diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json index 4ec204caf9..693acbc68c 100644 --- a/2017/CVE-2017-0144.json +++ b/2017/CVE-2017-0144.json @@ -13,13 +13,13 @@ "description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)", "fork": false, "created_at": "2017-07-16T19:44:04Z", - "updated_at": "2021-04-26T18:51:24Z", + "updated_at": "2021-05-03T01:50:26Z", "pushed_at": "2019-07-23T19:24:01Z", - "stargazers_count": 276, - "watchers_count": 276, + "stargazers_count": 277, + "watchers_count": 277, "forks_count": 110, "forks": 110, - "watchers": 276, + "watchers": 277, "score": 0 }, { diff --git a/2018/CVE-2018-17463.json b/2018/CVE-2018-17463.json new file mode 100644 index 0000000000..8eb0869629 --- /dev/null +++ b/2018/CVE-2018-17463.json @@ -0,0 +1,25 @@ +[ + { + "id": 363765446, + "name": "CVE-2018-17463", + "full_name": "kdmarti2\/CVE-2018-17463", + "owner": { + "login": "kdmarti2", + "id": 2709377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2709377?v=4", + "html_url": "https:\/\/github.com\/kdmarti2" + }, + "html_url": "https:\/\/github.com\/kdmarti2\/CVE-2018-17463", + "description": "Completed a working exploit for CVE-2018-17463 for fun.", + "fork": false, + "created_at": "2021-05-02T22:44:33Z", + "updated_at": "2021-05-02T22:53:44Z", + "pushed_at": "2021-05-02T22:53:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index a347841b71..e893d160cd 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -128,13 +128,13 @@ "description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995", "fork": false, "created_at": "2018-09-23T20:58:40Z", - "updated_at": "2021-04-24T20:27:00Z", + "updated_at": "2021-05-03T01:41:19Z", "pushed_at": "2018-10-11T16:54:31Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "forks_count": 42, "forks": 42, - "watchers": 82, + "watchers": 83, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 75af27c6ee..d81052c477 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -887,13 +887,13 @@ "description": "CVE-2019-0708 远程代码执行漏洞批量检测", "fork": false, "created_at": "2019-05-21T05:38:54Z", - "updated_at": "2021-01-13T19:58:11Z", + "updated_at": "2021-05-02T23:57:01Z", "pushed_at": "2019-05-30T02:43:06Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "forks_count": 29, "forks": 29, - "watchers": 78, + "watchers": 79, "score": 0 }, { diff --git a/2019/CVE-2019-3403.json b/2019/CVE-2019-3403.json index 53ef44e46e..2f51fd8750 100644 --- a/2019/CVE-2019-3403.json +++ b/2019/CVE-2019-3403.json @@ -1,4 +1,27 @@ [ + { + "id": 295868190, + "name": "UserEnumJira", + "full_name": "und3sc0n0c1d0\/UserEnumJira", + "owner": { + "login": "und3sc0n0c1d0", + "id": 32236059, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4", + "html_url": "https:\/\/github.com\/und3sc0n0c1d0" + }, + "html_url": "https:\/\/github.com\/und3sc0n0c1d0\/UserEnumJira", + "description": "Serie de scripts para enumerar nombres de usuarios de JIRA a partir de vulnerabilidades conocidas (CVE-2020-14181, CVE-2019-3403, CVE-2019-8449...)", + "fork": false, + "created_at": "2020-09-15T23:00:03Z", + "updated_at": "2021-05-03T00:39:20Z", + "pushed_at": "2021-05-03T00:39:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 349235683, "name": "CVE-2019-3403", diff --git a/2020/CVE-2020-14181.json b/2020/CVE-2020-14181.json index e7b92ca0d3..7f142c7bcf 100644 --- a/2020/CVE-2020-14181.json +++ b/2020/CVE-2020-14181.json @@ -1,4 +1,27 @@ [ + { + "id": 295868190, + "name": "UserEnumJira", + "full_name": "und3sc0n0c1d0\/UserEnumJira", + "owner": { + "login": "und3sc0n0c1d0", + "id": 32236059, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4", + "html_url": "https:\/\/github.com\/und3sc0n0c1d0" + }, + "html_url": "https:\/\/github.com\/und3sc0n0c1d0\/UserEnumJira", + "description": "Serie de scripts para enumerar nombres de usuarios de JIRA a partir de vulnerabilidades conocidas (CVE-2020-14181, CVE-2019-3403, CVE-2019-8449...)", + "fork": false, + "created_at": "2020-09-15T23:00:03Z", + "updated_at": "2021-05-03T00:39:20Z", + "pushed_at": "2021-05-03T00:39:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 307446561, "name": "CVE-2020-14181", diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index f0387b2b8d..d3af35acbc 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1025,13 +1025,13 @@ "description": "CVE-2021-3156 - Sudo Baron Samedit", "fork": false, "created_at": "2021-04-29T06:29:26Z", - "updated_at": "2021-05-02T07:38:12Z", + "updated_at": "2021-05-03T01:33:33Z", "pushed_at": "2021-04-29T16:26:45Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 67, + "watchers_count": 67, "forks_count": 0, "forks": 0, - "watchers": 64, + "watchers": 67, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index ea22e1eea1..cef7e878b4 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -17,8 +17,8 @@ "pushed_at": "2021-04-20T00:46:14Z", "stargazers_count": 156, "watchers_count": 156, - "forks_count": 49, - "forks": 49, + "forks_count": 50, + "forks": 50, "watchers": 156, "score": 0 }, diff --git a/README.md b/README.md index 48491047ce..ed875613fe 100644 --- a/README.md +++ b/README.md @@ -3628,6 +3628,7 @@ Affected versions of Atlassian Jira Server and Data Center allow remote, unauthe Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5.7, and from version 8.6.0 before 8.12.0. +- [und3sc0n0c1d0/UserEnumJira](https://github.com/und3sc0n0c1d0/UserEnumJira) - [Rival420/CVE-2020-14181](https://github.com/Rival420/CVE-2020-14181) - [bk-rao/CVE-2020-14181](https://github.com/bk-rao/CVE-2020-14181) @@ -5901,6 +5902,7 @@ Confluence Server and Data Center had a path traversal vulnerability in the down The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check. +- [und3sc0n0c1d0/UserEnumJira](https://github.com/und3sc0n0c1d0/UserEnumJira) - [davidmckennirey/CVE-2019-3403](https://github.com/davidmckennirey/CVE-2019-3403) ### CVE-2019-3462 (2019-01-28) @@ -11511,6 +11513,14 @@ Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.1 - [799600966/CVE-2018-17456](https://github.com/799600966/CVE-2018-17456) - [AnonymKing/CVE-2018-17456](https://github.com/AnonymKing/CVE-2018-17456) +### CVE-2018-17463 (2018-11-14) + + +Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. + + +- [kdmarti2/CVE-2018-17463](https://github.com/kdmarti2/CVE-2018-17463) + ### CVE-2018-17873 (2018-10-23)