From 8276017026c2d9ba6b8b30b3df67e1ae4d54bec8 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 29 Aug 2021 18:12:03 +0900 Subject: [PATCH] Auto Update 2021/08/29 18:12:03 --- 2007/CVE-2007-2447.json | 4 ++-- 2016/CVE-2016-4437.json | 8 ++++---- 2017/CVE-2017-0785.json | 8 ++++---- 2017/CVE-2017-11882.json | 8 ++++---- 2017/CVE-2017-3248.json | 23 +++++++++++++++++++++++ 2017/CVE-2017-7494.json | 8 ++++---- 2018/CVE-2018-14847.json | 4 ++-- 2018/CVE-2018-20250.json | 8 ++++---- 2018/CVE-2018-5955.json | 8 ++++---- 2018/CVE-2018-6242.json | 8 ++++---- 2018/CVE-2018-7600.json | 8 ++++---- 2018/CVE-2018-8581.json | 8 ++++---- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-1215.json | 8 ++++---- 2019/CVE-2019-13272.json | 8 ++++---- 2019/CVE-2019-19781.json | 23 +++++++++++++++++++++++ 2019/CVE-2019-6340.json | 8 ++++---- 2020/CVE-2020-0668.json | 8 ++++---- 2020/CVE-2020-0683.json | 8 ++++---- 2020/CVE-2020-0688.json | 8 ++++---- 2020/CVE-2020-0796.json | 16 ++++++++-------- 2020/CVE-2020-1054.json | 8 ++++---- 2020/CVE-2020-14882.json | 8 ++++---- 2020/CVE-2020-15778.json | 8 ++++---- 2020/CVE-2020-17087.json | 8 ++++---- 2020/CVE-2020-17382.json | 8 ++++---- 2020/CVE-2020-3452.json | 8 ++++---- 2020/CVE-2020-3952.json | 8 ++++---- 2020/CVE-2020-5902.json | 8 ++++---- 2020/CVE-2020-6287.json | 8 ++++---- 2021/CVE-2021-1675.json | 16 ++++++++-------- 2021/CVE-2021-21551.json | 8 ++++---- 2021/CVE-2021-28476.json | 8 ++++---- 2021/CVE-2021-3129.json | 8 ++++---- 2021/CVE-2021-3493.json | 4 ++-- README.md | 2 ++ 36 files changed, 182 insertions(+), 134 deletions(-) diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index ebf7180688..b3cbdbd6fc 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -17,8 +17,8 @@ "pushed_at": "2020-08-16T18:54:38Z", "stargazers_count": 27, "watchers_count": 27, - "forks_count": 19, - "forks": 19, + "forks_count": 20, + "forks": 20, "watchers": 27, "score": 0 }, diff --git a/2016/CVE-2016-4437.json b/2016/CVE-2016-4437.json index 9e736292c5..aae5d02f87 100644 --- a/2016/CVE-2016-4437.json +++ b/2016/CVE-2016-4437.json @@ -13,13 +13,13 @@ "description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行,反弹shell的脚本", "fork": false, "created_at": "2020-05-27T05:02:04Z", - "updated_at": "2021-08-27T22:24:50Z", + "updated_at": "2021-08-29T05:19:05Z", "pushed_at": "2020-06-27T10:17:43Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 16, "forks": 16, - "watchers": 42, + "watchers": 43, "score": 0 }, { diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index d4ea3d95d6..85f5f8940c 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -13,13 +13,13 @@ "description": "Blueborne CVE-2017-0785 Android information leak vulnerability", "fork": false, "created_at": "2017-09-20T23:32:29Z", - "updated_at": "2021-08-17T10:57:40Z", + "updated_at": "2021-08-29T06:00:35Z", "pushed_at": "2017-09-23T05:11:45Z", - "stargazers_count": 434, - "watchers_count": 434, + "stargazers_count": 435, + "watchers_count": 435, "forks_count": 191, "forks": 191, - "watchers": 434, + "watchers": 435, "score": 0 }, { diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index cd593d6bf2..be5c51d4d2 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -36,13 +36,13 @@ "description": "Proof-of-Concept exploits for CVE-2017-11882", "fork": false, "created_at": "2017-11-20T16:35:30Z", - "updated_at": "2021-08-19T10:49:03Z", + "updated_at": "2021-08-29T05:32:47Z", "pushed_at": "2017-11-29T16:13:23Z", - "stargazers_count": 488, - "watchers_count": 488, + "stargazers_count": 489, + "watchers_count": 489, "forks_count": 198, "forks": 198, - "watchers": 488, + "watchers": 489, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index ac263700c9..141b96c979 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -44,5 +44,28 @@ "forks": 255, "watchers": 1156, "score": 0 + }, + { + "id": 400940873, + "name": "CVE-2017-3248", + "full_name": "BabyTeam1024\/CVE-2017-3248", + "owner": { + "login": "BabyTeam1024", + "id": 74447452, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4", + "html_url": "https:\/\/github.com\/BabyTeam1024" + }, + "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2017-3248", + "description": null, + "fork": false, + "created_at": "2021-08-29T03:24:25Z", + "updated_at": "2021-08-29T03:26:32Z", + "pushed_at": "2021-08-29T03:26:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index ea3e7de6af..c8bbabac2d 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -128,13 +128,13 @@ "description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability", "fork": false, "created_at": "2017-06-05T16:25:57Z", - "updated_at": "2021-08-27T13:33:12Z", + "updated_at": "2021-08-29T05:58:54Z", "pushed_at": "2021-03-09T09:12:55Z", - "stargazers_count": 237, - "watchers_count": 237, + "stargazers_count": 238, + "watchers_count": 238, "forks_count": 82, "forks": 82, - "watchers": 237, + "watchers": 238, "score": 0 }, { diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 746c1ec485..c5c23d6437 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -17,8 +17,8 @@ "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 440, "watchers_count": 440, - "forks_count": 418, - "forks": 418, + "forks_count": 419, + "forks": 419, "watchers": 440, "score": 0 }, diff --git a/2018/CVE-2018-20250.json b/2018/CVE-2018-20250.json index caea73ae08..3a8e25230a 100644 --- a/2018/CVE-2018-20250.json +++ b/2018/CVE-2018-20250.json @@ -13,13 +13,13 @@ "description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar", "fork": false, "created_at": "2019-02-22T04:52:08Z", - "updated_at": "2021-08-13T16:41:32Z", + "updated_at": "2021-08-29T08:32:46Z", "pushed_at": "2019-08-05T10:45:34Z", - "stargazers_count": 456, - "watchers_count": 456, + "stargazers_count": 457, + "watchers_count": 457, "forks_count": 183, "forks": 183, - "watchers": 456, + "watchers": 457, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 0aa6a826b0..592187c679 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-08-27T15:45:47Z", + "updated_at": "2021-08-29T03:35:33Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 442, - "watchers_count": 442, + "stargazers_count": 443, + "watchers_count": 443, "forks_count": 107, "forks": 107, - "watchers": 442, + "watchers": 443, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json index 7f722dbc29..0b9ca05be1 100644 --- a/2018/CVE-2018-6242.json +++ b/2018/CVE-2018-6242.json @@ -105,13 +105,13 @@ "description": "Nintendo CVE 2018-6242", "fork": false, "created_at": "2021-04-02T05:00:05Z", - "updated_at": "2021-08-28T17:33:15Z", + "updated_at": "2021-08-29T06:49:35Z", "pushed_at": "2021-08-23T13:10:27Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 0, "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 2e612e14c9..6f79d32060 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -36,13 +36,13 @@ "description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002", "fork": false, "created_at": "2018-03-30T14:23:18Z", - "updated_at": "2021-06-28T12:12:20Z", + "updated_at": "2021-08-29T05:58:33Z", "pushed_at": "2019-03-29T11:25:57Z", - "stargazers_count": 333, - "watchers_count": 333, + "stargazers_count": 334, + "watchers_count": 334, "forks_count": 113, "forks": 113, - "watchers": 333, + "watchers": 334, "score": 0 }, { diff --git a/2018/CVE-2018-8581.json b/2018/CVE-2018-8581.json index 264cc639dc..33cc87dc04 100644 --- a/2018/CVE-2018-8581.json +++ b/2018/CVE-2018-8581.json @@ -59,13 +59,13 @@ "description": "CVE-2018-8581", "fork": false, "created_at": "2019-01-24T06:08:23Z", - "updated_at": "2021-08-17T23:47:15Z", + "updated_at": "2021-08-29T05:57:13Z", "pushed_at": "2019-06-21T11:29:41Z", - "stargazers_count": 328, - "watchers_count": 328, + "stargazers_count": 329, + "watchers_count": 329, "forks_count": 73, "forks": 73, - "watchers": 328, + "watchers": 329, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 12a1d0b500..e5a83129f1 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2589,13 +2589,13 @@ "description": "MS CVE 2019-0708 Python Exploit", "fork": false, "created_at": "2021-03-07T12:35:29Z", - "updated_at": "2021-08-28T17:34:12Z", + "updated_at": "2021-08-29T06:52:29Z", "pushed_at": "2021-08-23T03:01:48Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 0, "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2019/CVE-2019-1215.json b/2019/CVE-2019-1215.json index 662ba3ddec..259be3e192 100644 --- a/2019/CVE-2019-1215.json +++ b/2019/CVE-2019-1215.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-01-06T22:34:16Z", - "updated_at": "2021-07-07T11:27:51Z", + "updated_at": "2021-08-29T05:53:44Z", "pushed_at": "2020-01-07T14:29:45Z", - "stargazers_count": 137, - "watchers_count": 137, + "stargazers_count": 138, + "watchers_count": 138, "forks_count": 44, "forks": 44, - "watchers": 137, + "watchers": 138, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index 31c6636a78..36a2a20f72 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -13,13 +13,13 @@ "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", - "updated_at": "2021-08-09T19:02:32Z", + "updated_at": "2021-08-29T05:53:37Z", "pushed_at": "2019-08-01T16:02:59Z", - "stargazers_count": 260, - "watchers_count": 260, + "stargazers_count": 261, + "watchers_count": 261, "forks_count": 96, "forks": 96, - "watchers": 260, + "watchers": 261, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 3be065b064..1f0d3cb0b4 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -1056,5 +1056,28 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 400957950, + "name": "Ctirix_RCE-CVE-2019-19781", + "full_name": "Vulnmachines\/Ctirix_RCE-CVE-2019-19781", + "owner": { + "login": "Vulnmachines", + "id": 79006904, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", + "html_url": "https:\/\/github.com\/Vulnmachines" + }, + "html_url": "https:\/\/github.com\/Vulnmachines\/Ctirix_RCE-CVE-2019-19781", + "description": "Citrix ADC RCE cve-2019-19781", + "fork": false, + "created_at": "2021-08-29T05:22:47Z", + "updated_at": "2021-08-29T05:25:40Z", + "pushed_at": "2021-08-29T05:25:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-6340.json b/2019/CVE-2019-6340.json index a3d913b5a8..7f4294d0c6 100644 --- a/2019/CVE-2019-6340.json +++ b/2019/CVE-2019-6340.json @@ -197,13 +197,13 @@ "description": "Drupal RCE CVE Python Exploit", "fork": false, "created_at": "2021-03-07T18:44:49Z", - "updated_at": "2021-08-28T17:34:17Z", + "updated_at": "2021-08-29T06:52:33Z", "pushed_at": "2021-08-23T02:58:05Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 0, "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json index 52b9461e30..37fdc557d3 100644 --- a/2020/CVE-2020-0668.json +++ b/2020/CVE-2020-0668.json @@ -36,13 +36,13 @@ "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "fork": false, "created_at": "2020-02-20T06:22:40Z", - "updated_at": "2021-07-19T14:14:29Z", + "updated_at": "2021-08-29T05:51:06Z", "pushed_at": "2020-02-20T11:03:18Z", - "stargazers_count": 184, - "watchers_count": 184, + "stargazers_count": 185, + "watchers_count": 185, "forks_count": 51, "forks": 51, - "watchers": 184, + "watchers": 185, "score": 0 }, { diff --git a/2020/CVE-2020-0683.json b/2020/CVE-2020-0683.json index 58a404139b..4d72e9186a 100644 --- a/2020/CVE-2020-0683.json +++ b/2020/CVE-2020-0683.json @@ -13,13 +13,13 @@ "description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege", "fork": false, "created_at": "2020-02-11T16:42:34Z", - "updated_at": "2021-08-17T19:38:10Z", + "updated_at": "2021-08-29T06:11:58Z", "pushed_at": "2020-02-11T21:34:28Z", - "stargazers_count": 256, - "watchers_count": 256, + "stargazers_count": 257, + "watchers_count": 257, "forks_count": 51, "forks": 51, - "watchers": 256, + "watchers": 257, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 1a673d1de7..2e5adf8d52 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -59,13 +59,13 @@ "description": "cve-2020-0688", "fork": false, "created_at": "2020-02-27T02:54:27Z", - "updated_at": "2021-08-27T10:55:49Z", + "updated_at": "2021-08-29T05:52:49Z", "pushed_at": "2020-06-19T09:28:15Z", - "stargazers_count": 274, - "watchers_count": 274, + "stargazers_count": 275, + "watchers_count": 275, "forks_count": 93, "forks": 93, - "watchers": 274, + "watchers": 275, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 3ee534e64a..e7f07c807c 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -841,13 +841,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-08-26T11:26:59Z", + "updated_at": "2021-08-29T07:35:49Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1141, - "watchers_count": 1141, + "stargazers_count": 1142, + "watchers_count": 1142, "forks_count": 358, "forks": 358, - "watchers": 1141, + "watchers": 1142, "score": 0 }, { @@ -1554,13 +1554,13 @@ "description": "MS CVE 2020-0796 SMB", "fork": false, "created_at": "2021-03-07T17:24:42Z", - "updated_at": "2021-08-28T17:34:14Z", + "updated_at": "2021-08-29T06:52:30Z", "pushed_at": "2021-08-23T02:59:13Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 0, "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2020/CVE-2020-1054.json b/2020/CVE-2020-1054.json index 2c20ee53c2..e016534c73 100644 --- a/2020/CVE-2020-1054.json +++ b/2020/CVE-2020-1054.json @@ -13,13 +13,13 @@ "description": "LPE for CVE-2020-1054 targeting Windows 7 x64", "fork": false, "created_at": "2020-06-16T23:22:15Z", - "updated_at": "2021-08-19T16:05:13Z", + "updated_at": "2021-08-29T05:47:36Z", "pushed_at": "2020-06-17T18:10:30Z", - "stargazers_count": 81, - "watchers_count": 81, + "stargazers_count": 82, + "watchers_count": 82, "forks_count": 31, "forks": 31, - "watchers": 81, + "watchers": 82, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index fea5a76368..476e5c48a0 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -36,13 +36,13 @@ "description": "CVE-2020–14882、CVE-2020–14883", "fork": false, "created_at": "2020-10-28T11:43:37Z", - "updated_at": "2021-08-26T19:32:23Z", + "updated_at": "2021-08-29T05:45:55Z", "pushed_at": "2020-11-16T04:23:09Z", - "stargazers_count": 234, - "watchers_count": 234, + "stargazers_count": 235, + "watchers_count": 235, "forks_count": 52, "forks": 52, - "watchers": 234, + "watchers": 235, "score": 0 }, { diff --git a/2020/CVE-2020-15778.json b/2020/CVE-2020-15778.json index 0669d1f384..087351bd70 100644 --- a/2020/CVE-2020-15778.json +++ b/2020/CVE-2020-15778.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-07-18T05:15:05Z", - "updated_at": "2021-08-17T10:29:52Z", + "updated_at": "2021-08-29T05:47:08Z", "pushed_at": "2021-03-17T11:29:58Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "forks_count": 18, "forks": 18, - "watchers": 99, + "watchers": 100, "score": 0 }, { diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json index 65e7a6df27..b1d239d5b4 100644 --- a/2020/CVE-2020-17087.json +++ b/2020/CVE-2020-17087.json @@ -59,13 +59,13 @@ "description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow", "fork": false, "created_at": "2021-07-02T16:03:16Z", - "updated_at": "2021-08-28T19:27:06Z", + "updated_at": "2021-08-29T08:09:03Z", "pushed_at": "2021-08-15T16:41:05Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 111, + "watchers_count": 111, "forks_count": 29, "forks": 29, - "watchers": 109, + "watchers": 111, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17382.json b/2020/CVE-2020-17382.json index 4d34d41d25..f1241aab0b 100644 --- a/2020/CVE-2020-17382.json +++ b/2020/CVE-2020-17382.json @@ -13,13 +13,13 @@ "description": "PoC exploits for CVE-2020-17382", "fork": false, "created_at": "2020-09-17T18:26:32Z", - "updated_at": "2021-07-28T06:24:09Z", + "updated_at": "2021-08-29T05:46:00Z", "pushed_at": "2020-10-02T18:45:43Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "forks_count": 26, "forks": 26, - "watchers": 109, + "watchers": 110, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index 5d2cb28731..f84f081613 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -59,13 +59,13 @@ "description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check", "fork": false, "created_at": "2020-07-24T15:04:45Z", - "updated_at": "2021-07-30T15:26:19Z", + "updated_at": "2021-08-29T08:10:48Z", "pushed_at": "2020-08-30T21:34:41Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 24, + "watchers_count": 24, "forks_count": 7, "forks": 7, - "watchers": 25, + "watchers": 24, "score": 0 }, { diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 524d21bbf7..bf8d1c1f02 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -59,13 +59,13 @@ "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", - "updated_at": "2021-08-27T15:16:37Z", + "updated_at": "2021-08-29T05:51:31Z", "pushed_at": "2020-04-16T08:38:42Z", - "stargazers_count": 246, - "watchers_count": 246, + "stargazers_count": 247, + "watchers_count": 247, "forks_count": 58, "forks": 58, - "watchers": 246, + "watchers": 247, "score": 0 }, { diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index 2428a0b778..da6f0a54d9 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -59,13 +59,13 @@ "description": "CVE-2020-5902 BIG-IP", "fork": false, "created_at": "2020-07-05T16:38:32Z", - "updated_at": "2021-08-02T10:54:54Z", + "updated_at": "2021-08-29T05:47:34Z", "pushed_at": "2020-07-15T02:52:33Z", - "stargazers_count": 353, - "watchers_count": 353, + "stargazers_count": 354, + "watchers_count": 354, "forks_count": 108, "forks": 108, - "watchers": 353, + "watchers": 354, "score": 0 }, { diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json index 587cecce90..47b222201c 100644 --- a/2020/CVE-2020-6287.json +++ b/2020/CVE-2020-6287.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)", "fork": false, "created_at": "2020-07-15T15:20:09Z", - "updated_at": "2021-08-25T19:47:02Z", + "updated_at": "2021-08-29T07:28:02Z", "pushed_at": "2020-09-29T17:20:12Z", - "stargazers_count": 186, - "watchers_count": 186, + "stargazers_count": 187, + "watchers_count": 187, "forks_count": 59, "forks": 59, - "watchers": 186, + "watchers": 187, "score": 0 }, { diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 6b93e98f31..c77d30927b 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -59,13 +59,13 @@ "description": "CVE-2021-1675 Detection Info", "fork": false, "created_at": "2021-06-30T18:32:17Z", - "updated_at": "2021-08-28T14:51:42Z", + "updated_at": "2021-08-29T05:43:55Z", "pushed_at": "2021-07-07T15:43:05Z", - "stargazers_count": 205, - "watchers_count": 205, + "stargazers_count": 206, + "watchers_count": 206, "forks_count": 34, "forks": 34, - "watchers": 205, + "watchers": 206, "score": 0 }, { @@ -220,13 +220,13 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-08-27T13:26:31Z", + "updated_at": "2021-08-29T05:43:52Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 582, - "watchers_count": 582, + "stargazers_count": 583, + "watchers_count": 583, "forks_count": 154, "forks": 154, - "watchers": 582, + "watchers": 583, "score": 0 }, { diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index 15b3007eea..efec4ba425 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -13,13 +13,13 @@ "description": "Exploit to SYSTEM for CVE-2021-21551", "fork": false, "created_at": "2021-05-13T13:23:38Z", - "updated_at": "2021-08-19T17:17:42Z", + "updated_at": "2021-08-29T05:44:26Z", "pushed_at": "2021-05-20T20:33:09Z", - "stargazers_count": 204, - "watchers_count": 204, + "stargazers_count": 205, + "watchers_count": 205, "forks_count": 38, "forks": 38, - "watchers": 204, + "watchers": 205, "score": 0 }, { diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index ca54b8569f..323a0164b5 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", "fork": false, "created_at": "2021-05-31T18:02:39Z", - "updated_at": "2021-08-15T22:01:07Z", + "updated_at": "2021-08-29T03:24:09Z", "pushed_at": "2021-06-01T15:08:23Z", - "stargazers_count": 187, - "watchers_count": 187, + "stargazers_count": 188, + "watchers_count": 188, "forks_count": 31, "forks": 31, - "watchers": 187, + "watchers": 188, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index ef55031bd8..1a72ccadff 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -105,13 +105,13 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-27T10:16:35Z", - "updated_at": "2021-08-12T17:46:53Z", + "updated_at": "2021-08-29T07:56:40Z", "pushed_at": "2021-03-07T04:39:58Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 3, "forks": 3, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index 7e525f261d..2e19bdc688 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -17,8 +17,8 @@ "pushed_at": "2021-04-20T00:46:14Z", "stargazers_count": 230, "watchers_count": 230, - "forks_count": 73, - "forks": 73, + "forks_count": 74, + "forks": 74, "watchers": 230, "score": 0 }, diff --git a/README.md b/README.md index 68c4f8db62..b62ee8126b 100644 --- a/README.md +++ b/README.md @@ -10242,6 +10242,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate - [andripwn/CVE-2019-19781](https://github.com/andripwn/CVE-2019-19781) - [VladRico/CVE-2019-19781](https://github.com/VladRico/CVE-2019-19781) - [pwn3z/CVE-2019-19781-Citrix](https://github.com/pwn3z/CVE-2019-19781-Citrix) +- [Vulnmachines/Ctirix_RCE-CVE-2019-19781](https://github.com/Vulnmachines/Ctirix_RCE-CVE-2019-19781) ### CVE-2019-19844 (2019-12-18) @@ -13934,6 +13935,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [ianxtianxt/CVE-2017-3248](https://github.com/ianxtianxt/CVE-2017-3248) - [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner) +- [BabyTeam1024/CVE-2017-3248](https://github.com/BabyTeam1024/CVE-2017-3248) ### CVE-2017-3506 (2017-04-24)