diff --git a/2018/CVE-2018-1273.json b/2018/CVE-2018-1273.json index 234fb5251e..8b36916c34 100644 --- a/2018/CVE-2018-1273.json +++ b/2018/CVE-2018-1273.json @@ -13,13 +13,13 @@ "description": "Environment for CVE-2018-1273 (Spring Data Commons)", "fork": false, "created_at": "2018-04-13T13:41:02Z", - "updated_at": "2019-04-24T05:33:19Z", + "updated_at": "2021-01-22T02:49:50Z", "pushed_at": "2018-08-15T05:26:45Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 2, "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0 }, { diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index 92fb8096d6..0f38d242c0 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -36,13 +36,13 @@ "description": "CVE-2019-1458 Windows LPE Exploit", "fork": false, "created_at": "2020-03-11T08:30:14Z", - "updated_at": "2021-01-12T07:21:25Z", + "updated_at": "2021-01-22T02:12:21Z", "pushed_at": "2020-03-11T09:59:01Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 95, + "watchers_count": 95, "forks_count": 27, "forks": 27, - "watchers": 94, + "watchers": 95, "score": 0 }, { diff --git a/2019/CVE-2019-9506.json b/2019/CVE-2019-9506.json index 2c0baa1294..3ec6ecaa08 100644 --- a/2019/CVE-2019-9506.json +++ b/2019/CVE-2019-9506.json @@ -13,7 +13,7 @@ "description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]", "fork": false, "created_at": "2019-08-15T11:54:21Z", - "updated_at": "2021-01-11T20:36:20Z", + "updated_at": "2021-01-21T21:29:48Z", "pushed_at": "2020-06-09T13:13:44Z", "stargazers_count": 129, "watchers_count": 129, diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index de20ae9fb3..e87d306993 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -183,29 +183,6 @@ "watchers": 0, "score": 0 }, - { - "id": 234598729, - "name": "CVE-2020-0601", - "full_name": "YoannDqr\/CVE-2020-0601", - "owner": { - "login": "YoannDqr", - "id": 26006989, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26006989?v=4", - "html_url": "https:\/\/github.com\/YoannDqr" - }, - "html_url": "https:\/\/github.com\/YoannDqr\/CVE-2020-0601", - "description": "CurveBall CVE exploitation", - "fork": false, - "created_at": "2020-01-17T17:17:55Z", - "updated_at": "2020-02-09T12:37:38Z", - "pushed_at": "2020-01-20T10:52:57Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 235145190, "name": "curveball", diff --git a/2020/CVE-2020-12928.json b/2020/CVE-2020-12928.json index c04a27505e..64f02a3174 100644 --- a/2020/CVE-2020-12928.json +++ b/2020/CVE-2020-12928.json @@ -17,8 +17,8 @@ "pushed_at": "2020-11-11T20:13:05Z", "stargazers_count": 12, "watchers_count": 12, - "forks_count": 12, - "forks": 12, + "forks_count": 13, + "forks": 13, "watchers": 12, "score": 0 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 5e547268c1..3f88112bb6 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -1071,13 +1071,13 @@ "description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example", "fork": false, "created_at": "2021-01-20T21:38:47Z", - "updated_at": "2021-01-20T22:25:08Z", + "updated_at": "2021-01-21T22:43:02Z", "pushed_at": "2021-01-20T22:25:05Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index b3d6bb2ea7..3cbf2065d3 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -36,13 +36,13 @@ "description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519", "fork": false, "created_at": "2020-10-09T06:34:36Z", - "updated_at": "2021-01-21T16:44:00Z", + "updated_at": "2021-01-22T02:52:28Z", "pushed_at": "2021-01-13T10:38:48Z", - "stargazers_count": 783, - "watchers_count": 783, - "forks_count": 143, - "forks": 143, - "watchers": 783, + "stargazers_count": 788, + "watchers_count": 788, + "forks_count": 144, + "forks": 144, + "watchers": 788, "score": 0 }, { diff --git a/2020/CVE-2020-16938.json b/2020/CVE-2020-16938.json index 2b11b5df3f..f6fb398597 100644 --- a/2020/CVE-2020-16938.json +++ b/2020/CVE-2020-16938.json @@ -13,13 +13,13 @@ "description": "Bypassing NTFS permissions to read any files as unprivileged user.", "fork": false, "created_at": "2020-10-21T15:38:22Z", - "updated_at": "2021-01-21T01:33:41Z", + "updated_at": "2021-01-22T02:29:43Z", "pushed_at": "2020-10-21T15:39:00Z", - "stargazers_count": 165, - "watchers_count": 165, + "stargazers_count": 166, + "watchers_count": 166, "forks_count": 37, "forks": 37, - "watchers": 165, + "watchers": 166, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17144.json b/2020/CVE-2020-17144.json index 120d91c7f1..a54887c085 100644 --- a/2020/CVE-2020-17144.json +++ b/2020/CVE-2020-17144.json @@ -13,13 +13,13 @@ "description": "Exchange2010 authorized RCE", "fork": false, "created_at": "2020-12-09T10:30:16Z", - "updated_at": "2021-01-19T02:32:34Z", + "updated_at": "2021-01-22T02:14:33Z", "pushed_at": "2020-12-24T08:11:51Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 125, + "watchers_count": 125, "forks_count": 33, "forks": 33, - "watchers": 124, + "watchers": 125, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 49d34f41dc..5ef24fe6c6 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-01-21T15:58:16Z", + "updated_at": "2021-01-22T03:12:11Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 887, - "watchers_count": 887, + "stargazers_count": 888, + "watchers_count": 888, "forks_count": 208, "forks": 208, - "watchers": 887, + "watchers": 888, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 13f5d9a0d6..f5ee052209 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -82,13 +82,13 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2021-01-20T01:45:48Z", + "updated_at": "2021-01-22T02:25:46Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 210, - "watchers_count": 210, + "stargazers_count": 211, + "watchers_count": 211, "forks_count": 32, "forks": 32, - "watchers": 210, + "watchers": 211, "score": 0 }, { diff --git a/2020/CVE-2020-35728.json b/2020/CVE-2020-35728.json index a1e6d18748..bdac8d9c93 100644 --- a/2020/CVE-2020-35728.json +++ b/2020/CVE-2020-35728.json @@ -13,13 +13,13 @@ "description": " CVE-2020-35728 & Jackson-databind RCE", "fork": false, "created_at": "2020-12-31T01:55:39Z", - "updated_at": "2021-01-20T05:13:32Z", + "updated_at": "2021-01-22T01:02:02Z", "pushed_at": "2020-12-31T01:56:18Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 5, "forks": 5, - "watchers": 41, + "watchers": 42, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-6207.json b/2020/CVE-2020-6207.json index f578cefce2..5b2b70be4c 100644 --- a/2020/CVE-2020-6207.json +++ b/2020/CVE-2020-6207.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)", "fork": false, "created_at": "2021-01-14T10:49:40Z", - "updated_at": "2021-01-21T20:40:04Z", + "updated_at": "2021-01-21T23:32:08Z", "pushed_at": "2021-01-15T16:25:19Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 26, + "watchers_count": 26, "forks_count": 9, "forks": 9, - "watchers": 24, + "watchers": 26, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7931.json b/2020/CVE-2020-7931.json index 762666f870..14d1b713f5 100644 --- a/2020/CVE-2020-7931.json +++ b/2020/CVE-2020-7931.json @@ -13,13 +13,13 @@ "description": "Hacking Artifactory with server side template injection", "fork": false, "created_at": "2020-03-11T13:56:43Z", - "updated_at": "2020-12-11T10:21:56Z", + "updated_at": "2021-01-22T02:06:59Z", "pushed_at": "2020-03-12T06:55:39Z", - "stargazers_count": 39, - "watchers_count": 39, - "forks_count": 11, - "forks": 11, - "watchers": 39, + "stargazers_count": 40, + "watchers_count": 40, + "forks_count": 12, + "forks": 12, + "watchers": 40, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json index b3550eed38..3e95f5f964 100644 --- a/2020/CVE-2020-8554.json +++ b/2020/CVE-2020-8554.json @@ -67,5 +67,28 @@ "forks": 0, "watchers": 2, "score": 0 + }, + { + "id": 331774345, + "name": "CVE-2020-8554", + "full_name": "Dviejopomata\/CVE-2020-8554", + "owner": { + "login": "Dviejopomata", + "id": 6862893, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6862893?v=4", + "html_url": "https:\/\/github.com\/Dviejopomata" + }, + "html_url": "https:\/\/github.com\/Dviejopomata\/CVE-2020-8554", + "description": null, + "fork": false, + "created_at": "2021-01-21T22:41:50Z", + "updated_at": "2021-01-21T22:42:08Z", + "pushed_at": "2021-01-21T22:42:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8558.json b/2020/CVE-2020-8558.json index 2a28bed40a..6c1fde0385 100644 --- a/2020/CVE-2020-8558.json +++ b/2020/CVE-2020-8558.json @@ -13,13 +13,13 @@ "description": "Information about Kubernetes CVE-2020-8558, including proof of concept exploit.", "fork": false, "created_at": "2020-07-09T06:56:07Z", - "updated_at": "2021-01-21T16:01:44Z", + "updated_at": "2021-01-22T01:20:20Z", "pushed_at": "2020-07-22T12:34:47Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "forks_count": 2, "forks": 2, - "watchers": 23, + "watchers": 24, "score": 0 }, { diff --git a/2021/CVE-2021-3019.json b/2021/CVE-2021-3019.json index 207fe8079e..c159c35237 100644 --- a/2021/CVE-2021-3019.json +++ b/2021/CVE-2021-3019.json @@ -36,13 +36,13 @@ "description": "CVE-2021-3019 lanproxy目录遍历任意文件读取漏洞探测POC", "fork": false, "created_at": "2021-01-11T04:18:44Z", - "updated_at": "2021-01-20T01:39:20Z", + "updated_at": "2021-01-22T02:56:21Z", "pushed_at": "2021-01-13T07:29:01Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index c5ed0a32d9..90b21d5b57 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2021-01-19T07:42:13Z", + "updated_at": "2021-01-22T00:14:39Z", "pushed_at": "2021-01-13T13:25:10Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 2, "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 925249fdcb..9f4ce84b90 100644 --- a/README.md +++ b/README.md @@ -185,7 +185,6 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid - [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601) - [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams) - [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils) -- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601) - [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball) - [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall) - [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall) @@ -1478,6 +1477,7 @@ Kubernetes API server in all versions allow an attacker who is able to create a - [rancher/externalip-webhook](https://github.com/rancher/externalip-webhook) - [jrmurray000/CVE-2020-8554](https://github.com/jrmurray000/CVE-2020-8554) - [twistlock/k8s-cve-2020-8554-mitigations](https://github.com/twistlock/k8s-cve-2020-8554-mitigations) +- [Dviejopomata/CVE-2020-8554](https://github.com/Dviejopomata/CVE-2020-8554) ### CVE-2020-8558 (2020-07-27)