From 4cb25e55f50ce665e635bc7f4192d27c3d635ec7 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 22 Jun 2021 18:11:29 +0900 Subject: [PATCH] Auto Update 2021/06/22 18:11:29 --- 2015/CVE-2015-1635.json | 4 ++-- 2016/CVE-2016-4437.json | 23 +++++++++++++++++++++++ 2017/CVE-2017-3066.json | 4 ++-- 2017/CVE-2017-5753.json | 8 ++++---- 2018/CVE-2018-15473.json | 8 ++++---- 2018/CVE-2018-8120.json | 4 ++-- 2018/CVE-2018-9995.json | 8 ++++---- 2019/CVE-2019-10999.json | 4 ++-- 2019/CVE-2019-1388.json | 8 ++++---- 2019/CVE-2019-17558.json | 2 +- 2019/CVE-2019-5736.json | 4 ++-- 2020/CVE-2020-1066.json | 8 ++++---- 2020/CVE-2020-14882.json | 10 +++++----- 2020/CVE-2020-14883.json | 16 ++++++++-------- 2020/CVE-2020-36179.json | 8 ++++---- 2020/CVE-2020-3952.json | 8 ++++---- 2020/CVE-2020-5902.json | 4 ++-- 2021/CVE-2021-21315.json | 8 ++++---- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-21985.json | 20 ++++++++++---------- 2021/CVE-2021-22214.json | 10 +++++----- 2021/CVE-2021-23132.json | 4 ++-- 2021/CVE-2021-25646.json | 8 ++++---- 2021/CVE-2021-26855.json | 8 ++++---- 2021/CVE-2021-33739.json | 4 ++-- 2021/CVE-2021-3560.json | 35 ++++++----------------------------- README.md | 2 +- 27 files changed, 119 insertions(+), 119 deletions(-) diff --git a/2015/CVE-2015-1635.json b/2015/CVE-2015-1635.json index 89a2ae8fcc..4d0ecceb62 100644 --- a/2015/CVE-2015-1635.json +++ b/2015/CVE-2015-1635.json @@ -40,8 +40,8 @@ "pushed_at": "2015-04-16T07:38:06Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 2, - "forks": 2, + "forks_count": 3, + "forks": 3, "watchers": 1, "score": 0 }, diff --git a/2016/CVE-2016-4437.json b/2016/CVE-2016-4437.json index 08096d825b..0e8b4a0816 100644 --- a/2016/CVE-2016-4437.json +++ b/2016/CVE-2016-4437.json @@ -21,5 +21,28 @@ "forks": 13, "watchers": 37, "score": 0 + }, + { + "id": 379160696, + "name": "CVE-2016-4437", + "full_name": "m3terpreter\/CVE-2016-4437", + "owner": { + "login": "m3terpreter", + "id": 24810792, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24810792?v=4", + "html_url": "https:\/\/github.com\/m3terpreter" + }, + "html_url": "https:\/\/github.com\/m3terpreter\/CVE-2016-4437", + "description": null, + "fork": false, + "created_at": "2021-06-22T06:08:55Z", + "updated_at": "2021-06-22T06:08:58Z", + "pushed_at": "2021-06-22T06:08:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3066.json b/2017/CVE-2017-3066.json index bc5b60a98e..887cc4c3e6 100644 --- a/2017/CVE-2017-3066.json +++ b/2017/CVE-2017-3066.json @@ -17,8 +17,8 @@ "pushed_at": "2018-03-12T16:50:20Z", "stargazers_count": 59, "watchers_count": 59, - "forks_count": 22, - "forks": 22, + "forks_count": 23, + "forks": 23, "watchers": 59, "score": 0 }, diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index 12dc3d6f9f..ecd5cab7cc 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -13,13 +13,13 @@ "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", "fork": false, "created_at": "2018-01-04T00:28:50Z", - "updated_at": "2021-06-09T17:27:32Z", + "updated_at": "2021-06-22T03:47:38Z", "pushed_at": "2018-01-10T01:14:44Z", - "stargazers_count": 698, - "watchers_count": 698, + "stargazers_count": 699, + "watchers_count": 699, "forks_count": 186, "forks": 186, - "watchers": 698, + "watchers": 699, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 3499e1802d..bf31e8dc59 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -59,13 +59,13 @@ "description": "Exploit written in Python for CVE-2018-15473 with threading and export formats", "fork": false, "created_at": "2018-08-21T00:09:56Z", - "updated_at": "2021-06-17T05:39:52Z", + "updated_at": "2021-06-22T06:02:34Z", "pushed_at": "2020-08-18T00:00:15Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 444, + "watchers_count": 444, "forks_count": 155, "forks": 155, - "watchers": 443, + "watchers": 444, "score": 0 }, { diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index fbdff47802..979ad15e00 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -86,8 +86,8 @@ "pushed_at": "2018-08-08T05:48:24Z", "stargazers_count": 282, "watchers_count": 282, - "forks_count": 121, - "forks": 121, + "forks_count": 122, + "forks": 122, "watchers": 282, "score": 0 }, diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index 7fcce4602a..3ea5e192a5 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -128,13 +128,13 @@ "description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995", "fork": false, "created_at": "2018-09-23T20:58:40Z", - "updated_at": "2021-05-03T01:41:19Z", + "updated_at": "2021-06-22T04:53:32Z", "pushed_at": "2018-10-11T16:54:31Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 82, + "watchers_count": 82, "forks_count": 41, "forks": 41, - "watchers": 83, + "watchers": 82, "score": 0 }, { diff --git a/2019/CVE-2019-10999.json b/2019/CVE-2019-10999.json index f8e39ccab1..d14bd922cc 100644 --- a/2019/CVE-2019-10999.json +++ b/2019/CVE-2019-10999.json @@ -17,8 +17,8 @@ "pushed_at": "2020-08-08T16:58:05Z", "stargazers_count": 13, "watchers_count": 13, - "forks_count": 4, - "forks": 4, + "forks_count": 5, + "forks": 5, "watchers": 13, "score": 0 } diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index 63ca7792c3..e92b96bb84 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -13,13 +13,13 @@ "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", "fork": false, "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2021-06-18T03:27:32Z", + "updated_at": "2021-06-22T04:48:37Z", "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "forks_count": 39, "forks": 39, - "watchers": 108, + "watchers": 109, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 41cd52dc51..7e3d843908 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,7 +36,7 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-06-21T08:33:46Z", + "updated_at": "2021-06-22T06:09:16Z", "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 2638, "watchers_count": 2638, diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 9ed3f80e70..ca6243354b 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -40,8 +40,8 @@ "pushed_at": "2019-02-19T11:45:13Z", "stargazers_count": 515, "watchers_count": 515, - "forks_count": 133, - "forks": 133, + "forks_count": 134, + "forks": 134, "watchers": 515, "score": 0 }, diff --git a/2020/CVE-2020-1066.json b/2020/CVE-2020-1066.json index e108ebb4a0..c34507ae97 100644 --- a/2020/CVE-2020-1066.json +++ b/2020/CVE-2020-1066.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统", "fork": false, "created_at": "2020-06-01T04:44:05Z", - "updated_at": "2021-04-26T14:55:09Z", + "updated_at": "2021-06-22T07:51:41Z", "pushed_at": "2020-06-17T00:56:08Z", - "stargazers_count": 161, - "watchers_count": 161, + "stargazers_count": 162, + "watchers_count": 162, "forks_count": 42, "forks": 42, - "watchers": 161, + "watchers": 162, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index e1c4bedcab..52956303ab 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,7 +13,7 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-06-21T08:33:46Z", + "updated_at": "2021-06-22T06:09:16Z", "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 2638, "watchers_count": 2638, @@ -588,13 +588,13 @@ "description": "CVE-2020-14882_Exploit 支持12.2.X和10.3.6版本,12.2.x可回显", "fork": false, "created_at": "2021-04-07T09:48:49Z", - "updated_at": "2021-06-02T06:14:10Z", + "updated_at": "2021-06-22T09:03:33Z", "pushed_at": "2021-06-01T13:54:00Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 2, "forks": 2, - "watchers": 12, + "watchers": 13, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 1282cc1d46..7a0720ab25 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -59,13 +59,13 @@ "description": "用于对WebLogic(10.3.6.0.0 ;12.1.3.0.0 ;12.2.1.3.0; 12.2.1.4.0 ;14.1.1.0.0)进行验证及利用", "fork": false, "created_at": "2021-01-25T15:33:04Z", - "updated_at": "2021-03-22T03:22:01Z", + "updated_at": "2021-06-22T03:20:32Z", "pushed_at": "2021-01-26T14:26:17Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-06-22T03:14:16Z", + "updated_at": "2021-06-22T09:06:24Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 784, - "watchers_count": 784, + "stargazers_count": 786, + "watchers_count": 786, "forks_count": 248, "forks": 248, - "watchers": 784, + "watchers": 786, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-36179.json b/2020/CVE-2020-36179.json index d9a5065a5c..3e419884d4 100644 --- a/2020/CVE-2020-36179.json +++ b/2020/CVE-2020-36179.json @@ -13,13 +13,13 @@ "description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE", "fork": false, "created_at": "2021-01-10T06:47:49Z", - "updated_at": "2021-06-21T00:42:04Z", + "updated_at": "2021-06-22T07:45:04Z", "pushed_at": "2021-01-10T06:48:53Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 7, "forks": 7, - "watchers": 66, + "watchers": 67, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 126d583ba3..91c1cdebc0 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -59,13 +59,13 @@ "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", - "updated_at": "2021-06-15T03:30:44Z", + "updated_at": "2021-06-22T03:53:38Z", "pushed_at": "2020-04-16T08:38:42Z", - "stargazers_count": 239, - "watchers_count": 239, + "stargazers_count": 240, + "watchers_count": 240, "forks_count": 56, "forks": 56, - "watchers": 239, + "watchers": 240, "score": 0 }, { diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index 78d39972d3..4fa70a50f3 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -339,8 +339,8 @@ "pushed_at": "2020-07-09T09:24:55Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 9, "score": 0 }, diff --git a/2021/CVE-2021-21315.json b/2021/CVE-2021-21315.json index 42d5415cce..0bfb5f1565 100644 --- a/2021/CVE-2021-21315.json +++ b/2021/CVE-2021-21315.json @@ -13,13 +13,13 @@ "description": "CVE 2021-21315 PoC", "fork": false, "created_at": "2021-03-01T18:52:41Z", - "updated_at": "2021-06-22T01:59:50Z", + "updated_at": "2021-06-22T06:56:19Z", "pushed_at": "2021-06-09T13:27:20Z", - "stargazers_count": 122, - "watchers_count": 122, + "stargazers_count": 123, + "watchers_count": 123, "forks_count": 21, "forks": 21, - "watchers": 122, + "watchers": 123, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 3bb3e21338..d4a707d2e1 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -59,13 +59,13 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2021-06-21T02:57:43Z", + "updated_at": "2021-06-22T05:58:02Z", "pushed_at": "2021-03-10T05:01:22Z", - "stargazers_count": 264, - "watchers_count": 264, + "stargazers_count": 265, + "watchers_count": 265, "forks_count": 100, "forks": 100, - "watchers": 264, + "watchers": 265, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 5a554ec81c..04b2b50f55 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2021-05-29T13:07:14Z", - "updated_at": "2021-06-18T00:33:24Z", + "updated_at": "2021-06-22T08:59:31Z", "pushed_at": "2021-06-03T21:29:39Z", - "stargazers_count": 148, - "watchers_count": 148, + "stargazers_count": 149, + "watchers_count": 149, "forks_count": 39, "forks": 39, - "watchers": 148, + "watchers": 149, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)", "fork": false, "created_at": "2021-06-03T09:59:21Z", - "updated_at": "2021-06-21T16:51:23Z", + "updated_at": "2021-06-22T04:03:39Z", "pushed_at": "2021-06-09T10:13:56Z", - "stargazers_count": 222, - "watchers_count": 222, - "forks_count": 37, - "forks": 37, - "watchers": 222, + "stargazers_count": 223, + "watchers_count": 223, + "forks_count": 38, + "forks": 38, + "watchers": 223, "score": 0 }, { diff --git a/2021/CVE-2021-22214.json b/2021/CVE-2021-22214.json index 1279fadf22..95c6dcabeb 100644 --- a/2021/CVE-2021-22214.json +++ b/2021/CVE-2021-22214.json @@ -13,13 +13,13 @@ "description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)", "fork": false, "created_at": "2021-06-22T03:04:50Z", - "updated_at": "2021-06-22T03:04:53Z", - "pushed_at": "2021-06-22T03:04:51Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2021-06-22T05:54:34Z", + "pushed_at": "2021-06-22T04:35:08Z", + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-23132.json b/2021/CVE-2021-23132.json index 6f5267880a..627063cf64 100644 --- a/2021/CVE-2021-23132.json +++ b/2021/CVE-2021-23132.json @@ -17,8 +17,8 @@ "pushed_at": "2021-03-03T03:52:10Z", "stargazers_count": 60, "watchers_count": 60, - "forks_count": 27, - "forks": 27, + "forks_count": 28, + "forks": 28, "watchers": 60, "score": 0 } diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index ebd86fee4a..31452fbabe 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-06-22T03:14:16Z", + "updated_at": "2021-06-22T09:06:24Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 784, - "watchers_count": 784, + "stargazers_count": 786, + "watchers_count": 786, "forks_count": 248, "forks": 248, - "watchers": 784, + "watchers": 786, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index cae5c380e0..a3b0890c8a 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -680,13 +680,13 @@ "description": "ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)", "fork": false, "created_at": "2021-03-17T03:56:54Z", - "updated_at": "2021-06-18T08:04:23Z", + "updated_at": "2021-06-22T03:29:52Z", "pushed_at": "2021-03-17T05:06:18Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 18, "forks": 18, - "watchers": 66, + "watchers": 67, "score": 0 }, { diff --git a/2021/CVE-2021-33739.json b/2021/CVE-2021-33739.json index 0360bd83e5..958d049e16 100644 --- a/2021/CVE-2021-33739.json +++ b/2021/CVE-2021-33739.json @@ -17,8 +17,8 @@ "pushed_at": "2021-06-10T10:31:30Z", "stargazers_count": 81, "watchers_count": 81, - "forks_count": 31, - "forks": 31, + "forks_count": 32, + "forks": 32, "watchers": 81, "score": 0 } diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index c126d37bcb..84600e40c3 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -63,8 +63,8 @@ "pushed_at": "2021-06-21T19:17:34Z", "stargazers_count": 16, "watchers_count": 16, - "forks_count": 2, - "forks": 2, + "forks_count": 1, + "forks": 1, "watchers": 16, "score": 0 }, @@ -128,36 +128,13 @@ "description": "Privilege escalation with polkit - CVE-2021-3560", "fork": false, "created_at": "2021-06-19T08:15:17Z", - "updated_at": "2021-06-22T00:09:54Z", + "updated_at": "2021-06-22T06:53:25Z", "pushed_at": "2021-06-20T07:38:13Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 7, "forks": 7, - "watchers": 4, - "score": 0 - }, - { - "id": 379116726, - "name": "CVE-2021-3560", - "full_name": "595cyi\/CVE-2021-3560", - "owner": { - "login": "595cyi", - "id": 49434485, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49434485?v=4", - "html_url": "https:\/\/github.com\/595cyi" - }, - "html_url": "https:\/\/github.com\/595cyi\/CVE-2021-3560", - "description": "a reliable C based exploit for CVE-2021-3560.", - "fork": false, - "created_at": "2021-06-22T02:18:31Z", - "updated_at": "2021-06-22T03:15:01Z", - "pushed_at": "2021-06-22T02:21:07Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, - "forks": 0, - "watchers": 3, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 55c9e5c0d8..1772c4b9fb 100644 --- a/README.md +++ b/README.md @@ -329,7 +329,6 @@ The overlayfs implementation in the linux kernel did not properly validate with - [tyleraharrison/CVE-2021-3560_PoC](https://github.com/tyleraharrison/CVE-2021-3560_PoC) - [secnigma/CVE-2021-3560-Polkit-Privilege-Esclation](https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-Esclation) - [Almorabea/Polkit-exploit](https://github.com/Almorabea/Polkit-exploit) -- [595cyi/CVE-2021-3560](https://github.com/595cyi/CVE-2021-3560) ### CVE-2021-3572 - [frenzymadness/CVE-2021-3572](https://github.com/frenzymadness/CVE-2021-3572) @@ -15420,6 +15419,7 @@ Apache Shiro before 1.2.5, when a cipher key has not been configured for the &qu - [bkfish/Awesome_shiro](https://github.com/bkfish/Awesome_shiro) +- [m3terpreter/CVE-2016-4437](https://github.com/m3terpreter/CVE-2016-4437) ### CVE-2016-4438 (2016-07-04)