diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index 90dfc16f77..ecdd64a1b2 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -128,13 +128,13 @@ "description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l", "fork": false, "created_at": "2018-01-03T06:14:28Z", - "updated_at": "2020-09-28T14:29:52Z", + "updated_at": "2020-09-28T15:26:33Z", "pushed_at": "2018-01-03T00:42:57Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 39, "forks": 39, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index cc543367e5..f90fb0831c 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -86,8 +86,8 @@ "pushed_at": "2019-03-24T11:20:27Z", "stargazers_count": 13, "watchers_count": 13, - "forks_count": 2, - "forks": 2, + "forks_count": 3, + "forks": 3, "watchers": 13, "score": 0 }, diff --git a/2018/CVE-2018-5353.json b/2018/CVE-2018-5353.json new file mode 100644 index 0000000000..8b9dd5c775 --- /dev/null +++ b/2018/CVE-2018-5353.json @@ -0,0 +1,25 @@ +[ + { + "id": 299399882, + "name": "CVE-2018-5353", + "full_name": "missing0x00\/CVE-2018-5353", + "owner": { + "login": "missing0x00", + "id": 29318503, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29318503?v=4", + "html_url": "https:\/\/github.com\/missing0x00" + }, + "html_url": "https:\/\/github.com\/missing0x00\/CVE-2018-5353", + "description": "CVE-2018-5353", + "fork": false, + "created_at": "2020-09-28T18:38:26Z", + "updated_at": "2020-09-28T20:13:00Z", + "pushed_at": "2020-09-28T20:09:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-5354.json b/2018/CVE-2018-5354.json new file mode 100644 index 0000000000..6e1e3ba92b --- /dev/null +++ b/2018/CVE-2018-5354.json @@ -0,0 +1,25 @@ +[ + { + "id": 299421954, + "name": "CVE-2018-5354", + "full_name": "missing0x00\/CVE-2018-5354", + "owner": { + "login": "missing0x00", + "id": 29318503, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29318503?v=4", + "html_url": "https:\/\/github.com\/missing0x00" + }, + "html_url": "https:\/\/github.com\/missing0x00\/CVE-2018-5354", + "description": "CVE-2018-5354", + "fork": false, + "created_at": "2020-09-28T20:17:50Z", + "updated_at": "2020-09-28T20:51:00Z", + "pushed_at": "2020-09-28T20:49:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-6622.json b/2018/CVE-2018-6622.json index ee94fc81f5..baf214d53c 100644 --- a/2018/CVE-2018-6622.json +++ b/2018/CVE-2018-6622.json @@ -17,8 +17,8 @@ "pushed_at": "2020-09-25T03:07:08Z", "stargazers_count": 60, "watchers_count": 60, - "forks_count": 12, - "forks": 12, + "forks_count": 13, + "forks": 13, "watchers": 60, "score": 0 } diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index ff318b6d1f..0def90ae5b 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2497,13 +2497,13 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2020-09-28T12:13:48Z", + "updated_at": "2020-09-28T15:55:56Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 58, + "watchers_count": 58, "forks_count": 20, "forks": 20, - "watchers": 59, + "watchers": 58, "score": 0 }, { diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index d179e5b97a..2e1fd7ab6a 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -174,13 +174,13 @@ "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", - "updated_at": "2020-09-23T18:49:23Z", + "updated_at": "2020-09-28T19:33:57Z", "pushed_at": "2020-01-15T17:01:50Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "forks_count": 41, "forks": 41, - "watchers": 87, + "watchers": 88, "score": 0 }, { diff --git a/2019/CVE-2019-19634.json b/2019/CVE-2019-19634.json index 546213bcdb..12836e8eb5 100644 --- a/2019/CVE-2019-19634.json +++ b/2019/CVE-2019-19634.json @@ -13,13 +13,13 @@ "description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4", "fork": false, "created_at": "2019-12-08T10:44:51Z", - "updated_at": "2020-08-14T13:33:22Z", + "updated_at": "2020-09-28T18:24:48Z", "pushed_at": "2019-12-08T17:55:01Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "forks_count": 10, "forks": 10, - "watchers": 32, + "watchers": 33, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index f7c96d5a96..1f7a0ecbbd 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -40,8 +40,8 @@ "pushed_at": "2020-02-12T19:30:03Z", "stargazers_count": 34, "watchers_count": 34, - "forks_count": 10, - "forks": 10, + "forks_count": 11, + "forks": 11, "watchers": 34, "score": 0 }, diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index 08e0102dce..0ed9a7365b 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -40,8 +40,8 @@ "pushed_at": "2020-08-24T19:45:19Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 4, "score": 0 } diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index 56337eed3b..d222eed5f6 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -109,8 +109,8 @@ "pushed_at": "2020-07-20T02:20:43Z", "stargazers_count": 7, "watchers_count": 7, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 7, "score": 0 }, diff --git a/2020/CVE-2020-13777.json b/2020/CVE-2020-13777.json index c6eb59c6d0..bf682d9f4a 100644 --- a/2020/CVE-2020-13777.json +++ b/2020/CVE-2020-13777.json @@ -17,8 +17,8 @@ "pushed_at": "2020-06-10T02:05:53Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 5, "score": 0 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index db91f32816..1d826acc15 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2020-09-28T14:37:53Z", + "updated_at": "2020-09-28T17:46:39Z", "pushed_at": "2020-09-23T07:04:58Z", - "stargazers_count": 1072, - "watchers_count": 1072, + "stargazers_count": 1073, + "watchers_count": 1073, "forks_count": 224, "forks": 224, - "watchers": 1072, + "watchers": 1073, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2020-09-28T13:08:59Z", + "updated_at": "2020-09-28T21:00:59Z", "pushed_at": "2020-09-25T15:32:01Z", - "stargazers_count": 621, - "watchers_count": 621, + "stargazers_count": 623, + "watchers_count": 623, "forks_count": 179, "forks": 179, - "watchers": 621, + "watchers": 623, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 396e5fddae..b7da040463 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -82,13 +82,13 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2020-09-24T12:10:24Z", + "updated_at": "2020-09-28T16:59:19Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 141, - "watchers_count": 141, + "stargazers_count": 142, + "watchers_count": 142, "forks_count": 21, "forks": 21, - "watchers": 141, + "watchers": 142, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7931.json b/2020/CVE-2020-7931.json index ab5d4da136..4687ccfc93 100644 --- a/2020/CVE-2020-7931.json +++ b/2020/CVE-2020-7931.json @@ -13,13 +13,13 @@ "description": "Hacking Artifactory with server side template injection", "fork": false, "created_at": "2020-03-11T13:56:43Z", - "updated_at": "2020-09-28T12:55:50Z", + "updated_at": "2020-09-28T18:59:57Z", "pushed_at": "2020-03-12T06:55:39Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 7, "forks": 7, - "watchers": 22, + "watchers": 28, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7961.json b/2020/CVE-2020-7961.json index 7198189824..699a8ea970 100644 --- a/2020/CVE-2020-7961.json +++ b/2020/CVE-2020-7961.json @@ -36,13 +36,13 @@ "description": "Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)", "fork": false, "created_at": "2020-04-03T18:49:35Z", - "updated_at": "2020-09-25T21:11:02Z", + "updated_at": "2020-09-28T20:13:31Z", "pushed_at": "2020-04-03T19:23:54Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 5, "forks": 5, - "watchers": 16, + "watchers": 17, "score": 0 }, { diff --git a/README.md b/README.md index 6065ccb062..30dc8a3088 100644 --- a/README.md +++ b/README.md @@ -6468,6 +6468,12 @@ The Norton Core router prior to v237 may be susceptible to a command injection e - [embedi/ble_norton_core](https://github.com/embedi/ble_norton_core) +### CVE-2018-5353 +- [missing0x00/CVE-2018-5353](https://github.com/missing0x00/CVE-2018-5353) + +### CVE-2018-5354 +- [missing0x00/CVE-2018-5354](https://github.com/missing0x00/CVE-2018-5354) + ### CVE-2018-5711