diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 829cbddf18..1451f52a9b 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-21T13:50:05Z", + "updated_at": "2021-02-23T07:47:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 921, - "watchers_count": 921, + "stargazers_count": 922, + "watchers_count": 922, "forks_count": 217, "forks": 217, - "watchers": 921, + "watchers": 922, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 460aa69efd..dcbed13cc1 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-21T13:50:05Z", + "updated_at": "2021-02-23T07:47:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 921, - "watchers_count": 921, + "stargazers_count": 922, + "watchers_count": 922, "forks_count": 217, "forks": 217, - "watchers": 921, + "watchers": 922, "score": 0 }, { diff --git a/2017/CVE-2017-11176.json b/2017/CVE-2017-11176.json index 8a541f4c80..1cd8ef20d3 100644 --- a/2017/CVE-2017-11176.json +++ b/2017/CVE-2017-11176.json @@ -128,8 +128,8 @@ "description": "Anaysis cve-2017-11176 \/ mq_notify issue", "fork": false, "created_at": "2020-09-15T05:01:34Z", - "updated_at": "2021-02-13T16:07:07Z", - "pushed_at": "2021-02-13T16:07:05Z", + "updated_at": "2021-02-23T08:49:17Z", + "pushed_at": "2021-02-23T08:49:15Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2017/CVE-2017-11317.json b/2017/CVE-2017-11317.json index a06fc29850..3aa2ff9573 100644 --- a/2017/CVE-2017-11317.json +++ b/2017/CVE-2017-11317.json @@ -13,13 +13,13 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2021-02-10T22:33:34Z", + "updated_at": "2021-02-23T07:08:50Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 108, - "watchers_count": 108, - "forks_count": 34, - "forks": 34, - "watchers": 108, + "stargazers_count": 111, + "watchers_count": 111, + "forks_count": 35, + "forks": 35, + "watchers": 111, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 237b329136..c9bd5e8663 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-21T13:50:05Z", + "updated_at": "2021-02-23T07:47:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 921, - "watchers_count": 921, + "stargazers_count": 922, + "watchers_count": 922, "forks_count": 217, "forks": 217, - "watchers": 921, + "watchers": 922, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index ef18a47aea..0c7bdd16ab 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -13,13 +13,13 @@ "description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)", "fork": false, "created_at": "2018-01-16T00:23:34Z", - "updated_at": "2021-02-16T00:45:04Z", + "updated_at": "2021-02-23T07:08:24Z", "pushed_at": "2020-12-22T03:10:47Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "forks_count": 40, "forks": 40, - "watchers": 97, + "watchers": 98, "score": 0 }, { diff --git a/2018/CVE-2018-0296.json b/2018/CVE-2018-0296.json index 83ffd96547..c37b8742d0 100644 --- a/2018/CVE-2018-0296.json +++ b/2018/CVE-2018-0296.json @@ -36,13 +36,13 @@ "description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.", "fork": false, "created_at": "2018-06-21T15:44:29Z", - "updated_at": "2021-01-15T12:53:15Z", + "updated_at": "2021-02-23T07:11:20Z", "pushed_at": "2020-01-30T12:52:42Z", - "stargazers_count": 180, - "watchers_count": 180, + "stargazers_count": 181, + "watchers_count": 181, "forks_count": 68, "forks": 68, - "watchers": 180, + "watchers": 181, "score": 0 }, { diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index 27cf5d9fe9..7dc12679d0 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -151,13 +151,13 @@ "description": "Laravel RCE exploit. CVE-2018-15133", "fork": false, "created_at": "2020-12-21T22:02:08Z", - "updated_at": "2020-12-28T19:47:11Z", + "updated_at": "2021-02-23T05:29:05Z", "pushed_at": "2020-12-23T11:27:12Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 766bc2133c..2e7b5b3033 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-21T13:50:05Z", + "updated_at": "2021-02-23T07:47:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 921, - "watchers_count": 921, + "stargazers_count": 922, + "watchers_count": 922, "forks_count": 217, "forks": 217, - "watchers": 921, + "watchers": 922, "score": 0 }, { diff --git a/2018/CVE-2018-6981.json b/2018/CVE-2018-6981.json index 28844a01ef..3d2165a972 100644 --- a/2018/CVE-2018-6981.json +++ b/2018/CVE-2018-6981.json @@ -13,13 +13,13 @@ "description": "Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.", "fork": false, "created_at": "2018-11-13T18:47:37Z", - "updated_at": "2020-04-06T10:55:38Z", + "updated_at": "2021-02-23T05:23:41Z", "pushed_at": "2019-11-22T16:53:07Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 5, "forks": 5, - "watchers": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index c3213887f0..4a2e829a4b 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1232,13 +1232,13 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2021-02-13T06:23:51Z", + "updated_at": "2021-02-23T08:27:01Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 792, - "watchers_count": 792, + "stargazers_count": 793, + "watchers_count": 793, "forks_count": 194, "forks": 194, - "watchers": 792, + "watchers": 793, "score": 0 }, { diff --git a/2019/CVE-2019-12384.json b/2019/CVE-2019-12384.json index 29fce77ef9..0d62c6ea96 100644 --- a/2019/CVE-2019-12384.json +++ b/2019/CVE-2019-12384.json @@ -13,13 +13,13 @@ "description": "Jackson Rce For CVE-2019-12384 ", "fork": false, "created_at": "2019-07-24T07:12:14Z", - "updated_at": "2021-02-15T12:23:25Z", + "updated_at": "2021-02-23T06:04:25Z", "pushed_at": "2019-07-24T07:31:42Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "forks_count": 17, "forks": 17, - "watchers": 85, + "watchers": 86, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 1444b7a40c..18eabd6422 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-02-23T02:29:21Z", + "updated_at": "2021-02-23T08:54:03Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2349, - "watchers_count": 2349, + "stargazers_count": 2350, + "watchers_count": 2350, "forks_count": 664, "forks": 664, - "watchers": 2349, + "watchers": 2350, "score": 0 }, { diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 0c96a8b0bd..d9d2933adb 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -13,13 +13,13 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2021-02-10T22:33:34Z", + "updated_at": "2021-02-23T07:08:50Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 108, - "watchers_count": 108, - "forks_count": 34, - "forks": 34, - "watchers": 108, + "stargazers_count": 111, + "watchers_count": 111, + "forks_count": 35, + "forks": 35, + "watchers": 111, "score": 0 }, { diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 47c59bee80..084acb96c1 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2019-10-04T06:32:08Z", - "updated_at": "2021-02-22T08:27:41Z", + "updated_at": "2021-02-23T07:21:44Z", "pushed_at": "2019-11-12T03:58:00Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 63, + "watchers_count": 63, "forks_count": 25, "forks": 25, - "watchers": 64, + "watchers": 63, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 4cc580f3f0..6fcdb68493 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-21T13:50:05Z", + "updated_at": "2021-02-23T07:47:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 921, - "watchers_count": 921, + "stargazers_count": 922, + "watchers_count": 922, "forks_count": 217, "forks": 217, - "watchers": 921, + "watchers": 922, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index 6246c301de..39a46fab3b 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -109,8 +109,8 @@ "pushed_at": "2019-11-01T14:33:21Z", "stargazers_count": 113, "watchers_count": 113, - "forks_count": 57, - "forks": 57, + "forks_count": 58, + "forks": 58, "watchers": 113, "score": 0 }, diff --git a/2019/CVE-2019-5544.json b/2019/CVE-2019-5544.json index 8c597e49a2..710a06995f 100644 --- a/2019/CVE-2019-5544.json +++ b/2019/CVE-2019-5544.json @@ -13,13 +13,13 @@ "description": "Python script to scan for enabled OpenSLP services", "fork": false, "created_at": "2020-12-01T13:49:26Z", - "updated_at": "2021-02-10T23:19:23Z", + "updated_at": "2021-02-23T07:37:10Z", "pushed_at": "2020-12-07T00:12:21Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 2, "forks": 2, - "watchers": 11, + "watchers": 12, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "CVE-2020-3992 & CVE-2019-5544", "fork": false, "created_at": "2021-02-04T15:15:22Z", - "updated_at": "2021-02-17T15:18:18Z", + "updated_at": "2021-02-23T07:38:10Z", "pushed_at": "2021-02-05T06:40:50Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 1, "forks": 1, - "watchers": 12, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-8956.json b/2019/CVE-2019-8956.json index bf51f85008..7a8cb792eb 100644 --- a/2019/CVE-2019-8956.json +++ b/2019/CVE-2019-8956.json @@ -17,8 +17,8 @@ "pushed_at": "2019-05-28T07:15:56Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 5, "score": 0 } diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index ad32c72083..5aced460a0 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -197,13 +197,13 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2021-02-09T13:05:58Z", + "updated_at": "2021-02-23T08:47:00Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 267, - "watchers_count": 267, + "stargazers_count": 268, + "watchers_count": 268, "forks_count": 68, "forks": 68, - "watchers": 267, + "watchers": 268, "score": 0 }, { diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 1a2b1d90b9..1a21aa1e1b 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,13 +13,13 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2021-02-21T10:13:18Z", + "updated_at": "2021-02-23T08:30:32Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 500, - "watchers_count": 500, + "stargazers_count": 503, + "watchers_count": 503, "forks_count": 122, "forks": 122, - "watchers": 500, + "watchers": 503, "score": 0 }, { diff --git a/2020/CVE-2020-0814.json b/2020/CVE-2020-0814.json index 92f2b63ab0..323c4d1c3c 100644 --- a/2020/CVE-2020-0814.json +++ b/2020/CVE-2020-0814.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-04-07T01:17:32Z", - "updated_at": "2021-02-21T03:52:12Z", + "updated_at": "2021-02-23T04:44:19Z", "pushed_at": "2021-02-21T00:29:05Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index ead8a48651..ef479b22cc 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,13 +13,13 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2021-02-10T11:44:04Z", + "updated_at": "2021-02-23T08:42:51Z", "pushed_at": "2020-06-17T13:41:23Z", - "stargazers_count": 355, - "watchers_count": 355, + "stargazers_count": 356, + "watchers_count": 356, "forks_count": 63, "forks": 63, - "watchers": 355, + "watchers": 356, "score": 0 }, { diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index b1ed815fe9..ead563dd38 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -13,13 +13,13 @@ "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST", "fork": false, "created_at": "2020-03-11T17:51:29Z", - "updated_at": "2021-01-17T13:49:33Z", + "updated_at": "2021-02-23T05:59:43Z", "pushed_at": "2020-11-04T17:33:15Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 12, "forks": 12, - "watchers": 41, + "watchers": 42, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index de1bffc02f..861382b8ac 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2021-02-22T12:10:25Z", + "updated_at": "2021-02-23T06:36:46Z", "pushed_at": "2020-10-21T12:10:28Z", - "stargazers_count": 1243, - "watchers_count": 1243, + "stargazers_count": 1245, + "watchers_count": 1245, "forks_count": 289, "forks": 289, - "watchers": 1243, + "watchers": 1245, "score": 0 }, { @@ -82,7 +82,7 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2021-02-22T03:43:44Z", + "updated_at": "2021-02-23T04:25:15Z", "pushed_at": "2020-11-03T09:45:24Z", "stargazers_count": 759, "watchers_count": 759, @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2021-02-15T14:54:44Z", + "updated_at": "2021-02-23T04:25:11Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 285, - "watchers_count": 285, + "stargazers_count": 286, + "watchers_count": 286, "forks_count": 94, "forks": 94, - "watchers": 285, + "watchers": 286, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index cb8d6ff42e..da15f66579 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-02-23T02:29:21Z", + "updated_at": "2021-02-23T08:54:03Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2349, - "watchers_count": 2349, + "stargazers_count": 2350, + "watchers_count": 2350, "forks_count": 664, "forks": 664, - "watchers": 2349, + "watchers": 2350, "score": 0 }, { diff --git a/2020/CVE-2020-17523.json b/2020/CVE-2020-17523.json index ce59a08298..0fa4ab1bef 100644 --- a/2020/CVE-2020-17523.json +++ b/2020/CVE-2020-17523.json @@ -13,13 +13,13 @@ "description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析(带漏洞环境)", "fork": false, "created_at": "2021-02-03T08:14:03Z", - "updated_at": "2021-02-22T19:34:41Z", + "updated_at": "2021-02-23T07:52:42Z", "pushed_at": "2021-02-07T09:42:36Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 40, + "watchers_count": 40, "forks_count": 4, "forks": 4, - "watchers": 37, + "watchers": 40, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 8a8e751026..725de8ae46 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-02-21T13:50:05Z", + "updated_at": "2021-02-23T07:47:34Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 921, - "watchers_count": 921, + "stargazers_count": 922, + "watchers_count": 922, "forks_count": 217, "forks": 217, - "watchers": 921, + "watchers": 922, "score": 0 }, { diff --git a/2020/CVE-2020-27955.json b/2020/CVE-2020-27955.json index 9b9e438e21..6f82c70d21 100644 --- a/2020/CVE-2020-27955.json +++ b/2020/CVE-2020-27955.json @@ -94,14 +94,14 @@ { "id": 320394850, "name": "git-lfs-RCE-exploit-CVE-2020-27955-revshell", - "full_name": "WizZYou\/git-lfs-RCE-exploit-CVE-2020-27955-revshell", + "full_name": "williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell", "owner": { - "login": "WizZYou", + "login": "williamgoulois", "id": 37271970, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37271970?v=4", - "html_url": "https:\/\/github.com\/WizZYou" + "html_url": "https:\/\/github.com\/williamgoulois" }, - "html_url": "https:\/\/github.com\/WizZYou\/git-lfs-RCE-exploit-CVE-2020-27955-revshell", + "html_url": "https:\/\/github.com\/williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell", "description": null, "fork": false, "created_at": "2020-12-10T21:31:24Z", diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 849a5418a8..c34c88b484 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -59,13 +59,13 @@ "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", - "updated_at": "2021-02-14T00:10:57Z", + "updated_at": "2021-02-23T08:24:28Z", "pushed_at": "2020-04-16T08:38:42Z", - "stargazers_count": 230, - "watchers_count": 230, + "stargazers_count": 231, + "watchers_count": 231, "forks_count": 57, "forks": 57, - "watchers": 230, + "watchers": 231, "score": 0 }, { diff --git a/2020/CVE-2020-3992.json b/2020/CVE-2020-3992.json index 8c597e49a2..710a06995f 100644 --- a/2020/CVE-2020-3992.json +++ b/2020/CVE-2020-3992.json @@ -13,13 +13,13 @@ "description": "Python script to scan for enabled OpenSLP services", "fork": false, "created_at": "2020-12-01T13:49:26Z", - "updated_at": "2021-02-10T23:19:23Z", + "updated_at": "2021-02-23T07:37:10Z", "pushed_at": "2020-12-07T00:12:21Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 2, "forks": 2, - "watchers": 11, + "watchers": 12, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "CVE-2020-3992 & CVE-2019-5544", "fork": false, "created_at": "2021-02-04T15:15:22Z", - "updated_at": "2021-02-17T15:18:18Z", + "updated_at": "2021-02-23T07:38:10Z", "pushed_at": "2021-02-05T06:40:50Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 1, "forks": 1, - "watchers": 12, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json index e392b4efdb..53a33e83c8 100644 --- a/2020/CVE-2020-8554.json +++ b/2020/CVE-2020-8554.json @@ -59,13 +59,13 @@ "description": "Prisma Cloud Compute Admission rules to mitigate Kubernetes CVE-2020-8554", "fork": false, "created_at": "2020-12-20T04:22:43Z", - "updated_at": "2021-01-12T22:23:51Z", + "updated_at": "2021-02-23T07:38:24Z", "pushed_at": "2020-12-22T16:04:01Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 2, + "watchers": 1, "score": 0 }, { diff --git a/2021/CVE-2021-1727.json b/2021/CVE-2021-1727.json index 4084a0cc9c..e8402e9aa3 100644 --- a/2021/CVE-2021-1727.json +++ b/2021/CVE-2021-1727.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-16T16:55:46Z", - "updated_at": "2021-02-22T07:17:01Z", + "updated_at": "2021-02-23T04:48:46Z", "pushed_at": "2021-02-16T16:59:09Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 8, - "forks": 8, - "watchers": 13, + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 9, + "forks": 9, + "watchers": 14, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 5b9a702d00..e8bc7b4515 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2021-02-23T03:13:09Z", + "updated_at": "2021-02-23T09:07:40Z", "pushed_at": "2021-01-29T13:59:07Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 59, + "watchers_count": 59, "forks_count": 10, "forks": 10, - "watchers": 57, + "watchers": 59, "score": 0 }, { @@ -36,13 +36,13 @@ "description": "Laravel debug rce", "fork": false, "created_at": "2021-01-22T05:12:21Z", - "updated_at": "2021-02-22T04:57:40Z", + "updated_at": "2021-02-23T07:34:48Z", "pushed_at": "2021-01-24T05:28:07Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "forks_count": 23, "forks": 23, - "watchers": 63, + "watchers": 64, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index d3498c4980..3703ee0663 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -381,13 +381,13 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2021-02-23T02:42:00Z", + "updated_at": "2021-02-23T07:05:43Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 604, - "watchers_count": 604, + "stargazers_count": 606, + "watchers_count": 606, "forks_count": 171, "forks": 171, - "watchers": 604, + "watchers": 606, "score": 0 }, { @@ -477,8 +477,8 @@ "pushed_at": "2021-01-31T23:03:51Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 2, "score": 0 }, @@ -849,5 +849,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 341413027, + "name": "CVE-2021-3156", + "full_name": "oneoy\/CVE-2021-3156", + "owner": { + "login": "oneoy", + "id": 38435398, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4", + "html_url": "https:\/\/github.com\/oneoy" + }, + "html_url": "https:\/\/github.com\/oneoy\/CVE-2021-3156", + "description": null, + "fork": false, + "created_at": "2021-02-23T03:14:36Z", + "updated_at": "2021-02-23T03:14:48Z", + "pushed_at": "2021-02-23T03:14:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index aae4ea3d6a..a1177d3c55 100644 --- a/README.md +++ b/README.md @@ -124,6 +124,7 @@ Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalat - [jm33-m0/CVE-2021-3156](https://github.com/jm33-m0/CVE-2021-3156) - [Rvn0xsy/CVE-2021-3156-plus](https://github.com/Rvn0xsy/CVE-2021-3156-plus) - [r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability](https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability) +- [oneoy/CVE-2021-3156](https://github.com/oneoy/CVE-2021-3156) ### CVE-2021-3157 - [y3rb1t4/CVE-2021-3157](https://github.com/y3rb1t4/CVE-2021-3157) @@ -3763,7 +3764,7 @@ Git LFS 2.12.0 allows Remote Code Execution. - [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go) - [yhsung/cve-2020-27955-poc](https://github.com/yhsung/cve-2020-27955-poc) - [r00t4dm/CVE-2020-27955](https://github.com/r00t4dm/CVE-2020-27955) -- [WizZYou/git-lfs-RCE-exploit-CVE-2020-27955-revshell](https://github.com/WizZYou/git-lfs-RCE-exploit-CVE-2020-27955-revshell) +- [williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell](https://github.com/williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell) - [shubham0d/CVE-2020-27955](https://github.com/shubham0d/CVE-2020-27955) - [SilverSkyFlyingFeather/CVE-2020-27955-TEST](https://github.com/SilverSkyFlyingFeather/CVE-2020-27955-TEST) - [TheTh1nk3r/cve-2020-27955](https://github.com/TheTh1nk3r/cve-2020-27955)