diff --git a/2014/CVE-2014-7205.json b/2014/CVE-2014-7205.json index edd7b9983c..0a68c84f4a 100644 --- a/2014/CVE-2014-7205.json +++ b/2014/CVE-2014-7205.json @@ -13,13 +13,13 @@ "description": "Exploiting CVE-2014-7205 by injecting arbitrary JavaScript resulting in Remote Code Execution.", "fork": false, "created_at": "2021-04-05T17:02:36Z", - "updated_at": "2021-04-05T17:09:09Z", + "updated_at": "2021-04-17T22:24:57Z", "pushed_at": "2021-04-05T17:09:07Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 05167c2a10..596b20a893 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-04-17T14:45:41Z", + "updated_at": "2021-04-18T01:56:14Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 406, - "watchers_count": 406, + "stargazers_count": 407, + "watchers_count": 407, "forks_count": 96, "forks": 96, - "watchers": 406, + "watchers": 407, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6574.json b/2018/CVE-2018-6574.json index a63d068f5e..f45a2801b2 100644 --- a/2018/CVE-2018-6574.json +++ b/2018/CVE-2018-6574.json @@ -339,8 +339,8 @@ "pushed_at": "2019-04-08T08:58:42Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 2, - "forks": 2, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 7e05a9ad3d..e6c094b0ee 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-04-17T13:26:51Z", + "updated_at": "2021-04-17T22:10:43Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2509, - "watchers_count": 2509, + "stargazers_count": 2510, + "watchers_count": 2510, "forks_count": 721, "forks": 721, - "watchers": 2509, + "watchers": 2510, "score": 0 }, { diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 741ea0c699..6c6e2c90c1 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -36,13 +36,13 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2021-04-14T16:54:44Z", + "updated_at": "2021-04-17T22:23:50Z", "pushed_at": "2019-02-19T11:45:13Z", - "stargazers_count": 495, - "watchers_count": 495, + "stargazers_count": 496, + "watchers_count": 496, "forks_count": 121, "forks": 121, - "watchers": 495, + "watchers": 496, "score": 0 }, { diff --git a/2019/CVE-2019-6447.json b/2019/CVE-2019-6447.json index ab7a9b1bac..53d88a069d 100644 --- a/2019/CVE-2019-6447.json +++ b/2019/CVE-2019-6447.json @@ -13,13 +13,13 @@ "description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447", "fork": false, "created_at": "2019-01-09T22:30:42Z", - "updated_at": "2021-04-05T04:24:54Z", + "updated_at": "2021-04-17T21:52:30Z", "pushed_at": "2019-01-22T21:00:36Z", - "stargazers_count": 597, - "watchers_count": 597, + "stargazers_count": 596, + "watchers_count": 596, "forks_count": 131, "forks": 131, - "watchers": 597, + "watchers": 596, "score": 0 }, { diff --git a/2020/CVE-2020-10199.json b/2020/CVE-2020-10199.json index 6d057e4ee3..2258880e4f 100644 --- a/2020/CVE-2020-10199.json +++ b/2020/CVE-2020-10199.json @@ -82,13 +82,13 @@ "description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)", "fork": false, "created_at": "2020-04-16T09:40:15Z", - "updated_at": "2021-04-11T08:55:28Z", + "updated_at": "2021-04-18T02:36:14Z", "pushed_at": "2020-05-26T10:23:34Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "forks_count": 10, "forks": 10, - "watchers": 33, + "watchers": 34, "score": 0 }, { diff --git a/2020/CVE-2020-12928.json b/2020/CVE-2020-12928.json index 70567a1336..4ffabd931e 100644 --- a/2020/CVE-2020-12928.json +++ b/2020/CVE-2020-12928.json @@ -13,13 +13,13 @@ "description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#", "fork": false, "created_at": "2020-11-10T13:08:21Z", - "updated_at": "2021-02-14T15:08:06Z", + "updated_at": "2021-04-17T21:53:59Z", "pushed_at": "2021-02-14T15:08:01Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 14, "forks": 14, - "watchers": 13, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index ee2bc41612..8062a01d71 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -13,13 +13,13 @@ "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972", "fork": false, "created_at": "2020-03-11T17:51:29Z", - "updated_at": "2021-04-15T21:27:27Z", + "updated_at": "2021-04-18T01:26:15Z", "pushed_at": "2021-02-25T17:19:39Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "forks_count": 15, "forks": 15, - "watchers": 56, + "watchers": 57, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 0036f4a634..19f0f5ff64 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-04-17T13:26:51Z", + "updated_at": "2021-04-17T22:10:43Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2509, - "watchers_count": 2509, + "stargazers_count": 2510, + "watchers_count": 2510, "forks_count": 721, "forks": 721, - "watchers": 2509, + "watchers": 2510, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index f26b96afb7..c243916591 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -109,8 +109,8 @@ "pushed_at": "2021-04-11T03:25:34Z", "stargazers_count": 603, "watchers_count": 603, - "forks_count": 163, - "forks": 163, + "forks_count": 164, + "forks": 164, "watchers": 603, "score": 0 } diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 2677811bf1..114c801a44 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,13 +13,13 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2021-04-16T10:57:00Z", + "updated_at": "2021-04-17T21:52:57Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 276, - "watchers_count": 276, + "stargazers_count": 275, + "watchers_count": 275, "forks_count": 62, "forks": 62, - "watchers": 276, + "watchers": 275, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 3ce760912a..098d2012a7 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -13,13 +13,13 @@ "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972", "fork": false, "created_at": "2020-03-11T17:51:29Z", - "updated_at": "2021-04-15T21:27:27Z", + "updated_at": "2021-04-18T01:26:15Z", "pushed_at": "2021-02-25T17:19:39Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "forks_count": 15, "forks": 15, - "watchers": 56, + "watchers": 57, "score": 0 }, { diff --git a/2021/CVE-2021-25281.json b/2021/CVE-2021-25281.json index a218d540f9..d3e5c415c6 100644 --- a/2021/CVE-2021-25281.json +++ b/2021/CVE-2021-25281.json @@ -21,5 +21,28 @@ "forks": 4, "watchers": 22, "score": 0 + }, + { + "id": 359022063, + "name": "CVE-2021-25281", + "full_name": "SkyBulk\/CVE-2021-25281", + "owner": { + "login": "SkyBulk", + "id": 43649816, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43649816?v=4", + "html_url": "https:\/\/github.com\/SkyBulk" + }, + "html_url": "https:\/\/github.com\/SkyBulk\/CVE-2021-25281", + "description": "demo testing CVE-2021-25281", + "fork": false, + "created_at": "2021-04-18T01:55:23Z", + "updated_at": "2021-04-18T03:09:05Z", + "pushed_at": "2021-04-18T01:55:24Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index b450fa5f29..f57319995c 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -109,8 +109,8 @@ "pushed_at": "2021-04-11T03:25:34Z", "stargazers_count": 603, "watchers_count": 603, - "forks_count": 163, - "forks": 163, + "forks_count": 164, + "forks": 164, "watchers": 603, "score": 0 }, diff --git a/2021/CVE-2021-25679.json b/2021/CVE-2021-25679.json index a632248b4e..0d19c7b926 100644 --- a/2021/CVE-2021-25679.json +++ b/2021/CVE-2021-25679.json @@ -13,13 +13,13 @@ "description": "A repository hosting write ups for the 0 days CVE-2021-25679, CVE-2021-25680, and CVE-2021-25681 ", "fork": false, "created_at": "2021-03-03T20:06:54Z", - "updated_at": "2021-04-17T20:03:30Z", + "updated_at": "2021-04-17T21:39:42Z", "pushed_at": "2021-04-17T20:03:28Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index 0c6834f189..509e0853b8 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -10,16 +10,16 @@ "html_url": "https:\/\/github.com\/motikan2010" }, "html_url": "https:\/\/github.com\/motikan2010\/CVE-2021-29447", - "description": null, + "description": "WordPress - Authenticated XXE (CVE-2021-29447)", "fork": false, "created_at": "2021-04-16T20:41:26Z", - "updated_at": "2021-04-17T11:45:38Z", - "pushed_at": "2021-04-17T11:45:36Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2021-04-18T03:06:05Z", + "pushed_at": "2021-04-18T00:45:34Z", + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 1, "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 03a75dae6c..560915471d 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -381,13 +381,13 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2021-04-17T11:24:30Z", + "updated_at": "2021-04-18T02:13:30Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 687, - "watchers_count": 687, + "stargazers_count": 688, + "watchers_count": 688, "forks_count": 192, "forks": 192, - "watchers": 687, + "watchers": 688, "score": 0 }, { diff --git a/2021/CVE-2021-3449.json b/2021/CVE-2021-3449.json index ea936b5d0f..e0187856f5 100644 --- a/2021/CVE-2021-3449.json +++ b/2021/CVE-2021-3449.json @@ -13,13 +13,13 @@ "description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻", "fork": false, "created_at": "2021-03-26T01:09:25Z", - "updated_at": "2021-04-17T02:47:21Z", + "updated_at": "2021-04-18T02:47:26Z", "pushed_at": "2021-03-31T12:00:09Z", - "stargazers_count": 186, - "watchers_count": 186, + "stargazers_count": 188, + "watchers_count": 188, "forks_count": 33, "forks": 33, - "watchers": 186, + "watchers": 188, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 37fead6393..fd2f5691c9 100644 --- a/README.md +++ b/README.md @@ -520,6 +520,7 @@ An issue was discovered in through SaltStack Salt before 3002.5. salt-api does n - [Immersive-Labs-Sec/CVE-2021-25281](https://github.com/Immersive-Labs-Sec/CVE-2021-25281) +- [SkyBulk/CVE-2021-25281](https://github.com/SkyBulk/CVE-2021-25281) ### CVE-2021-25374 (2021-04-09)