Auto Update 2021/01/22 18:10:38

This commit is contained in:
motikan2010-bot 2021-01-22 18:10:38 +09:00
parent bfab2b1064
commit 4ac38a728c
23 changed files with 230 additions and 197 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-21T15:58:16Z",
"updated_at": "2021-01-22T03:12:11Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 887,
"watchers_count": 887,
"stargazers_count": 888,
"watchers_count": 888,
"forks_count": 208,
"forks": 208,
"watchers": 887,
"watchers": 888,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-21T15:58:16Z",
"updated_at": "2021-01-22T03:12:11Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 887,
"watchers_count": 887,
"stargazers_count": 888,
"watchers_count": 888,
"forks_count": 208,
"forks": 208,
"watchers": 887,
"watchers": 888,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-21T15:58:16Z",
"updated_at": "2021-01-22T03:12:11Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 887,
"watchers_count": 887,
"stargazers_count": 888,
"watchers_count": 888,
"forks_count": 208,
"forks": 208,
"watchers": 887,
"watchers": 888,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 297045515,
"name": "cve-2018-1002101",
"full_name": "se0g1\/cve-2018-1002101",
"owner": {
"login": "se0g1",
"id": 31495924,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31495924?v=4",
"html_url": "https:\/\/github.com\/se0g1"
},
"html_url": "https:\/\/github.com\/se0g1\/cve-2018-1002101",
"description": null,
"fork": false,
"created_at": "2020-09-20T09:48:06Z",
"updated_at": "2020-09-22T12:29:56Z",
"pushed_at": "2020-09-22T12:29:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-21T15:58:16Z",
"updated_at": "2021-01-22T03:12:11Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 887,
"watchers_count": 887,
"stargazers_count": 888,
"watchers_count": 888,
"forks_count": 208,
"forks": 208,
"watchers": 887,
"watchers": 888,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 445,
"watchers_count": 445,
"forks_count": 204,
"forks": 204,
"forks_count": 205,
"forks": 205,
"watchers": 445,
"score": 0
},

View file

@ -1439,13 +1439,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-01-20T17:54:00Z",
"updated_at": "2021-01-22T04:33:34Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1057,
"watchers_count": 1057,
"stargazers_count": 1056,
"watchers_count": 1056,
"forks_count": 354,
"forks": 354,
"watchers": 1057,
"watchers": 1056,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-21T14:09:59Z",
"updated_at": "2021-01-22T06:39:48Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2284,
"watchers_count": 2284,
"forks_count": 641,
"forks": 641,
"watchers": 2284,
"stargazers_count": 2285,
"watchers_count": 2285,
"forks_count": 642,
"forks": 642,
"watchers": 2285,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-01-21T00:40:18Z",
"updated_at": "2021-01-22T08:22:13Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 706,
"watchers_count": 706,
"stargazers_count": 707,
"watchers_count": 707,
"forks_count": 145,
"forks": 145,
"watchers": 706,
"watchers": 707,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-21T15:58:16Z",
"updated_at": "2021-01-22T03:12:11Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 887,
"watchers_count": 887,
"stargazers_count": 888,
"watchers_count": 888,
"forks_count": 208,
"forks": 208,
"watchers": 887,
"watchers": 888,
"score": 0
}
]

View file

@ -45,29 +45,6 @@
"watchers": 5,
"score": 0
},
{
"id": 234191063,
"name": "CurveBall",
"full_name": "ollypwn\/CurveBall",
"owner": {
"login": "ollypwn",
"id": 53348818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ollypwn"
},
"html_url": "https:\/\/github.com\/ollypwn\/CurveBall",
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2021-01-19T17:43:43Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 851,
"watchers_count": 851,
"forks_count": 221,
"forks": 221,
"watchers": 851,
"score": 0
},
{
"id": 234192123,
"name": "chainoffools",
@ -160,52 +137,6 @@
"watchers": 60,
"score": 0
},
{
"id": 234442281,
"name": "cve-2020-0601-utils",
"full_name": "0xxon\/cve-2020-0601-utils",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
"fork": false,
"created_at": "2020-01-17T01:02:52Z",
"updated_at": "2020-01-21T19:49:00Z",
"pushed_at": "2020-01-21T19:48:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 235145190,
"name": "curveball",
"full_name": "gentilkiwi\/curveball",
"owner": {
"login": "gentilkiwi",
"id": 2307945,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2307945?v=4",
"html_url": "https:\/\/github.com\/gentilkiwi"
},
"html_url": "https:\/\/github.com\/gentilkiwi\/curveball",
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2021-01-09T15:45:54Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 11,
"forks": 11,
"watchers": 64,
"score": 0
},
{
"id": 235858699,
"name": "CurveBall",

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-0688 - Exchange",
"fork": false,
"created_at": "2020-02-26T12:28:11Z",
"updated_at": "2020-12-15T10:41:52Z",
"updated_at": "2021-01-22T08:39:05Z",
"pushed_at": "2020-02-27T03:50:07Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 22,
"forks": 22,
"watchers": 50,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 23,
"forks": 23,
"watchers": 52,
"score": 0
},
{

View file

@ -910,13 +910,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-01-21T15:58:25Z",
"updated_at": "2021-01-22T03:39:41Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1062,
"watchers_count": 1062,
"stargazers_count": 1063,
"watchers_count": 1063,
"forks_count": 356,
"forks": 356,
"watchers": 1062,
"watchers": 1063,
"score": 0
},
{

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 331862557,
"name": "CVE-2020-13937",
"full_name": "Al1ex\/CVE-2020-13937",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-13937",
"description": "Apache Kylin API Unauthorized Access",
"fork": false,
"created_at": "2021-01-22T06:53:34Z",
"updated_at": "2021-01-22T08:18:45Z",
"pushed_at": "2021-01-22T07:00:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -335,13 +335,13 @@
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2021-01-21T06:52:07Z",
"updated_at": "2021-01-22T06:50:16Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 9,
"forks": 9,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-21T14:09:59Z",
"updated_at": "2021-01-22T06:39:48Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2284,
"watchers_count": 2284,
"forks_count": 641,
"forks": 641,
"watchers": 2284,
"stargazers_count": 2285,
"watchers_count": 2285,
"forks_count": 642,
"forks": 642,
"watchers": 2285,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-22T02:52:28Z",
"updated_at": "2021-01-22T08:56:13Z",
"pushed_at": "2021-01-13T10:38:48Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 792,
"watchers_count": 792,
"forks_count": 144,
"forks": 144,
"watchers": 788,
"watchers": 792,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2020-12-07T21:03:39Z",
"updated_at": "2021-01-22T06:53:25Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 215,
"watchers_count": 215,
"forks_count": 95,
"forks": 95,
"watchers": 214,
"watchers": 215,
"score": 0
},
{
@ -312,13 +312,13 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2021-01-19T15:05:58Z",
"updated_at": "2021-01-22T07:34:31Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 60,
"forks": 60,
"watchers": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 61,
"forks": 61,
"watchers": 166,
"score": 0
},
{

25
2020/CVE-2020-26258.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 331887269,
"name": "CVE-2020-26258",
"full_name": "Al1ex\/CVE-2020-26258",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-26258",
"description": "CVE-2020-26258 && XStream SSRF",
"fork": false,
"created_at": "2021-01-22T08:44:24Z",
"updated_at": "2021-01-22T08:45:00Z",
"pushed_at": "2021-01-22T08:44:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2021-01-22T02:25:46Z",
"updated_at": "2021-01-22T07:29:01Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 32,
"forks": 32,
"watchers": 211,
"watchers": 212,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
"fork": false,
"created_at": "2021-01-14T10:49:40Z",
"updated_at": "2021-01-21T23:32:08Z",
"updated_at": "2021-01-22T08:42:55Z",
"pushed_at": "2021-01-15T16:25:19Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 9,
"forks": 9,
"watchers": 26,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 11,
"forks": 11,
"watchers": 29,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Detect vulns liferay CVE-2020-7961 by Nattroc (EOG Team)",
"fork": false,
"created_at": "2020-10-17T08:32:51Z",
"updated_at": "2020-10-17T08:34:51Z",
"updated_at": "2021-01-22T03:15:56Z",
"pushed_at": "2020-10-17T08:34:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "POC-CVE-2020-7961-Token-iterate",
"fork": false,
"created_at": "2020-12-08T08:22:18Z",
"updated_at": "2020-12-24T16:52:06Z",
"updated_at": "2021-01-22T03:15:54Z",
"pushed_at": "2020-12-08T08:35:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

48
2021/CVE-2021-2109.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 331847444,
"name": "CVE-2021-2109",
"full_name": "Al1ex\/CVE-2021-2109",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-2109",
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
"fork": false,
"created_at": "2021-01-22T05:37:11Z",
"updated_at": "2021-01-22T08:52:53Z",
"pushed_at": "2021-01-22T05:52:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 331873303,
"name": "CVE-2021-2109",
"full_name": "rabbitsafe\/CVE-2021-2109",
"owner": {
"login": "rabbitsafe",
"id": 33046073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
"html_url": "https:\/\/github.com\/rabbitsafe"
},
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-2109",
"description": null,
"fork": false,
"created_at": "2021-01-22T07:43:46Z",
"updated_at": "2021-01-22T08:34:13Z",
"pushed_at": "2021-01-22T08:34:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,36 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-01-22T00:14:39Z",
"updated_at": "2021-01-22T03:18:07Z",
"pushed_at": "2021-01-13T13:25:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
"id": 331843308,
"name": "CVE-2021-3129",
"full_name": "SNCKER\/CVE-2021-3129",
"owner": {
"login": "SNCKER",
"id": 49559334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4",
"html_url": "https:\/\/github.com\/SNCKER"
},
"html_url": "https:\/\/github.com\/SNCKER\/CVE-2021-3129",
"description": "laravel debug rce",
"fork": false,
"created_at": "2021-01-22T05:12:21Z",
"updated_at": "2021-01-22T08:49:12Z",
"pushed_at": "2021-01-22T05:43:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -17,6 +17,15 @@ Microsoft Defender Remote Code Execution Vulnerability
- [dmlgzs/cve-2021-1647](https://github.com/dmlgzs/cve-2021-1647)
### CVE-2021-2109 (2021-01-20)
<code>
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
</code>
- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109)
- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109)
### CVE-2021-3019 (2021-01-04)
<code>
@ -34,6 +43,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
</code>
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
### CVE-2021-3130 (2021-01-20)
@ -179,13 +189,10 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
- [ollypwn/CurveBall](https://github.com/ollypwn/CurveBall)
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
- [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
- [ioncodes/Curveball](https://github.com/ioncodes/Curveball)
@ -2449,6 +2456,7 @@ Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.
</code>
- [yaunsky/CVE-2020-13937](https://github.com/yaunsky/CVE-2020-13937)
- [Al1ex/CVE-2020-13937](https://github.com/Al1ex/CVE-2020-13937)
### CVE-2020-13942 (2020-11-24)
@ -3384,6 +3392,14 @@ XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnera
- [novysodope/CVE-2020-26217-XStream-RCE-POC](https://github.com/novysodope/CVE-2020-26217-XStream-RCE-POC)
### CVE-2020-26258 (2020-12-15)
<code>
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
</code>
- [Al1ex/CVE-2020-26258](https://github.com/Al1ex/CVE-2020-26258)
### CVE-2020-26259 (2020-12-15)
<code>
@ -10735,14 +10751,6 @@ A code execution vulnerability exists in the Stapler web framework used by Jenki
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
- [xDro1d/CVE-2018-1000861](https://github.com/xDro1d/CVE-2018-1000861)
### CVE-2018-1002101 (2018-12-05)
<code>
In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.
</code>
- [se0g1/cve-2018-1002101](https://github.com/se0g1/cve-2018-1002101)
### CVE-2018-1002105 (2018-12-05)
<code>