From d00dac12482f0d105fec66c37e01137446355173 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 12 Jul 2021 00:11:25 +0900 Subject: [PATCH] Auto Update 2021/07/12 00:11:25 --- 2011/CVE-2011-3389.json | 8 ++--- 2014/CVE-2014-0196.json | 23 -------------- 2014/CVE-2014-0224.json | 69 ---------------------------------------- 2014/CVE-2014-0521.json | 25 --------------- 2014/CVE-2014-1677.json | 25 --------------- 2014/CVE-2014-3120.json | 23 -------------- 2014/CVE-2014-4210.json | 8 ++--- 2014/CVE-2014-6271.json | 46 --------------------------- 2016/CVE-2016-0638.json | 8 ++--- 2016/CVE-2016-6210.json | 23 -------------- 2017/CVE-2017-3248.json | 8 ++--- 2018/CVE-2018-10933.json | 8 ++--- 2018/CVE-2018-2628.json | 8 ++--- 2019/CVE-2019-1458.json | 8 ++--- 2019/CVE-2019-2618.json | 8 ++--- 2019/CVE-2019-5736.json | 4 +-- 2019/CVE-2019-7304.json | 8 ++--- 2019/CVE-2019-8781.json | 8 ++--- 2020/CVE-2020-0796.json | 8 ++--- 2020/CVE-2020-12695.json | 8 ++--- 2020/CVE-2020-14343.json | 4 +-- 2020/CVE-2020-1472.json | 12 +++---- 2020/CVE-2020-14883.json | 8 ++--- 2020/CVE-2020-1938.json | 23 ++++++++++++++ 2020/CVE-2020-2551.json | 8 ++--- 2020/CVE-2020-3580.json | 2 +- 2021/CVE-2021-1675.json | 24 +++++++------- 2021/CVE-2021-21972.json | 16 +++++----- 2021/CVE-2021-24086.json | 8 ++--- 2021/CVE-2021-25646.json | 8 ++--- 2021/CVE-2021-3129.json | 4 +-- 2021/CVE-2021-3156.json | 31 +++--------------- 2021/CVE-2021-34527.json | 8 ++--- README.md | 26 +-------------- 34 files changed, 129 insertions(+), 387 deletions(-) delete mode 100644 2014/CVE-2014-0521.json delete mode 100644 2014/CVE-2014-1677.json diff --git a/2011/CVE-2011-3389.json b/2011/CVE-2011-3389.json index aeaab5ff6d..8a1fb110e0 100644 --- a/2011/CVE-2011-3389.json +++ b/2011/CVE-2011-3389.json @@ -13,13 +13,13 @@ "description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:", "fork": false, "created_at": "2015-03-28T10:28:16Z", - "updated_at": "2021-07-03T11:20:31Z", + "updated_at": "2021-07-11T09:25:13Z", "pushed_at": "2019-01-30T21:36:22Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "forks_count": 28, "forks": 28, - "watchers": 47, + "watchers": 48, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-0196.json b/2014/CVE-2014-0196.json index 819d41db4b..68bc3b2566 100644 --- a/2014/CVE-2014-0196.json +++ b/2014/CVE-2014-0196.json @@ -21,28 +21,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 28126641, - "name": "CVE-2014-0196", - "full_name": "tempbottle\/CVE-2014-0196", - "owner": { - "login": "tempbottle", - "id": 1203820, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1203820?v=4", - "html_url": "https:\/\/github.com\/tempbottle" - }, - "html_url": "https:\/\/github.com\/tempbottle\/CVE-2014-0196", - "description": "CVE-2014-0196: Linux kernel pty layer race condition memory corruption", - "fork": false, - "created_at": "2014-12-17T07:39:00Z", - "updated_at": "2015-10-24T13:32:06Z", - "pushed_at": "2014-05-13T04:53:40Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, - "forks": 1, - "watchers": 1, - "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-0224.json b/2014/CVE-2014-0224.json index ff58bfa363..358e9121f3 100644 --- a/2014/CVE-2014-0224.json +++ b/2014/CVE-2014-0224.json @@ -22,52 +22,6 @@ "watchers": 35, "score": 0 }, - { - "id": 21604310, - "name": "CVE-2014-0224", - "full_name": "iph0n3\/CVE-2014-0224", - "owner": { - "login": "iph0n3", - "id": 1528152, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1528152?v=4", - "html_url": "https:\/\/github.com\/iph0n3" - }, - "html_url": "https:\/\/github.com\/iph0n3\/CVE-2014-0224", - "description": null, - "fork": false, - "created_at": "2014-07-08T08:08:00Z", - "updated_at": "2015-08-10T05:31:12Z", - "pushed_at": "2014-06-06T08:33:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 21711116, - "name": "ccs-eval", - "full_name": "droptables\/ccs-eval", - "owner": { - "login": "droptables", - "id": 5084547, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5084547?v=4", - "html_url": "https:\/\/github.com\/droptables" - }, - "html_url": "https:\/\/github.com\/droptables\/ccs-eval", - "description": "Used for evaluating hosts for CVE-2014-0224", - "fork": false, - "created_at": "2014-07-10T21:32:28Z", - "updated_at": "2015-04-07T04:27:18Z", - "pushed_at": "2014-07-10T21:41:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 21854976, "name": "openssl-ccs-cve-2014-0224", @@ -90,28 +44,5 @@ "forks": 4, "watchers": 13, "score": 0 - }, - { - "id": 21900951, - "name": "CVE-2014-0224", - "full_name": "secretnonempty\/CVE-2014-0224", - "owner": { - "login": "secretnonempty", - "id": 1168808, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1168808?v=4", - "html_url": "https:\/\/github.com\/secretnonempty" - }, - "html_url": "https:\/\/github.com\/secretnonempty\/CVE-2014-0224", - "description": null, - "fork": false, - "created_at": "2014-07-16T13:09:41Z", - "updated_at": "2021-03-26T12:43:40Z", - "pushed_at": "2014-07-18T06:53:23Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 4, - "forks": 4, - "watchers": 7, - "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-0521.json b/2014/CVE-2014-0521.json deleted file mode 100644 index 94c7c79b06..0000000000 --- a/2014/CVE-2014-0521.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 23252947, - "name": "cve-2014-0521", - "full_name": "molnarg\/cve-2014-0521", - "owner": { - "login": "molnarg", - "id": 894421, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/894421?v=4", - "html_url": "https:\/\/github.com\/molnarg" - }, - "html_url": "https:\/\/github.com\/molnarg\/cve-2014-0521", - "description": null, - "fork": false, - "created_at": "2014-08-23T09:54:18Z", - "updated_at": "2021-02-15T11:51:51Z", - "pushed_at": "2014-08-25T06:41:02Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 11, - "forks": 11, - "watchers": 12, - "score": 0 - } -] \ No newline at end of file diff --git a/2014/CVE-2014-1677.json b/2014/CVE-2014-1677.json deleted file mode 100644 index 50dcb66ffa..0000000000 --- a/2014/CVE-2014-1677.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 22477484, - "name": "freePW_tc7200Eploit", - "full_name": "tihmstar\/freePW_tc7200Eploit", - "owner": { - "login": "tihmstar", - "id": 1363935, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1363935?v=4", - "html_url": "https:\/\/github.com\/tihmstar" - }, - "html_url": "https:\/\/github.com\/tihmstar\/freePW_tc7200Eploit", - "description": "Technicolor TC7200 - Credentials Disclosure CVE : CVE-2014-1677", - "fork": false, - "created_at": "2014-07-31T17:01:29Z", - "updated_at": "2019-10-08T13:33:12Z", - "pushed_at": "2014-07-31T17:07:46Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2014/CVE-2014-3120.json b/2014/CVE-2014-3120.json index 8e6a77261e..a89f5262dd 100644 --- a/2014/CVE-2014-3120.json +++ b/2014/CVE-2014-3120.json @@ -21,28 +21,5 @@ "forks": 1, "watchers": 0, "score": 0 - }, - { - "id": 21585576, - "name": "ElasticSearch-CVE-2014-3120", - "full_name": "echohtp\/ElasticSearch-CVE-2014-3120", - "owner": { - "login": "echohtp", - "id": 313060, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/313060?v=4", - "html_url": "https:\/\/github.com\/echohtp" - }, - "html_url": "https:\/\/github.com\/echohtp\/ElasticSearch-CVE-2014-3120", - "description": "POC Code to exploite CVE-2014-3120", - "fork": false, - "created_at": "2014-07-07T20:28:34Z", - "updated_at": "2021-05-06T08:08:37Z", - "pushed_at": "2014-07-07T20:35:30Z", - "stargazers_count": 7, - "watchers_count": 7, - "forks_count": 5, - "forks": 5, - "watchers": 7, - "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 86bdb821fa..9744d49781 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-07-10T17:17:21Z", + "updated_at": "2021-07-11T14:27:04Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1103, - "watchers_count": 1103, + "stargazers_count": 1104, + "watchers_count": 1104, "forks_count": 245, "forks": 245, - "watchers": 1103, + "watchers": 1104, "score": 0 }, { diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index ee7144ad7f..e9b0bdfa20 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1,50 +1,4 @@ [ - { - "id": 24422837, - "name": "bash-cve-2014-6271-fixes", - "full_name": "dlitz\/bash-cve-2014-6271-fixes", - "owner": { - "login": "dlitz", - "id": 99377, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99377?v=4", - "html_url": "https:\/\/github.com\/dlitz" - }, - "html_url": "https:\/\/github.com\/dlitz\/bash-cve-2014-6271-fixes", - "description": "Collected fixes for bash CVE-2014-6271", - "fork": false, - "created_at": "2014-09-24T16:26:17Z", - "updated_at": "2014-09-24T16:26:17Z", - "pushed_at": "2014-09-24T17:38:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 24427252, - "name": "ansible-bashpocalypse", - "full_name": "npm\/ansible-bashpocalypse", - "owner": { - "login": "npm", - "id": 6078720, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6078720?v=4", - "html_url": "https:\/\/github.com\/npm" - }, - "html_url": "https:\/\/github.com\/npm\/ansible-bashpocalypse", - "description": "Patch for CVE-2014-6271", - "fork": false, - "created_at": "2014-09-24T18:27:03Z", - "updated_at": "2019-11-15T20:59:42Z", - "pushed_at": "2014-09-24T19:03:14Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 5, - "forks": 5, - "watchers": 6, - "score": 0 - }, { "id": 24433228, "name": "patched-bash-4.3", diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index a9c2adcb20..dc0b05cbb8 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-07-10T17:17:21Z", + "updated_at": "2021-07-11T14:27:04Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1103, - "watchers_count": 1103, + "stargazers_count": 1104, + "watchers_count": 1104, "forks_count": 245, "forks": 245, - "watchers": 1103, + "watchers": 1104, "score": 0 }, { diff --git a/2016/CVE-2016-6210.json b/2016/CVE-2016-6210.json index 9a44beb4ac..ffc76ef0b7 100644 --- a/2016/CVE-2016-6210.json +++ b/2016/CVE-2016-6210.json @@ -21,28 +21,5 @@ "forks": 1, "watchers": 1, "score": 0 - }, - { - "id": 329959230, - "name": "poc_CVE-2016-6210", - "full_name": "ubrito\/poc_CVE-2016-6210", - "owner": { - "login": "ubrito", - "id": 13032912, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13032912?v=4", - "html_url": "https:\/\/github.com\/ubrito" - }, - "html_url": "https:\/\/github.com\/ubrito\/poc_CVE-2016-6210", - "description": null, - "fork": false, - "created_at": "2021-01-15T16:05:09Z", - "updated_at": "2021-01-15T16:41:05Z", - "pushed_at": "2021-01-15T16:41:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 512730c9ba..ad021bf761 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-07-10T17:17:21Z", + "updated_at": "2021-07-11T14:27:04Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1103, - "watchers_count": 1103, + "stargazers_count": 1104, + "watchers_count": 1104, "forks_count": 245, "forks": 245, - "watchers": 1103, + "watchers": 1104, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index b6e4d2f0d4..5bcf2f6c4e 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -36,13 +36,13 @@ "description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)", "fork": false, "created_at": "2018-10-17T14:14:12Z", - "updated_at": "2021-06-14T16:47:22Z", + "updated_at": "2021-07-11T13:49:13Z", "pushed_at": "2021-03-14T10:52:28Z", - "stargazers_count": 470, - "watchers_count": 470, + "stargazers_count": 471, + "watchers_count": 471, "forks_count": 116, "forks": 116, - "watchers": 470, + "watchers": 471, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 9442628ad3..b7e3f6ccaa 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-07-10T17:17:21Z", + "updated_at": "2021-07-11T14:27:04Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1103, - "watchers_count": 1103, + "stargazers_count": 1104, + "watchers_count": 1104, "forks_count": 245, "forks": 245, - "watchers": 1103, + "watchers": 1104, "score": 0 }, { diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index 7513eb0157..18ec5862e3 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -13,13 +13,13 @@ "description": "POC for cve-2019-1458", "fork": false, "created_at": "2020-03-03T17:55:07Z", - "updated_at": "2021-07-05T06:50:32Z", + "updated_at": "2021-07-11T12:17:25Z", "pushed_at": "2020-03-04T07:05:24Z", - "stargazers_count": 136, - "watchers_count": 136, + "stargazers_count": 137, + "watchers_count": 137, "forks_count": 50, "forks": 50, - "watchers": 136, + "watchers": 137, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index baf52c73b5..d262cc58fe 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-07-10T17:17:21Z", + "updated_at": "2021-07-11T14:27:04Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1103, - "watchers_count": 1103, + "stargazers_count": 1104, + "watchers_count": 1104, "forks_count": 245, "forks": 245, - "watchers": 1103, + "watchers": 1104, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 2a1f8f8cf8..21e54e3a4d 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -40,8 +40,8 @@ "pushed_at": "2019-02-19T11:45:13Z", "stargazers_count": 518, "watchers_count": 518, - "forks_count": 137, - "forks": 137, + "forks_count": 138, + "forks": 138, "watchers": 518, "score": 0 }, diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json index 120878c09b..e6f863e9cf 100644 --- a/2019/CVE-2019-7304.json +++ b/2019/CVE-2019-7304.json @@ -13,13 +13,13 @@ "description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)", "fork": false, "created_at": "2019-02-12T06:02:06Z", - "updated_at": "2021-07-08T03:26:07Z", + "updated_at": "2021-07-11T10:11:01Z", "pushed_at": "2019-05-09T21:34:26Z", - "stargazers_count": 582, - "watchers_count": 582, + "stargazers_count": 583, + "watchers_count": 583, "forks_count": 144, "forks": 144, - "watchers": 582, + "watchers": 583, "score": 0 }, { diff --git a/2019/CVE-2019-8781.json b/2019/CVE-2019-8781.json index eb5bc6706a..014a40d033 100644 --- a/2019/CVE-2019-8781.json +++ b/2019/CVE-2019-8781.json @@ -13,13 +13,13 @@ "description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :)", "fork": false, "created_at": "2019-09-17T17:59:26Z", - "updated_at": "2021-07-08T09:10:43Z", + "updated_at": "2021-07-11T10:08:25Z", "pushed_at": "2019-10-15T17:05:38Z", - "stargazers_count": 282, - "watchers_count": 282, + "stargazers_count": 284, + "watchers_count": 284, "forks_count": 45, "forks": 45, - "watchers": 282, + "watchers": 284, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index b25a6f16d2..28d08ade4d 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -841,13 +841,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-07-11T02:54:54Z", + "updated_at": "2021-07-11T12:24:33Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1133, - "watchers_count": 1133, + "stargazers_count": 1134, + "watchers_count": 1134, "forks_count": 357, "forks": 357, - "watchers": 1133, + "watchers": 1134, "score": 0 }, { diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index 921620e86a..4205679271 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,13 +13,13 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2021-07-08T15:33:32Z", + "updated_at": "2021-07-11T12:35:00Z", "pushed_at": "2020-06-17T13:41:23Z", - "stargazers_count": 368, - "watchers_count": 368, + "stargazers_count": 369, + "watchers_count": 369, "forks_count": 64, "forks": 64, - "watchers": 368, + "watchers": 369, "score": 0 }, { diff --git a/2020/CVE-2020-14343.json b/2020/CVE-2020-14343.json index eed95f04f1..5a6623d097 100644 --- a/2020/CVE-2020-14343.json +++ b/2020/CVE-2020-14343.json @@ -13,8 +13,8 @@ "description": "Experimenting with the CVE-2020-14343 PyYAML vulnerability", "fork": false, "created_at": "2021-06-27T06:56:15Z", - "updated_at": "2021-07-11T04:20:46Z", - "pushed_at": "2021-07-11T04:20:44Z", + "updated_at": "2021-07-11T12:54:08Z", + "pushed_at": "2021-07-11T12:54:05Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 4b7cfc8757..8c500c0dcc 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2021-07-10T12:13:49Z", + "updated_at": "2021-07-11T14:23:02Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 330, - "watchers_count": 330, - "forks_count": 102, - "forks": 102, - "watchers": 330, + "stargazers_count": 331, + "watchers_count": 331, + "forks_count": 103, + "forks": 103, + "watchers": 331, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index c7a5cb2f49..490fd641b0 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-07-11T04:43:40Z", + "updated_at": "2021-07-11T11:28:47Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 800, - "watchers_count": 800, + "stargazers_count": 801, + "watchers_count": 801, "forks_count": 253, "forks": 253, - "watchers": 800, + "watchers": 801, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 0422e3540f..adf1b4a6e9 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -596,5 +596,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 384971364, + "name": "CVE-2020-1938", + "full_name": "yukiNeko114514\/CVE-2020-1938", + "owner": { + "login": "yukiNeko114514", + "id": 83222283, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83222283?v=4", + "html_url": "https:\/\/github.com\/yukiNeko114514" + }, + "html_url": "https:\/\/github.com\/yukiNeko114514\/CVE-2020-1938", + "description": "Scanner for CVE-2020-1938", + "fork": false, + "created_at": "2021-07-11T14:38:21Z", + "updated_at": "2021-07-11T14:41:14Z", + "pushed_at": "2021-07-11T14:41:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 83132473cb..24f4f1a9f7 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-07-10T17:17:21Z", + "updated_at": "2021-07-11T14:27:04Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1103, - "watchers_count": 1103, + "stargazers_count": 1104, + "watchers_count": 1104, "forks_count": 245, "forks": 245, - "watchers": 1103, + "watchers": 1104, "score": 0 }, { diff --git a/2020/CVE-2020-3580.json b/2020/CVE-2020-3580.json index ddd3bce2f7..9bc25ffb51 100644 --- a/2020/CVE-2020-3580.json +++ b/2020/CVE-2020-3580.json @@ -36,7 +36,7 @@ "description": "Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.", "fork": false, "created_at": "2021-06-28T06:51:26Z", - "updated_at": "2021-07-10T12:42:26Z", + "updated_at": "2021-07-11T12:14:30Z", "pushed_at": "2021-07-10T12:42:24Z", "stargazers_count": 3, "watchers_count": 3, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index c329e91802..2787bbe3e7 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -36,13 +36,13 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2021-07-11T08:55:53Z", + "updated_at": "2021-07-11T14:10:40Z", "pushed_at": "2021-07-08T11:10:36Z", - "stargazers_count": 1156, - "watchers_count": 1156, + "stargazers_count": 1159, + "watchers_count": 1159, "forks_count": 413, "forks": 413, - "watchers": 1156, + "watchers": 1159, "score": 0 }, { @@ -220,13 +220,13 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-07-11T07:31:11Z", + "updated_at": "2021-07-11T10:41:35Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 469, - "watchers_count": 469, + "stargazers_count": 470, + "watchers_count": 470, "forks_count": 122, "forks": 122, - "watchers": 469, + "watchers": 470, "score": 0 }, { @@ -519,13 +519,13 @@ "description": "CVE-2021-1675 (PrintNightmare)", "fork": false, "created_at": "2021-07-05T14:17:03Z", - "updated_at": "2021-07-10T16:56:40Z", + "updated_at": "2021-07-11T10:41:15Z", "pushed_at": "2021-07-05T14:34:34Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "forks_count": 12, "forks": 12, - "watchers": 40, + "watchers": 41, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 83c790727a..9db3935f22 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2021-02-24T09:56:21Z", - "updated_at": "2021-06-30T13:31:11Z", + "updated_at": "2021-07-11T14:27:07Z", "pushed_at": "2021-03-01T02:10:44Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 101, + "watchers_count": 101, "forks_count": 59, "forks": 59, - "watchers": 100, + "watchers": 101, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2021-07-05T16:10:41Z", + "updated_at": "2021-07-11T14:34:58Z", "pushed_at": "2021-03-10T05:01:22Z", - "stargazers_count": 268, - "watchers_count": 268, + "stargazers_count": 269, + "watchers_count": 269, "forks_count": 102, "forks": 102, - "watchers": 268, + "watchers": 269, "score": 0 }, { diff --git a/2021/CVE-2021-24086.json b/2021/CVE-2021-24086.json index 4231e54633..bb75f5627b 100644 --- a/2021/CVE-2021-24086.json +++ b/2021/CVE-2021-24086.json @@ -13,13 +13,13 @@ "description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.", "fork": false, "created_at": "2021-04-07T11:10:40Z", - "updated_at": "2021-07-08T10:34:46Z", + "updated_at": "2021-07-11T13:56:45Z", "pushed_at": "2021-04-15T12:46:54Z", - "stargazers_count": 181, - "watchers_count": 181, + "stargazers_count": 182, + "watchers_count": 182, "forks_count": 41, "forks": 41, - "watchers": 181, + "watchers": 182, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index b264988d0e..11f08e7802 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-07-11T04:43:40Z", + "updated_at": "2021-07-11T11:28:47Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 800, - "watchers_count": 800, + "stargazers_count": 801, + "watchers_count": 801, "forks_count": 253, "forks": 253, - "watchers": 800, + "watchers": 801, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 0e57a3eea9..18d29bf63c 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -17,8 +17,8 @@ "pushed_at": "2021-01-29T13:59:07Z", "stargazers_count": 124, "watchers_count": 124, - "forks_count": 29, - "forks": 29, + "forks_count": 30, + "forks": 30, "watchers": 124, "score": 0 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 965009398d..aaaea820d9 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -887,13 +887,13 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2021-07-11T08:26:09Z", + "updated_at": "2021-07-11T11:42:02Z", "pushed_at": "2021-07-05T13:29:56Z", - "stargazers_count": 329, - "watchers_count": 329, + "stargazers_count": 330, + "watchers_count": 330, "forks_count": 58, "forks": 58, - "watchers": 329, + "watchers": 330, "score": 0 }, { @@ -1080,29 +1080,6 @@ "watchers": 0, "score": 0 }, - { - "id": 378544483, - "name": "docker-cve-2021-3156", - "full_name": "mrofisr\/docker-cve-2021-3156", - "owner": { - "login": "mrofisr", - "id": 31870041, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31870041?v=4", - "html_url": "https:\/\/github.com\/mrofisr" - }, - "html_url": "https:\/\/github.com\/mrofisr\/docker-cve-2021-3156", - "description": null, - "fork": false, - "created_at": "2021-06-20T02:47:02Z", - "updated_at": "2021-06-20T02:47:02Z", - "pushed_at": "2021-06-20T02:47:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 380136612, "name": "CVE-2021-3156", diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 4e3a27dceb..4aa8a7f22b 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -220,13 +220,13 @@ "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "fork": false, "created_at": "2021-07-05T20:13:49Z", - "updated_at": "2021-07-11T08:50:45Z", + "updated_at": "2021-07-11T12:46:50Z", "pushed_at": "2021-07-09T15:49:23Z", - "stargazers_count": 517, - "watchers_count": 517, + "stargazers_count": 519, + "watchers_count": 519, "forks_count": 59, "forks": 59, - "watchers": 517, + "watchers": 519, "score": 0 }, { diff --git a/README.md b/README.md index 0bbb1251ef..283fada0c6 100644 --- a/README.md +++ b/README.md @@ -253,7 +253,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based - [LiveOverflow/pwnedit](https://github.com/LiveOverflow/pwnedit) - [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build) - [wuuconix/CVE-2021-3156-Dockerfile-not-succeed](https://github.com/wuuconix/CVE-2021-3156-Dockerfile-not-succeed) -- [mrofisr/docker-cve-2021-3156](https://github.com/mrofisr/docker-cve-2021-3156) - [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156) - [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156) @@ -2242,6 +2241,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc - [YU5Z8X2CvH1fv4ep/CVE-2020-1938-MSF-MODULE](https://github.com/YU5Z8X2CvH1fv4ep/CVE-2020-1938-MSF-MODULE) - [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat) - [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938) +- [yukiNeko114514/CVE-2020-1938](https://github.com/yukiNeko114514/CVE-2020-1938) ### CVE-2020-1947 (2020-03-11) @@ -15927,7 +15927,6 @@ sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password has - [justlce/CVE-2016-6210-Exploit](https://github.com/justlce/CVE-2016-6210-Exploit) -- [ubrito/poc_CVE-2016-6210](https://github.com/ubrito/poc_CVE-2016-6210) ### CVE-2016-6271 (2017-01-18) @@ -17322,7 +17321,6 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14 - [SunRain/CVE-2014-0196](https://github.com/SunRain/CVE-2014-0196) -- [tempbottle/CVE-2014-0196](https://github.com/tempbottle/CVE-2014-0196) ### CVE-2014-0224 (2014-06-05) @@ -17331,10 +17329,7 @@ OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not pr - [Tripwire/OpenSSL-CCS-Inject-Test](https://github.com/Tripwire/OpenSSL-CCS-Inject-Test) -- [iph0n3/CVE-2014-0224](https://github.com/iph0n3/CVE-2014-0224) -- [droptables/ccs-eval](https://github.com/droptables/ccs-eval) - [ssllabs/openssl-ccs-cve-2014-0224](https://github.com/ssllabs/openssl-ccs-cve-2014-0224) -- [secretnonempty/CVE-2014-0224](https://github.com/secretnonempty/CVE-2014-0224) ### CVE-2014-0226 (2014-07-20) @@ -17363,14 +17358,6 @@ The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x bef - [christasa/CVE-2014-0472](https://github.com/christasa/CVE-2014-0472) -### CVE-2014-0521 (2014-05-14) - - -Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X do not properly implement JavaScript APIs, which allows remote attackers to obtain sensitive information via a crafted PDF document. - - -- [molnarg/cve-2014-0521](https://github.com/molnarg/cve-2014-0521) - ### CVE-2014-0816 (2014-02-26) @@ -17425,14 +17412,6 @@ Race condition in the virNetServerClientStartKeepAlive function in libvirt befor - [tagatac/libvirt-CVE-2014-1447](https://github.com/tagatac/libvirt-CVE-2014-1447) -### CVE-2014-1677 (2017-04-03) - - -Technicolor TC7200 with firmware STD6.01.12 could allow remote attackers to obtain sensitive information. - - -- [tihmstar/freePW_tc7200Eploit](https://github.com/tihmstar/freePW_tc7200Eploit) - ### CVE-2014-1773 (2014-06-10) @@ -17497,7 +17476,6 @@ The default configuration in Elasticsearch before 1.2 enables dynamic scripting, - [jeffgeiger/es_inject](https://github.com/jeffgeiger/es_inject) -- [echohtp/ElasticSearch-CVE-2014-3120](https://github.com/echohtp/ElasticSearch-CVE-2014-3120) ### CVE-2014-3153 (2014-06-07) @@ -17729,8 +17707,6 @@ host-deny.sh in OSSEC before 2.8.1 writes to temporary files with predictable fi GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. -- [dlitz/bash-cve-2014-6271-fixes](https://github.com/dlitz/bash-cve-2014-6271-fixes) -- [npm/ansible-bashpocalypse](https://github.com/npm/ansible-bashpocalypse) - [ryancnelson/patched-bash-4.3](https://github.com/ryancnelson/patched-bash-4.3) - [jblaine/cookbook-bash-CVE-2014-6271](https://github.com/jblaine/cookbook-bash-CVE-2014-6271) - [rrreeeyyy/cve-2014-6271-spec](https://github.com/rrreeeyyy/cve-2014-6271-spec)