From 8fca9a2782777b5c6e9e100f50b3714addee1b1e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 26 May 2021 00:11:58 +0900 Subject: [PATCH] Auto Update 2021/05/26 00:11:58 --- 2014/CVE-2014-4210.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-14847.json | 4 ++-- 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-5955.json | 8 ++++---- 2019/CVE-2019-0708.json | 12 ++++++------ 2019/CVE-2019-11043.json | 8 ++++---- 2019/CVE-2019-13272.json | 8 ++++---- 2019/CVE-2019-1458.json | 4 ++-- 2019/CVE-2019-16278.json | 8 ++++---- 2019/CVE-2019-2618.json | 16 ++++++++-------- 2019/CVE-2019-9810.json | 8 ++++---- 2020/CVE-2020-0041.json | 4 ++-- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-14883.json | 4 ++-- 2020/CVE-2020-1938.json | 8 ++++---- 2020/CVE-2020-2551.json | 8 ++++---- 2020/CVE-2020-6516.json | 4 ++-- 2020/CVE-2020-7961.json | 8 ++++---- 2021/CVE-2021-22192.json | 12 ++++++------ 2021/CVE-2021-22204.json | 12 ++++++------ 2021/CVE-2021-24027.json | 4 ++-- 2021/CVE-2021-24086.json | 12 ++++++------ 2021/CVE-2021-25646.json | 4 ++-- 2021/CVE-2021-31166.json | 8 ++++---- 2021/CVE-2021-3129.json | 16 ++++++++-------- 2021/CVE-2021-33558.json | 25 +++++++++++++++++++++++++ README.md | 3 +++ 29 files changed, 138 insertions(+), 110 deletions(-) create mode 100644 2021/CVE-2021-33558.json diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index e7b0bae14c..68cad41045 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-24T06:20:18Z", + "updated_at": "2021-05-25T09:16:10Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1035, - "watchers_count": 1035, + "stargazers_count": 1034, + "watchers_count": 1034, "forks_count": 234, "forks": 234, - "watchers": 1035, + "watchers": 1034, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 8987bfb0b7..79bcacee23 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-24T06:20:18Z", + "updated_at": "2021-05-25T09:16:10Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1035, - "watchers_count": 1035, + "stargazers_count": 1034, + "watchers_count": 1034, "forks_count": 234, "forks": 234, - "watchers": 1035, + "watchers": 1034, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 69ed037258..d709e48b4f 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-24T06:20:18Z", + "updated_at": "2021-05-25T09:16:10Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1035, - "watchers_count": 1035, + "stargazers_count": 1034, + "watchers_count": 1034, "forks_count": 234, "forks": 234, - "watchers": 1035, + "watchers": 1034, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 10999bac4c..7b3832b6c3 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -17,8 +17,8 @@ "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 421, "watchers_count": 421, - "forks_count": 400, - "forks": 400, + "forks_count": 401, + "forks": 401, "watchers": 421, "score": 0 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 57e2b27395..c4fab3f85c 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-24T06:20:18Z", + "updated_at": "2021-05-25T09:16:10Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1035, - "watchers_count": 1035, + "stargazers_count": 1034, + "watchers_count": 1034, "forks_count": 234, "forks": 234, - "watchers": 1035, + "watchers": 1034, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 8f4cc1e0ed..1cfade5cf0 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-05-23T02:07:57Z", + "updated_at": "2021-05-25T10:21:05Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 422, - "watchers_count": 422, + "stargazers_count": 421, + "watchers_count": 421, "forks_count": 99, "forks": 99, - "watchers": 422, + "watchers": 421, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 4c423180a3..eff3c3a3bc 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1232,13 +1232,13 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2021-05-25T08:17:48Z", + "updated_at": "2021-05-25T09:41:45Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 812, - "watchers_count": 812, - "forks_count": 198, - "forks": 198, - "watchers": 812, + "stargazers_count": 813, + "watchers_count": 813, + "forks_count": 199, + "forks": 199, + "watchers": 813, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 77d8b7a3a9..1658dee34c 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2021-05-25T00:44:14Z", + "updated_at": "2021-05-25T14:19:03Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1655, - "watchers_count": 1655, + "stargazers_count": 1656, + "watchers_count": 1656, "forks_count": 251, "forks": 251, - "watchers": 1655, + "watchers": 1656, "score": 0 }, { diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index 591c86cf8f..23545bd613 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -13,13 +13,13 @@ "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", - "updated_at": "2021-05-04T05:37:05Z", + "updated_at": "2021-05-25T12:40:37Z", "pushed_at": "2019-08-01T16:02:59Z", - "stargazers_count": 254, - "watchers_count": 254, + "stargazers_count": 255, + "watchers_count": 255, "forks_count": 96, "forks": 96, - "watchers": 254, + "watchers": 255, "score": 0 }, { diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index f2728d9bdb..a6477f2b77 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -40,8 +40,8 @@ "pushed_at": "2020-03-11T09:59:01Z", "stargazers_count": 104, "watchers_count": 104, - "forks_count": 32, - "forks": 32, + "forks_count": 33, + "forks": 33, "watchers": 104, "score": 0 }, diff --git a/2019/CVE-2019-16278.json b/2019/CVE-2019-16278.json index d89883ab00..c3d88c6562 100644 --- a/2019/CVE-2019-16278.json +++ b/2019/CVE-2019-16278.json @@ -13,13 +13,13 @@ "description": "Directory transversal to remote code execution", "fork": false, "created_at": "2019-10-15T03:40:13Z", - "updated_at": "2021-03-21T12:56:28Z", + "updated_at": "2021-05-25T10:21:04Z", "pushed_at": "2019-10-15T03:53:55Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 27, "forks": 27, - "watchers": 68, + "watchers": 67, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 4b587cac1c..c8725eaf5f 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2021-05-14T02:58:17Z", + "updated_at": "2021-05-25T14:12:11Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 764, - "watchers_count": 764, + "stargazers_count": 763, + "watchers_count": 763, "forks_count": 160, "forks": 160, - "watchers": 764, + "watchers": 763, "score": 0 }, { @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-24T06:20:18Z", + "updated_at": "2021-05-25T09:16:10Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1035, - "watchers_count": 1035, + "stargazers_count": 1034, + "watchers_count": 1034, "forks_count": 234, "forks": 234, - "watchers": 1035, + "watchers": 1034, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-9810.json b/2019/CVE-2019-9810.json index 3da60ae40f..c2a03afb37 100644 --- a/2019/CVE-2019-9810.json +++ b/2019/CVE-2019-9810.json @@ -36,13 +36,13 @@ "description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.", "fork": false, "created_at": "2019-05-05T17:19:02Z", - "updated_at": "2021-05-21T18:35:49Z", + "updated_at": "2021-05-25T09:38:10Z", "pushed_at": "2019-12-28T18:25:10Z", - "stargazers_count": 206, - "watchers_count": 206, + "stargazers_count": 207, + "watchers_count": 207, "forks_count": 56, "forks": 56, - "watchers": 206, + "watchers": 207, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json index 4ffac8d048..7b248d0e56 100644 --- a/2020/CVE-2020-0041.json +++ b/2020/CVE-2020-0041.json @@ -17,8 +17,8 @@ "pushed_at": "2020-04-08T08:55:30Z", "stargazers_count": 162, "watchers_count": 162, - "forks_count": 50, - "forks": 50, + "forks_count": 51, + "forks": 51, "watchers": 162, "score": 0 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 8c9485e18d..8d9bfa4ebf 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1439,13 +1439,13 @@ "description": null, "fork": false, "created_at": "2020-09-17T01:48:37Z", - "updated_at": "2021-05-14T12:56:07Z", + "updated_at": "2021-05-25T09:56:38Z", "pushed_at": "2020-09-17T01:55:48Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 14, "forks": 14, - "watchers": 52, + "watchers": 53, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 7f33b7e64b..6e9dca5f37 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -109,8 +109,8 @@ "pushed_at": "2021-04-26T02:30:11Z", "stargazers_count": 765, "watchers_count": 765, - "forks_count": 240, - "forks": 240, + "forks_count": 241, + "forks": 241, "watchers": 765, "score": 0 } diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 686fc83616..1919a43071 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -312,13 +312,13 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2021-05-22T09:54:20Z", + "updated_at": "2021-05-25T11:48:04Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 192, - "watchers_count": 192, + "stargazers_count": 193, + "watchers_count": 193, "forks_count": 72, "forks": 72, - "watchers": 192, + "watchers": 193, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 35636692a5..3e21056381 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-24T06:20:18Z", + "updated_at": "2021-05-25T09:16:10Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1035, - "watchers_count": 1035, + "stargazers_count": 1034, + "watchers_count": 1034, "forks_count": 234, "forks": 234, - "watchers": 1035, + "watchers": 1034, "score": 0 }, { diff --git a/2020/CVE-2020-6516.json b/2020/CVE-2020-6516.json index 259d35e146..02b339e94f 100644 --- a/2020/CVE-2020-6516.json +++ b/2020/CVE-2020-6516.json @@ -13,8 +13,8 @@ "description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)", "fork": false, "created_at": "2021-03-11T15:27:25Z", - "updated_at": "2021-05-17T05:49:12Z", - "pushed_at": "2021-04-20T08:35:26Z", + "updated_at": "2021-05-25T11:14:58Z", + "pushed_at": "2021-05-25T11:14:56Z", "stargazers_count": 103, "watchers_count": 103, "forks_count": 23, diff --git a/2020/CVE-2020-7961.json b/2020/CVE-2020-7961.json index fbbb9afc0d..5fe5c5595e 100644 --- a/2020/CVE-2020-7961.json +++ b/2020/CVE-2020-7961.json @@ -151,13 +151,13 @@ "description": "CVE-2020–7961 Mass exploit for Script Kiddies", "fork": false, "created_at": "2021-01-02T13:57:59Z", - "updated_at": "2021-05-21T00:55:24Z", + "updated_at": "2021-05-25T10:13:00Z", "pushed_at": "2021-01-03T10:54:20Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 1, "forks": 1, - "watchers": 8, + "watchers": 9, "score": 0 }, { diff --git a/2021/CVE-2021-22192.json b/2021/CVE-2021-22192.json index de4d08a4f7..6aa0630f94 100644 --- a/2021/CVE-2021-22192.json +++ b/2021/CVE-2021-22192.json @@ -13,13 +13,13 @@ "description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞", "fork": false, "created_at": "2021-03-27T07:09:46Z", - "updated_at": "2021-05-17T04:51:22Z", + "updated_at": "2021-05-25T14:52:51Z", "pushed_at": "2021-05-02T05:34:29Z", - "stargazers_count": 23, - "watchers_count": 23, - "forks_count": 3, - "forks": 3, - "watchers": 23, + "stargazers_count": 24, + "watchers_count": 24, + "forks_count": 4, + "forks": 4, + "watchers": 24, "score": 0 }, { diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index 9c5e7aecf6..339a4d892e 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -13,13 +13,13 @@ "description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool", "fork": false, "created_at": "2021-05-11T18:45:07Z", - "updated_at": "2021-05-25T07:41:26Z", + "updated_at": "2021-05-25T10:19:24Z", "pushed_at": "2021-05-20T21:42:43Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 2, - "forks": 2, - "watchers": 6, + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 3, + "forks": 3, + "watchers": 8, "score": 0 }, { diff --git a/2021/CVE-2021-24027.json b/2021/CVE-2021-24027.json index 259d35e146..02b339e94f 100644 --- a/2021/CVE-2021-24027.json +++ b/2021/CVE-2021-24027.json @@ -13,8 +13,8 @@ "description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)", "fork": false, "created_at": "2021-03-11T15:27:25Z", - "updated_at": "2021-05-17T05:49:12Z", - "pushed_at": "2021-04-20T08:35:26Z", + "updated_at": "2021-05-25T11:14:58Z", + "pushed_at": "2021-05-25T11:14:56Z", "stargazers_count": 103, "watchers_count": 103, "forks_count": 23, diff --git a/2021/CVE-2021-24086.json b/2021/CVE-2021-24086.json index a12b7f7d1b..774c1ea199 100644 --- a/2021/CVE-2021-24086.json +++ b/2021/CVE-2021-24086.json @@ -13,13 +13,13 @@ "description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.", "fork": false, "created_at": "2021-04-07T11:10:40Z", - "updated_at": "2021-05-24T06:48:53Z", + "updated_at": "2021-05-25T09:39:14Z", "pushed_at": "2021-04-15T12:46:54Z", - "stargazers_count": 170, - "watchers_count": 170, - "forks_count": 36, - "forks": 36, - "watchers": 170, + "stargazers_count": 171, + "watchers_count": 171, + "forks_count": 37, + "forks": 37, + "watchers": 171, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 503a74bd70..a831fa5222 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -109,8 +109,8 @@ "pushed_at": "2021-04-26T02:30:11Z", "stargazers_count": 765, "watchers_count": 765, - "forks_count": 240, - "forks": 240, + "forks_count": 241, + "forks": 241, "watchers": 765, "score": 0 }, diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index fd9055801f..998114ca62 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,13 +13,13 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2021-05-25T08:48:21Z", + "updated_at": "2021-05-25T14:18:34Z", "pushed_at": "2021-05-21T23:58:50Z", - "stargazers_count": 695, - "watchers_count": 695, + "stargazers_count": 696, + "watchers_count": 696, "forks_count": 109, "forks": 109, - "watchers": 695, + "watchers": 696, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 550a82b493..4b2090eb73 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -59,13 +59,13 @@ "description": null, "fork": false, "created_at": "2021-01-25T08:42:28Z", - "updated_at": "2021-05-24T03:27:37Z", + "updated_at": "2021-05-25T12:59:19Z", "pushed_at": "2021-01-25T08:49:59Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 2, "forks": 2, - "watchers": 9, + "watchers": 10, "score": 0 }, { @@ -86,8 +86,8 @@ "pushed_at": "2021-01-27T06:23:34Z", "stargazers_count": 8, "watchers_count": 8, - "forks_count": 2, - "forks": 2, + "forks_count": 3, + "forks": 3, "watchers": 8, "score": 0 }, @@ -155,8 +155,8 @@ "pushed_at": "2021-02-18T08:30:23Z", "stargazers_count": 29, "watchers_count": 29, - "forks_count": 9, - "forks": 9, + "forks_count": 10, + "forks": 10, "watchers": 29, "score": 0 }, diff --git a/2021/CVE-2021-33558.json b/2021/CVE-2021-33558.json new file mode 100644 index 0000000000..2aaffb1e51 --- /dev/null +++ b/2021/CVE-2021-33558.json @@ -0,0 +1,25 @@ +[ + { + "id": 370638345, + "name": "CVE-2021-33558.", + "full_name": "mdanzaruddin\/CVE-2021-33558.", + "owner": { + "login": "mdanzaruddin", + "id": 48306735, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48306735?v=4", + "html_url": "https:\/\/github.com\/mdanzaruddin" + }, + "html_url": "https:\/\/github.com\/mdanzaruddin\/CVE-2021-33558.", + "description": null, + "fork": false, + "created_at": "2021-05-25T09:33:21Z", + "updated_at": "2021-05-25T09:42:03Z", + "pushed_at": "2021-05-25T09:42:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index f918aed24a..1d8dd0e4ae 100644 --- a/README.md +++ b/README.md @@ -1160,6 +1160,9 @@ Insufficient input validation in the Marvin Minsky 1967 implementation of the Un - [intrinsic-propensity/turing-machine](https://github.com/intrinsic-propensity/turing-machine) +### CVE-2021-33558 +- [mdanzaruddin/CVE-2021-33558.](https://github.com/mdanzaruddin/CVE-2021-33558.) + ### CVE-2021-3222222 - [r90tpass/CVE-2021-3222222](https://github.com/r90tpass/CVE-2021-3222222)