From 93c8848add557dd56bd93c35b6056d9067d707c8 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 22 Mar 2021 18:12:24 +0900 Subject: [PATCH] Auto Update 2021/03/22 18:12:24 --- 2014/CVE-2014-0160.json | 4 ++-- 2014/CVE-2014-4210.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2017/CVE-2017-13156.json | 23 ++++++++++++++++++++++ 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-3191.json | 8 ++++---- 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-2618.json | 8 ++++---- 2019/CVE-2019-3396.json | 8 ++++---- 2020/CVE-2020-0796.json | 16 ++++++++-------- 2020/CVE-2020-1472.json | 16 ++++++++-------- 2020/CVE-2020-14882.json | 12 ++++++------ 2020/CVE-2020-14883.json | 20 ++++++++++---------- 2020/CVE-2020-15906.json | 8 ++++---- 2020/CVE-2020-16898.json | 8 ++++---- 2020/CVE-2020-17523.json | 8 ++++---- 2020/CVE-2020-2551.json | 8 ++++---- 2020/CVE-2020-25686.json | 8 ++++---- 2020/CVE-2020-2883.json | 4 ++-- 2020/CVE-2020-9483.json | 8 ++++---- 2021/CVE-2021-1732.json | 10 +++++----- 2021/CVE-2021-22986.json | 41 +++++++++++++++++++++++++++++++--------- 2021/CVE-2021-25646.json | 12 ++++++------ 2021/CVE-2021-26855.json | 16 ++++++++-------- 2021/CVE-2021-3019.json | 23 ++++++++++++++++++++++ 2021/CVE-2021-3156.json | 12 ++++++------ README.md | 3 +++ 28 files changed, 198 insertions(+), 126 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 8ead1ec4dc..52cba01ddf 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -17,8 +17,8 @@ "pushed_at": "2021-02-24T09:17:24Z", "stargazers_count": 2252, "watchers_count": 2252, - "forks_count": 485, - "forks": 485, + "forks_count": 484, + "forks": 484, "watchers": 2252, "score": 0 }, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 6d004ba403..a8d508839b 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-03-22T01:49:49Z", + "updated_at": "2021-03-22T07:31:40Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 962, - "watchers_count": 962, + "stargazers_count": 963, + "watchers_count": 963, "forks_count": 223, "forks": 223, - "watchers": 962, + "watchers": 963, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index d3235e2e72..d54d68b2f4 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-03-22T01:49:49Z", + "updated_at": "2021-03-22T07:31:40Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 962, - "watchers_count": 962, + "stargazers_count": 963, + "watchers_count": 963, "forks_count": 223, "forks": 223, - "watchers": 962, + "watchers": 963, "score": 0 }, { diff --git a/2017/CVE-2017-13156.json b/2017/CVE-2017-13156.json index ada8659bed..7d3acb079b 100644 --- a/2017/CVE-2017-13156.json +++ b/2017/CVE-2017-13156.json @@ -90,5 +90,28 @@ "forks": 1, "watchers": 2, "score": 0 + }, + { + "id": 350263870, + "name": "Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-", + "full_name": "ari5ti\/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-", + "owner": { + "login": "ari5ti", + "id": 52395887, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52395887?v=4", + "html_url": "https:\/\/github.com\/ari5ti" + }, + "html_url": "https:\/\/github.com\/ari5ti\/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-", + "description": null, + "fork": false, + "created_at": "2021-03-22T08:27:10Z", + "updated_at": "2021-03-22T08:30:48Z", + "pushed_at": "2021-03-22T08:30:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 9f4782b8c1..b8a12f9de7 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-03-22T01:49:49Z", + "updated_at": "2021-03-22T07:31:40Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 962, - "watchers_count": 962, + "stargazers_count": 963, + "watchers_count": 963, "forks_count": 223, "forks": 223, - "watchers": 962, + "watchers": 963, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 64a9cb2025..2ce88d2a54 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-03-22T01:49:49Z", + "updated_at": "2021-03-22T07:31:40Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 962, - "watchers_count": 962, + "stargazers_count": 963, + "watchers_count": 963, "forks_count": 223, "forks": 223, - "watchers": 962, + "watchers": 963, "score": 0 }, { diff --git a/2018/CVE-2018-3191.json b/2018/CVE-2018-3191.json index 1455141f7d..f6ec833203 100644 --- a/2018/CVE-2018-3191.json +++ b/2018/CVE-2018-3191.json @@ -59,13 +59,13 @@ "description": "CVE-2018-3191 反弹shell", "fork": false, "created_at": "2018-10-23T17:24:43Z", - "updated_at": "2021-02-16T18:19:59Z", + "updated_at": "2021-03-22T07:47:56Z", "pushed_at": "2018-10-23T17:28:05Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 56, + "watchers_count": 56, "forks_count": 31, "forks": 31, - "watchers": 55, + "watchers": 56, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 4aece39de2..3ae3a2c66f 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-03-22T03:03:20Z", + "updated_at": "2021-03-22T07:54:25Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2414, - "watchers_count": 2414, + "stargazers_count": 2418, + "watchers_count": 2418, "forks_count": 695, "forks": 695, - "watchers": 2414, + "watchers": 2418, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 648fbcc74d..d0942d3135 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-03-22T01:49:49Z", + "updated_at": "2021-03-22T07:31:40Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 962, - "watchers_count": 962, + "stargazers_count": 963, + "watchers_count": 963, "forks_count": 223, "forks": 223, - "watchers": 962, + "watchers": 963, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index 345df81aaf..7ee6f625ee 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -105,13 +105,13 @@ "description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞", "fork": false, "created_at": "2019-04-10T02:22:24Z", - "updated_at": "2021-03-09T02:12:48Z", + "updated_at": "2021-03-22T08:02:48Z", "pushed_at": "2019-11-01T14:33:21Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "forks_count": 58, "forks": 58, - "watchers": 115, + "watchers": 116, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index b94e40d048..2493b1c02f 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -105,13 +105,13 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2021-03-03T11:48:00Z", + "updated_at": "2021-03-22T08:30:24Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 579, - "watchers_count": 579, + "stargazers_count": 580, + "watchers_count": 580, "forks_count": 195, "forks": 195, - "watchers": 579, + "watchers": 580, "score": 0 }, { @@ -887,13 +887,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-03-13T19:46:03Z", + "updated_at": "2021-03-22T04:46:26Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1102, - "watchers_count": 1102, + "stargazers_count": 1103, + "watchers_count": 1103, "forks_count": 359, "forks": 359, - "watchers": 1102, + "watchers": 1103, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 309f375e84..a3f58c148f 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2021-03-19T21:43:06Z", + "updated_at": "2021-03-22T08:37:05Z", "pushed_at": "2020-10-21T12:10:28Z", - "stargazers_count": 1256, - "watchers_count": 1256, + "stargazers_count": 1258, + "watchers_count": 1258, "forks_count": 290, "forks": 290, - "watchers": 1256, + "watchers": 1258, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2021-03-20T05:47:32Z", + "updated_at": "2021-03-22T07:39:15Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 183, - "watchers_count": 183, + "stargazers_count": 184, + "watchers_count": 184, "forks_count": 38, "forks": 38, - "watchers": 183, + "watchers": 184, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 638924d5b1..f9381f505d 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-03-22T03:03:20Z", + "updated_at": "2021-03-22T07:54:25Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2414, - "watchers_count": 2414, + "stargazers_count": 2418, + "watchers_count": 2418, "forks_count": 695, "forks": 695, - "watchers": 2414, + "watchers": 2418, "score": 0 }, { @@ -500,8 +500,8 @@ "pushed_at": "2021-01-25T07:54:23Z", "stargazers_count": 23, "watchers_count": 23, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 23, "score": 0 }, diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index f6ddde8eb4..39f742a5ce 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -59,13 +59,13 @@ "description": "用于对WebLogic(10.3.6.0.0 ;12.1.3.0.0 ;12.2.1.3.0; 12.2.1.4.0 ;14.1.1.0.0)进行验证及利用", "fork": false, "created_at": "2021-01-25T15:33:04Z", - "updated_at": "2021-01-26T14:31:14Z", + "updated_at": "2021-03-22T03:22:01Z", "pushed_at": "2021-01-26T14:26:17Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 }, { @@ -102,16 +102,16 @@ "html_url": "https:\/\/github.com\/Yang0615777" }, "html_url": "https:\/\/github.com\/Yang0615777\/PocList", - "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE", + "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-03-22T02:04:28Z", - "pushed_at": "2021-03-21T16:38:20Z", - "stargazers_count": 176, - "watchers_count": 176, + "updated_at": "2021-03-22T08:31:11Z", + "pushed_at": "2021-03-22T03:46:42Z", + "stargazers_count": 182, + "watchers_count": 182, "forks_count": 44, "forks": 44, - "watchers": 176, + "watchers": 182, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-15906.json b/2020/CVE-2020-15906.json index 5aa54be44b..3e7f5aa2bb 100644 --- a/2020/CVE-2020-15906.json +++ b/2020/CVE-2020-15906.json @@ -13,13 +13,13 @@ "description": "Writeup of CVE-2020-15906", "fork": false, "created_at": "2020-07-23T09:20:53Z", - "updated_at": "2021-02-20T15:03:34Z", + "updated_at": "2021-03-22T04:03:34Z", "pushed_at": "2020-10-26T22:01:33Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "forks_count": 4, "forks": 4, - "watchers": 39, + "watchers": 40, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index af5f313a07..4b59776b85 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -312,13 +312,13 @@ "description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC", "fork": false, "created_at": "2020-10-28T11:25:58Z", - "updated_at": "2021-03-22T02:57:56Z", + "updated_at": "2021-03-22T03:25:52Z", "pushed_at": "2020-10-28T11:27:17Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 6, "forks": 6, - "watchers": 8, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17523.json b/2020/CVE-2020-17523.json index a6a7998812..5d0ca45634 100644 --- a/2020/CVE-2020-17523.json +++ b/2020/CVE-2020-17523.json @@ -13,13 +13,13 @@ "description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析(带漏洞环境)", "fork": false, "created_at": "2021-02-03T08:14:03Z", - "updated_at": "2021-03-22T02:14:09Z", + "updated_at": "2021-03-22T07:44:31Z", "pushed_at": "2021-02-07T09:42:36Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 58, + "watchers_count": 58, "forks_count": 7, "forks": 7, - "watchers": 56, + "watchers": 58, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index beb5a1a93c..ed6f8658c2 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-03-22T01:49:49Z", + "updated_at": "2021-03-22T07:31:40Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 962, - "watchers_count": 962, + "stargazers_count": 963, + "watchers_count": 963, "forks_count": 223, "forks": 223, - "watchers": 962, + "watchers": 963, "score": 0 }, { diff --git a/2020/CVE-2020-25686.json b/2020/CVE-2020-25686.json index 2561e5d8cf..b0b8038ec1 100644 --- a/2020/CVE-2020-25686.json +++ b/2020/CVE-2020-25686.json @@ -13,13 +13,13 @@ "description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)", "fork": false, "created_at": "2021-01-23T19:07:18Z", - "updated_at": "2021-03-12T23:36:44Z", + "updated_at": "2021-03-22T03:33:22Z", "pushed_at": "2021-01-24T09:05:40Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "forks_count": 31, "forks": 31, - "watchers": 65, + "watchers": 66, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index ee76053803..2162fc150d 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -86,8 +86,8 @@ "pushed_at": "2020-08-25T03:17:32Z", "stargazers_count": 218, "watchers_count": 218, - "forks_count": 33, - "forks": 33, + "forks_count": 34, + "forks": 34, "watchers": 218, "score": 0 }, diff --git a/2020/CVE-2020-9483.json b/2020/CVE-2020-9483.json index 6612230cae..d8e39ea0d6 100644 --- a/2020/CVE-2020-9483.json +++ b/2020/CVE-2020-9483.json @@ -13,13 +13,13 @@ "description": "CVE-2020-9483 OR CVE-2020-13921", "fork": false, "created_at": "2021-01-06T13:22:32Z", - "updated_at": "2021-01-06T13:54:42Z", + "updated_at": "2021-03-22T05:21:36Z", "pushed_at": "2021-01-06T13:52:44Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 42bc05103a..003da5edd3 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,13 +13,13 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2021-03-20T16:49:12Z", + "updated_at": "2021-03-22T08:20:06Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 255, - "watchers_count": 255, + "stargazers_count": 256, + "watchers_count": 256, "forks_count": 53, "forks": 53, - "watchers": 255, + "watchers": 256, "score": 0 }, { @@ -59,7 +59,7 @@ "description": null, "fork": false, "created_at": "2021-03-09T02:13:43Z", - "updated_at": "2021-03-09T02:13:54Z", + "updated_at": "2021-03-22T08:20:46Z", "pushed_at": "2021-03-09T02:13:51Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 5e4e8426ef..c9de835239 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -13,13 +13,13 @@ "description": "This is a Poc for BIGIP iControl unauth RCE ", "fork": false, "created_at": "2021-03-17T05:02:45Z", - "updated_at": "2021-03-22T02:41:28Z", + "updated_at": "2021-03-22T07:55:18Z", "pushed_at": "2021-03-17T05:10:03Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "forks_count": 6, "forks": 6, - "watchers": 26, + "watchers": 27, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "F5 BIG-IP\/BIG-IQ iControl Rest API SSRF to RCE", "fork": false, "created_at": "2021-03-21T04:58:17Z", - "updated_at": "2021-03-22T02:44:58Z", + "updated_at": "2021-03-22T07:53:50Z", "pushed_at": "2021-03-21T17:10:41Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 }, { @@ -105,8 +105,31 @@ "description": "CVE-2021-22986 F5 BIG-IP iControl 命令执行漏洞", "fork": false, "created_at": "2021-03-21T07:40:51Z", - "updated_at": "2021-03-21T07:55:14Z", + "updated_at": "2021-03-22T07:52:00Z", "pushed_at": "2021-03-21T07:40:59Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 350243656, + "name": "CVE-2021-22986", + "full_name": "Al1ex\/CVE-2021-22986", + "owner": { + "login": "Al1ex", + "id": 38161463, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", + "html_url": "https:\/\/github.com\/Al1ex" + }, + "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-22986", + "description": "CVE-2021-22986 & F5 BIG-IP RCE", + "fork": false, + "created_at": "2021-03-22T07:13:50Z", + "updated_at": "2021-03-22T08:40:16Z", + "pushed_at": "2021-03-22T08:40:14Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 7b9f9a3a0e..2babe76fb6 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -102,16 +102,16 @@ "html_url": "https:\/\/github.com\/Yang0615777" }, "html_url": "https:\/\/github.com\/Yang0615777\/PocList", - "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE", + "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-03-22T02:04:28Z", - "pushed_at": "2021-03-21T16:38:20Z", - "stargazers_count": 176, - "watchers_count": 176, + "updated_at": "2021-03-22T08:31:11Z", + "pushed_at": "2021-03-22T03:46:42Z", + "stargazers_count": 182, + "watchers_count": 182, "forks_count": 44, "forks": 44, - "watchers": 176, + "watchers": 182, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 509249f5ec..1d3da217b1 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -59,13 +59,13 @@ "description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)", "fork": false, "created_at": "2021-03-05T08:22:07Z", - "updated_at": "2021-03-20T08:34:47Z", + "updated_at": "2021-03-22T03:36:12Z", "pushed_at": "2021-03-16T08:34:14Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 84, + "watchers_count": 84, "forks_count": 19, "forks": 19, - "watchers": 83, + "watchers": 84, "score": 0 }, { @@ -450,13 +450,13 @@ "description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github", "fork": false, "created_at": "2021-03-11T20:51:48Z", - "updated_at": "2021-03-19T16:14:46Z", + "updated_at": "2021-03-22T06:50:36Z", "pushed_at": "2021-03-11T20:58:08Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 26, "forks": 26, - "watchers": 42, + "watchers": 43, "score": 0 }, { diff --git a/2021/CVE-2021-3019.json b/2021/CVE-2021-3019.json index 777b6fc0d5..8d9898e26a 100644 --- a/2021/CVE-2021-3019.json +++ b/2021/CVE-2021-3019.json @@ -90,5 +90,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 350235820, + "name": "cve-2021-3019", + "full_name": "Aoyuh\/cve-2021-3019", + "owner": { + "login": "Aoyuh", + "id": 48713040, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48713040?v=4", + "html_url": "https:\/\/github.com\/Aoyuh" + }, + "html_url": "https:\/\/github.com\/Aoyuh\/cve-2021-3019", + "description": "lanproxy(CVE-2021-3019)目录遍历", + "fork": false, + "created_at": "2021-03-22T06:44:07Z", + "updated_at": "2021-03-22T06:44:07Z", + "pushed_at": "2021-03-22T06:44:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 3dd534ee19..6c5a6cff00 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -887,13 +887,13 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2021-03-22T02:12:51Z", + "updated_at": "2021-03-22T08:50:14Z", "pushed_at": "2021-03-19T17:21:48Z", - "stargazers_count": 211, - "watchers_count": 211, - "forks_count": 33, - "forks": 33, - "watchers": 211, + "stargazers_count": 214, + "watchers_count": 214, + "forks_count": 34, + "forks": 34, + "watchers": 214, "score": 0 }, { diff --git a/README.md b/README.md index a67a861ce9..50defd8892 100644 --- a/README.md +++ b/README.md @@ -57,6 +57,7 @@ ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties - [FanqXu/CVE-2021-3019](https://github.com/FanqXu/CVE-2021-3019) - [liuxu54898/CVE-2021-3019](https://github.com/liuxu54898/CVE-2021-3019) - [murataydemir/CVE-2021-3019](https://github.com/murataydemir/CVE-2021-3019) +- [Aoyuh/cve-2021-3019](https://github.com/Aoyuh/cve-2021-3019) ### CVE-2021-3122 (2021-02-07) @@ -319,6 +320,7 @@ VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code exe - [Osyanina/westone-CVE-2021-22986-scanner](https://github.com/Osyanina/westone-CVE-2021-22986-scanner) - [Udyz/CVE-2021-22986](https://github.com/Udyz/CVE-2021-22986) - [safesword/F5_RCE](https://github.com/safesword/F5_RCE) +- [Al1ex/CVE-2021-22986](https://github.com/Al1ex/CVE-2021-22986) ### CVE-2021-23132 (2021-03-04) @@ -13030,6 +13032,7 @@ An elevation of privilege vulnerability in the Android system (art). Product: An - [caxmd/CVE-2017-13156](https://github.com/caxmd/CVE-2017-13156) - [giacomoferretti/janus-toolkit](https://github.com/giacomoferretti/janus-toolkit) - [tea9/CVE-2017-13156-Janus](https://github.com/tea9/CVE-2017-13156-Janus) +- [ari5ti/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-](https://github.com/ari5ti/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-) ### CVE-2017-13253 (2018-04-04)