From 8d39d3a1d774e45165d8da09afe783f63f57051e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Thu, 28 Oct 2021 12:12:48 +0900 Subject: [PATCH] Auto Update 2021/10/28 12:12:48 --- 2014/CVE-2014-4210.json | 8 ++++---- 2015/CVE-2015-5254.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2016/CVE-2016-3088.json | 8 ++++---- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-1002105.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-4233.json | 4 ++-- 2019/CVE-2019-0230.json | 8 ++++---- 2019/CVE-2019-17558.json | 12 ++++++------ 2019/CVE-2019-2618.json | 8 ++++---- 2020/CVE-2020-0796.json | 4 ++-- 2020/CVE-2020-12928.json | 8 ++++---- 2020/CVE-2020-14882.json | 4 ++-- 2020/CVE-2020-14883.json | 12 ++++++------ 2020/CVE-2020-2551.json | 8 ++++---- 2020/CVE-2020-7661.json | 8 ++++---- 2020/CVE-2020-9484.json | 4 ++-- 2021/CVE-2021-1675.json | 8 ++++---- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-21985.json | 8 ++++---- 2021/CVE-2021-22005.json | 12 ++++++------ 2021/CVE-2021-22205.json | 14 +++++++------- 2021/CVE-2021-2471.json | 8 ++++---- 2021/CVE-2021-25646.json | 12 ++++++------ 2021/CVE-2021-34527.json | 8 ++++---- 2021/CVE-2021-35215.json | 8 ++++---- 2021/CVE-2021-36260.json | 24 ++++++++++++------------ 2021/CVE-2021-40449.json | 8 ++++---- README.md | 8 ++++---- 30 files changed, 131 insertions(+), 131 deletions(-) diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 2147c4902e..0e8578b39c 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-27T13:27:29Z", + "updated_at": "2021-10-28T00:13:54Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1204, - "watchers_count": 1204, + "stargazers_count": 1205, + "watchers_count": 1205, "forks_count": 266, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 266, - "watchers": 1204, + "watchers": 1205, "score": 0 }, { diff --git a/2015/CVE-2015-5254.json b/2015/CVE-2015-5254.json index 426ce9ce3d..d506a25a9d 100644 --- a/2015/CVE-2015-5254.json +++ b/2015/CVE-2015-5254.json @@ -29,14 +29,14 @@ { "id": 284615073, "name": "ActiveMQ_CVE-2015-5254", - "full_name": "gsheller\/ActiveMQ_CVE-2015-5254", + "full_name": "Ma1Dong\/ActiveMQ_CVE-2015-5254", "owner": { - "login": "gsheller", + "login": "Ma1Dong", "id": 52943794, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4", - "html_url": "https:\/\/github.com\/gsheller" + "html_url": "https:\/\/github.com\/Ma1Dong" }, - "html_url": "https:\/\/github.com\/gsheller\/ActiveMQ_CVE-2015-5254", + "html_url": "https:\/\/github.com\/Ma1Dong\/ActiveMQ_CVE-2015-5254", "description": "ActiveMQ_CVE-2015-5254", "fork": false, "created_at": "2020-08-03T05:51:52Z", diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index b42f09cf2d..d2860620f9 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-27T13:27:29Z", + "updated_at": "2021-10-28T00:13:54Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1204, - "watchers_count": 1204, + "stargazers_count": 1205, + "watchers_count": 1205, "forks_count": 266, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 266, - "watchers": 1204, + "watchers": 1205, "score": 0 }, { diff --git a/2016/CVE-2016-3088.json b/2016/CVE-2016-3088.json index f2a1434ddc..a10b0ec717 100644 --- a/2016/CVE-2016-3088.json +++ b/2016/CVE-2016-3088.json @@ -2,14 +2,14 @@ { "id": 283991287, "name": "ActiveMQ_putshell-CVE-2016-3088", - "full_name": "gsheller\/ActiveMQ_putshell-CVE-2016-3088", + "full_name": "Ma1Dong\/ActiveMQ_putshell-CVE-2016-3088", "owner": { - "login": "gsheller", + "login": "Ma1Dong", "id": 52943794, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4", - "html_url": "https:\/\/github.com\/gsheller" + "html_url": "https:\/\/github.com\/Ma1Dong" }, - "html_url": "https:\/\/github.com\/gsheller\/ActiveMQ_putshell-CVE-2016-3088", + "html_url": "https:\/\/github.com\/Ma1Dong\/ActiveMQ_putshell-CVE-2016-3088", "description": "ActiveMQ_putshell直接获取webshell", "fork": false, "created_at": "2020-07-31T09:06:15Z", diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 14f59cc777..ef2f8563f3 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-27T13:27:29Z", + "updated_at": "2021-10-28T00:13:54Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1204, - "watchers_count": 1204, + "stargazers_count": 1205, + "watchers_count": 1205, "forks_count": 266, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 266, - "watchers": 1204, + "watchers": 1205, "score": 0 }, { diff --git a/2018/CVE-2018-1002105.json b/2018/CVE-2018-1002105.json index 9a55992c13..2d2fa3e490 100644 --- a/2018/CVE-2018-1002105.json +++ b/2018/CVE-2018-1002105.json @@ -40,17 +40,17 @@ "description": "PoC for CVE-2018-1002105.", "fork": false, "created_at": "2018-12-06T11:28:02Z", - "updated_at": "2021-07-17T01:09:24Z", + "updated_at": "2021-10-28T02:38:11Z", "pushed_at": "2018-12-21T14:34:04Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 217, + "watchers_count": 217, "forks_count": 40, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 40, - "watchers": 216, + "watchers": 217, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 9c7038cd8c..93b54c9663 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-27T13:27:29Z", + "updated_at": "2021-10-28T00:13:54Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1204, - "watchers_count": 1204, + "stargazers_count": 1205, + "watchers_count": 1205, "forks_count": 266, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 266, - "watchers": 1204, + "watchers": 1205, "score": 0 }, { diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index c4008dea76..3e80f07fb1 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -17,12 +17,12 @@ "pushed_at": "2018-08-17T23:31:46Z", "stargazers_count": 163, "watchers_count": 163, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 163, "score": 0 } diff --git a/2019/CVE-2019-0230.json b/2019/CVE-2019-0230.json index 40471dc104..2bdc33d1aa 100644 --- a/2019/CVE-2019-0230.json +++ b/2019/CVE-2019-0230.json @@ -40,17 +40,17 @@ "description": "CVE-2019-0230 Exploit POC", "fork": false, "created_at": "2020-08-13T15:18:32Z", - "updated_at": "2021-04-20T04:24:40Z", + "updated_at": "2021-10-28T00:01:45Z", "pushed_at": "2020-08-21T07:35:11Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 23, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 23, - "watchers": 14, + "watchers": 15, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 12acd310e1..48bb76799a 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -44,7 +44,7 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 2948, "watchers_count": 2948, - "forks_count": 867, + "forks_count": 868, "allow_forking": true, "is_template": false, "topics": [ @@ -69,21 +69,21 @@ "webshell" ], "visibility": "public", - "forks": 867, + "forks": 868, "watchers": 2948, "score": 0 }, { "id": 284893505, "name": "Solr_CVE-2019-17558", - "full_name": "gsheller\/Solr_CVE-2019-17558", + "full_name": "Ma1Dong\/Solr_CVE-2019-17558", "owner": { - "login": "gsheller", + "login": "Ma1Dong", "id": 52943794, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4", - "html_url": "https:\/\/github.com\/gsheller" + "html_url": "https:\/\/github.com\/Ma1Dong" }, - "html_url": "https:\/\/github.com\/gsheller\/Solr_CVE-2019-17558", + "html_url": "https:\/\/github.com\/Ma1Dong\/Solr_CVE-2019-17558", "description": "Solr_CVE-2019-17558", "fork": false, "created_at": "2020-08-04T06:13:33Z", diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index bade89c014..621c9eb571 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-27T13:27:29Z", + "updated_at": "2021-10-28T00:13:54Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1204, - "watchers_count": 1204, + "stargazers_count": 1205, + "watchers_count": 1205, "forks_count": 266, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 266, - "watchers": 1204, + "watchers": 1205, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 263f09e6d2..763ac10bc7 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -125,14 +125,14 @@ "pushed_at": "2020-10-01T08:36:29Z", "stargazers_count": 601, "watchers_count": 601, - "forks_count": 196, + "forks_count": 197, "allow_forking": true, "is_template": false, "topics": [ "cve-2020-0796" ], "visibility": "public", - "forks": 196, + "forks": 197, "watchers": 601, "score": 0 }, diff --git a/2020/CVE-2020-12928.json b/2020/CVE-2020-12928.json index ec9dd0d384..c21fed285d 100644 --- a/2020/CVE-2020-12928.json +++ b/2020/CVE-2020-12928.json @@ -13,17 +13,17 @@ "description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#", "fork": false, "created_at": "2020-11-10T13:08:21Z", - "updated_at": "2021-08-19T14:23:22Z", + "updated_at": "2021-10-27T22:34:35Z", "pushed_at": "2021-02-14T15:08:01Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 17, - "watchers": 22, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index d6c43e6f35..52ff3a9105 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -17,7 +17,7 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 2948, "watchers_count": 2948, - "forks_count": 867, + "forks_count": 868, "allow_forking": true, "is_template": false, "topics": [ @@ -42,7 +42,7 @@ "webshell" ], "visibility": "public", - "forks": 867, + "forks": 868, "watchers": 2948, "score": 0 }, diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index d549004431..b826424de2 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -121,11 +121,11 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-10-27T03:19:05Z", + "updated_at": "2021-10-28T01:45:03Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 870, - "watchers_count": 870, - "forks_count": 274, + "stargazers_count": 871, + "watchers_count": 871, + "forks_count": 275, "allow_forking": true, "is_template": false, "topics": [ @@ -134,8 +134,8 @@ "poc" ], "visibility": "public", - "forks": 274, - "watchers": 870, + "forks": 275, + "watchers": 871, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index e5171335e1..0784ceed93 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-27T13:27:29Z", + "updated_at": "2021-10-28T00:13:54Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1204, - "watchers_count": 1204, + "stargazers_count": 1205, + "watchers_count": 1205, "forks_count": 266, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 266, - "watchers": 1204, + "watchers": 1205, "score": 0 }, { diff --git a/2020/CVE-2020-7661.json b/2020/CVE-2020-7661.json index 5a0e85b3a8..e48f7eaaea 100644 --- a/2020/CVE-2020-7661.json +++ b/2020/CVE-2020-7661.json @@ -13,10 +13,10 @@ "description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.", "fork": false, "created_at": "2020-08-15T07:42:50Z", - "updated_at": "2021-10-13T21:38:26Z", + "updated_at": "2021-10-27T23:24:10Z", "pushed_at": "2021-09-23T09:35:46Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 37, + "watchers": 38, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index 32ac2aa523..b856b0d871 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -40,8 +40,8 @@ "description": null, "fork": false, "created_at": "2020-05-21T00:41:06Z", - "updated_at": "2021-10-23T14:01:14Z", - "pushed_at": "2021-10-21T18:12:50Z", + "updated_at": "2021-10-28T02:31:09Z", + "pushed_at": "2021-10-28T02:31:04Z", "stargazers_count": 114, "watchers_count": 114, "forks_count": 28, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 0ca644c019..15c0c45d6e 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -274,17 +274,17 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-10-27T09:17:56Z", + "updated_at": "2021-10-27T23:49:07Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 670, - "watchers_count": 670, + "stargazers_count": 672, + "watchers_count": 672, "forks_count": 177, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 177, - "watchers": 670, + "watchers": 672, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index f08cb62323..7e148e04bc 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -484,14 +484,14 @@ { "id": 343440136, "name": "vcenter_rce", - "full_name": "gsheller\/vcenter_rce", + "full_name": "Ma1Dong\/vcenter_rce", "owner": { - "login": "gsheller", + "login": "Ma1Dong", "id": 52943794, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4", - "html_url": "https:\/\/github.com\/gsheller" + "html_url": "https:\/\/github.com\/Ma1Dong" }, - "html_url": "https:\/\/github.com\/gsheller\/vcenter_rce", + "html_url": "https:\/\/github.com\/Ma1Dong\/vcenter_rce", "description": "漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell", "fork": false, "created_at": "2021-03-01T14:14:01Z", diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index d47974696a..5fba81e8b9 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -128,17 +128,17 @@ "description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)", "fork": false, "created_at": "2021-06-03T09:59:21Z", - "updated_at": "2021-10-25T12:16:12Z", + "updated_at": "2021-10-28T01:22:22Z", "pushed_at": "2021-06-09T10:13:56Z", - "stargazers_count": 275, - "watchers_count": 275, + "stargazers_count": 276, + "watchers_count": 276, "forks_count": 59, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 59, - "watchers": 275, + "watchers": 276, "score": 0 }, { diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index 4c5135112c..00622b94b0 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -121,17 +121,17 @@ "description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE", "fork": false, "created_at": "2021-09-25T16:21:56Z", - "updated_at": "2021-10-27T13:45:15Z", + "updated_at": "2021-10-28T03:08:41Z", "pushed_at": "2021-10-02T03:17:45Z", - "stargazers_count": 149, - "watchers_count": 149, - "forks_count": 35, + "stargazers_count": 159, + "watchers_count": 159, + "forks_count": 37, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 35, - "watchers": 149, + "forks": 37, + "watchers": 159, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 161f9e7a52..02215b9896 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-06-05T15:42:16Z", - "updated_at": "2021-10-27T13:54:17Z", - "pushed_at": "2021-06-07T02:03:19Z", - "stargazers_count": 23, - "watchers_count": 23, - "forks_count": 7, + "updated_at": "2021-10-28T03:09:00Z", + "pushed_at": "2021-10-28T02:46:54Z", + "stargazers_count": 27, + "watchers_count": 27, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 23, + "forks": 8, + "watchers": 27, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-2471.json b/2021/CVE-2021-2471.json index 224d234fe8..7ffc51096b 100644 --- a/2021/CVE-2021-2471.json +++ b/2021/CVE-2021-2471.json @@ -13,17 +13,17 @@ "description": "h2-jdbc(https:\/\/github.com\/h2database\/h2database\/issues\/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.", "fork": false, "created_at": "2021-10-22T07:14:25Z", - "updated_at": "2021-10-26T09:22:07Z", + "updated_at": "2021-10-28T01:05:12Z", "pushed_at": "2021-10-22T07:28:11Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 41, + "watchers": 42, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 6ea7a9ebc4..2600cb3fd7 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -121,11 +121,11 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-10-27T03:19:05Z", + "updated_at": "2021-10-28T01:45:03Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 870, - "watchers_count": 870, - "forks_count": 274, + "stargazers_count": 871, + "watchers_count": 871, + "forks_count": 275, "allow_forking": true, "is_template": false, "topics": [ @@ -134,8 +134,8 @@ "poc" ], "visibility": "public", - "forks": 274, - "watchers": 870, + "forks": 275, + "watchers": 871, "score": 0 }, { diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index e440a7279a..d675522185 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -73,17 +73,17 @@ "description": null, "fork": false, "created_at": "2021-07-02T12:10:49Z", - "updated_at": "2021-10-21T15:40:46Z", + "updated_at": "2021-10-27T23:13:43Z", "pushed_at": "2021-07-02T12:17:50Z", - "stargazers_count": 134, - "watchers_count": 134, + "stargazers_count": 136, + "watchers_count": 136, "forks_count": 35, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 35, - "watchers": 134, + "watchers": 136, "score": 0 }, { diff --git a/2021/CVE-2021-35215.json b/2021/CVE-2021-35215.json index dbf320daef..123a6e8c44 100644 --- a/2021/CVE-2021-35215.json +++ b/2021/CVE-2021-35215.json @@ -13,17 +13,17 @@ "description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE", "fork": false, "created_at": "2021-10-23T01:35:42Z", - "updated_at": "2021-10-27T18:31:21Z", + "updated_at": "2021-10-28T03:01:35Z", "pushed_at": "2021-10-23T01:44:54Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, - "watchers": 35, + "watchers": 36, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 5e02011732..c43e5257a1 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -13,17 +13,17 @@ "description": "CVE-2021-36260", "fork": false, "created_at": "2021-10-18T06:40:48Z", - "updated_at": "2021-10-27T19:56:06Z", + "updated_at": "2021-10-28T01:28:51Z", "pushed_at": "2021-10-27T15:40:38Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 2, + "forks": 1, + "watchers": 3, "score": 0 }, { @@ -40,17 +40,17 @@ "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", - "updated_at": "2021-10-27T19:54:05Z", + "updated_at": "2021-10-28T02:34:11Z", "pushed_at": "2021-10-27T15:55:20Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 2, + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 1, + "forks": 3, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 2ee7a7e803..f4ce4618e0 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2021-10-16T16:17:44Z", - "updated_at": "2021-10-27T09:38:33Z", + "updated_at": "2021-10-28T03:10:44Z", "pushed_at": "2021-10-24T21:01:29Z", - "stargazers_count": 293, - "watchers_count": 293, + "stargazers_count": 297, + "watchers_count": 297, "forks_count": 62, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 62, - "watchers": 293, + "watchers": 297, "score": 0 }, { diff --git a/README.md b/README.md index 68117fbc4c..1ea20cd4dc 100644 --- a/README.md +++ b/README.md @@ -724,7 +724,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v - [GuayoyoCyber/CVE-2021-21972](https://github.com/GuayoyoCyber/CVE-2021-21972) - [JMousqueton/Detect-CVE-2021-21972](https://github.com/JMousqueton/Detect-CVE-2021-21972) - [robwillisinfo/VMware_vCenter_CVE-2021-21972](https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972) -- [gsheller/vcenter_rce](https://github.com/gsheller/vcenter_rce) +- [Ma1Dong/vcenter_rce](https://github.com/Ma1Dong/vcenter_rce) - [d3sh1n/cve-2021-21972](https://github.com/d3sh1n/cve-2021-21972) - [ByZain/CVE-2021-21972](https://github.com/ByZain/CVE-2021-21972) - [TaroballzChen/CVE-2021-21972](https://github.com/TaroballzChen/CVE-2021-21972) @@ -10863,7 +10863,7 @@ Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution - [SDNDTeam/CVE-2019-17558_Solr_Vul_Tool](https://github.com/SDNDTeam/CVE-2019-17558_Solr_Vul_Tool) - [zhzyker/exphub](https://github.com/zhzyker/exphub) -- [gsheller/Solr_CVE-2019-17558](https://github.com/gsheller/Solr_CVE-2019-17558) +- [Ma1Dong/Solr_CVE-2019-17558](https://github.com/Ma1Dong/Solr_CVE-2019-17558) - [xkyrage/Exploit_CVE-2019-17558-RCE](https://github.com/xkyrage/Exploit_CVE-2019-17558-RCE) ### CVE-2019-17564 (2020-04-01) @@ -17368,7 +17368,7 @@ Avaya Fabric Connect Virtual Services Platform (VSP) Operating System Software ( The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. -- [gsheller/ActiveMQ_putshell-CVE-2016-3088](https://github.com/gsheller/ActiveMQ_putshell-CVE-2016-3088) +- [Ma1Dong/ActiveMQ_putshell-CVE-2016-3088](https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088) - [pudiding/CVE-2016-3088](https://github.com/pudiding/CVE-2016-3088) - [cyberaguiar/CVE-2016-3088](https://github.com/cyberaguiar/CVE-2016-3088) - [vonderchild/CVE-2016-3088](https://github.com/vonderchild/CVE-2016-3088) @@ -18690,7 +18690,7 @@ Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be seri - [jas502n/CVE-2015-5254](https://github.com/jas502n/CVE-2015-5254) -- [gsheller/ActiveMQ_CVE-2015-5254](https://github.com/gsheller/ActiveMQ_CVE-2015-5254) +- [Ma1Dong/ActiveMQ_CVE-2015-5254](https://github.com/Ma1Dong/ActiveMQ_CVE-2015-5254) ### CVE-2015-5347 (2016-04-12)