVE-2020-17519-scanner](https://github.com/Osyanina/westone-CVE-2020-17519-scanner) ### CVE-2020-17523 (2021-02-03)