From 4e63e4a55c488b785fba7b02620bedf600a5c644 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 22 May 2021 06:12:16 +0900 Subject: [PATCH] Auto Update 2021/05/22 06:12:16 --- 2011/CVE-2011-4862.json | 16 ++++++++-------- 2017/CVE-2017-11882.json | 4 ++-- 2018/CVE-2018-14847.json | 16 ++++++++-------- 2019/CVE-2019-9810.json | 8 ++++---- 2020/CVE-2020-0688.json | 8 ++++---- 2020/CVE-2020-12928.json | 4 ++-- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-14883.json | 8 ++++---- 2020/CVE-2020-17144.json | 8 ++++---- 2021/CVE-2021-22204.json | 8 ++++---- 2021/CVE-2021-25646.json | 8 ++++---- 2021/CVE-2021-27246.json | 8 ++++---- 2021/CVE-2021-27651.json | 8 ++++---- 2021/CVE-2021-31166.json | 12 ++++++------ 2021/CVE-2021-31876.json | 25 ------------------------- README.md | 8 -------- 16 files changed, 62 insertions(+), 95 deletions(-) delete mode 100644 2021/CVE-2021-31876.json diff --git a/2011/CVE-2011-4862.json b/2011/CVE-2011-4862.json index eff46d05e6..2e631eb400 100644 --- a/2011/CVE-2011-4862.json +++ b/2011/CVE-2011-4862.json @@ -13,13 +13,13 @@ "description": "Go Exploit for CVE-2011-4862", "fork": false, "created_at": "2017-02-02T18:12:56Z", - "updated_at": "2020-07-09T01:23:31Z", + "updated_at": "2021-05-21T20:01:14Z", "pushed_at": "2017-02-02T18:19:38Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 2, "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "Final Project for Security and Privacy CS 600.443", "fork": false, "created_at": "2020-02-06T09:30:45Z", - "updated_at": "2020-02-12T04:52:15Z", + "updated_at": "2021-05-21T20:00:47Z", "pushed_at": "2020-02-12T04:52:13Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index d624c2e901..8ae816ee26 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -63,8 +63,8 @@ "pushed_at": "2017-11-29T03:33:53Z", "stargazers_count": 492, "watchers_count": 492, - "forks_count": 248, - "forks": 248, + "forks_count": 247, + "forks": 247, "watchers": 492, "score": 0 }, diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 2022f08579..72db6fe11b 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -13,13 +13,13 @@ "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "fork": false, "created_at": "2018-06-24T05:34:05Z", - "updated_at": "2021-05-20T21:53:04Z", + "updated_at": "2021-05-21T16:36:16Z", "pushed_at": "2020-10-16T12:09:45Z", - "stargazers_count": 418, - "watchers_count": 418, + "stargazers_count": 419, + "watchers_count": 419, "forks_count": 399, "forks": 399, - "watchers": 418, + "watchers": 419, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞", "fork": false, "created_at": "2018-12-15T10:38:26Z", - "updated_at": "2020-09-19T14:14:39Z", + "updated_at": "2021-05-21T16:37:17Z", "pushed_at": "2018-12-16T04:15:01Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 8, "forks": 8, - "watchers": 17, + "watchers": 18, "score": 0 }, { diff --git a/2019/CVE-2019-9810.json b/2019/CVE-2019-9810.json index 289b8b6b3f..3da60ae40f 100644 --- a/2019/CVE-2019-9810.json +++ b/2019/CVE-2019-9810.json @@ -36,13 +36,13 @@ "description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.", "fork": false, "created_at": "2019-05-05T17:19:02Z", - "updated_at": "2021-05-19T10:36:10Z", + "updated_at": "2021-05-21T18:35:49Z", "pushed_at": "2019-12-28T18:25:10Z", - "stargazers_count": 205, - "watchers_count": 205, + "stargazers_count": 206, + "watchers_count": 206, "forks_count": 56, "forks": 56, - "watchers": 205, + "watchers": 206, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 922c9a6388..e11c78a812 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -197,13 +197,13 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2021-05-17T16:34:04Z", + "updated_at": "2021-05-21T17:44:25Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 284, - "watchers_count": 284, + "stargazers_count": 285, + "watchers_count": 285, "forks_count": 70, "forks": 70, - "watchers": 284, + "watchers": 285, "score": 0 }, { diff --git a/2020/CVE-2020-12928.json b/2020/CVE-2020-12928.json index 08cdb046ac..3bc8f83aa8 100644 --- a/2020/CVE-2020-12928.json +++ b/2020/CVE-2020-12928.json @@ -17,8 +17,8 @@ "pushed_at": "2021-02-14T15:08:01Z", "stargazers_count": 16, "watchers_count": 16, - "forks_count": 15, - "forks": 15, + "forks_count": 16, + "forks": 16, "watchers": 16, "score": 0 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index db4aefb376..0718a7a959 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -105,13 +105,13 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2021-05-21T06:05:33Z", + "updated_at": "2021-05-21T19:35:30Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 208, - "watchers_count": 208, + "stargazers_count": 209, + "watchers_count": 209, "forks_count": 40, "forks": 40, - "watchers": 208, + "watchers": 209, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 3f9f79af35..77a79ee188 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-05-21T06:14:06Z", + "updated_at": "2021-05-21T17:45:18Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 760, - "watchers_count": 760, + "stargazers_count": 761, + "watchers_count": 761, "forks_count": 240, "forks": 240, - "watchers": 760, + "watchers": 761, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17144.json b/2020/CVE-2020-17144.json index ea2a5b94b7..35288e2257 100644 --- a/2020/CVE-2020-17144.json +++ b/2020/CVE-2020-17144.json @@ -36,13 +36,13 @@ "description": "weaponized tool for CVE-2020-17144", "fork": false, "created_at": "2020-12-09T20:57:16Z", - "updated_at": "2021-04-28T07:20:14Z", + "updated_at": "2021-05-21T17:43:35Z", "pushed_at": "2020-12-09T20:57:32Z", - "stargazers_count": 123, - "watchers_count": 123, + "stargazers_count": 124, + "watchers_count": 124, "forks_count": 21, "forks": 21, - "watchers": 123, + "watchers": 124, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index dd90e30345..b55fdec4db 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -13,13 +13,13 @@ "description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool", "fork": false, "created_at": "2021-05-11T18:45:07Z", - "updated_at": "2021-05-21T15:10:28Z", + "updated_at": "2021-05-21T19:36:58Z", "pushed_at": "2021-05-20T21:42:43Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index a774566bb1..d22ab6fde8 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-05-21T06:14:06Z", + "updated_at": "2021-05-21T17:45:18Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 760, - "watchers_count": 760, + "stargazers_count": 761, + "watchers_count": 761, "forks_count": 240, "forks": 240, - "watchers": 760, + "watchers": 761, "score": 0 }, { diff --git a/2021/CVE-2021-27246.json b/2021/CVE-2021-27246.json index 5f1cc78ebe..26ac0b9bae 100644 --- a/2021/CVE-2021-27246.json +++ b/2021/CVE-2021-27246.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-03-01T16:45:42Z", - "updated_at": "2021-03-16T20:48:16Z", + "updated_at": "2021-05-21T16:21:31Z", "pushed_at": "2021-03-02T07:45:20Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 2, "forks": 2, - "watchers": 22, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-27651.json b/2021/CVE-2021-27651.json index fb6186b00f..96db4b1adc 100644 --- a/2021/CVE-2021-27651.json +++ b/2021/CVE-2021-27651.json @@ -13,13 +13,13 @@ "description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2", "fork": false, "created_at": "2021-05-16T01:40:47Z", - "updated_at": "2021-05-20T09:32:07Z", + "updated_at": "2021-05-21T16:27:11Z", "pushed_at": "2021-05-16T05:54:07Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "forks_count": 8, "forks": 8, - "watchers": 38, + "watchers": 39, "score": 0 }, { diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 1d8b852c91..d6b01a5af0 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,13 +13,13 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2021-05-21T14:55:32Z", + "updated_at": "2021-05-21T20:54:34Z", "pushed_at": "2021-05-20T04:58:29Z", - "stargazers_count": 599, - "watchers_count": 599, - "forks_count": 96, - "forks": 96, - "watchers": 599, + "stargazers_count": 619, + "watchers_count": 619, + "forks_count": 97, + "forks": 97, + "watchers": 619, "score": 0 }, { diff --git a/2021/CVE-2021-31876.json b/2021/CVE-2021-31876.json deleted file mode 100644 index a6deb326b5..0000000000 --- a/2021/CVE-2021-31876.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 369542023, - "name": "CVE-2021-31876", - "full_name": "nondejus\/CVE-2021-31876", - "owner": { - "login": "nondejus", - "id": 56696825, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56696825?v=4", - "html_url": "https:\/\/github.com\/nondejus" - }, - "html_url": "https:\/\/github.com\/nondejus\/CVE-2021-31876", - "description": null, - "fork": false, - "created_at": "2021-05-21T13:19:50Z", - "updated_at": "2021-05-21T13:30:56Z", - "pushed_at": "2021-05-21T13:30:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/README.md b/README.md index 855300707b..4e12654e1e 100644 --- a/README.md +++ b/README.md @@ -1131,14 +1131,6 @@ A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an - [ssst0n3/CVE-2021-31856](https://github.com/ssst0n3/CVE-2021-31856) -### CVE-2021-31876 (2021-05-13) - - -Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with nSequence = 0xff_ff_ff_ff, spending an unconfirmed parent with nSequence <= 0xff_ff_ff_fd, should be replaceable because there is inherited signaling by the child transaction. However, the actual PreChecks implementation does not enforce this. Instead, mempool rejects the replacement attempt of the unconfirmed child transaction. - - -- [nondejus/CVE-2021-31876](https://github.com/nondejus/CVE-2021-31876) - ### CVE-2021-32471 (2021-05-10)