diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index a117e8b7d8..ef4d8ed4f7 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -36,13 +36,13 @@ "description": "Proof-of-Concept exploits for CVE-2017-11882", "fork": false, "created_at": "2017-11-20T16:35:30Z", - "updated_at": "2021-03-27T22:33:38Z", + "updated_at": "2021-03-31T01:08:18Z", "pushed_at": "2017-11-29T16:13:23Z", - "stargazers_count": 480, - "watchers_count": 480, + "stargazers_count": 481, + "watchers_count": 481, "forks_count": 199, "forks": 199, - "watchers": 480, + "watchers": 481, "score": 0 }, { @@ -59,13 +59,13 @@ "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "fork": false, "created_at": "2017-11-21T05:55:53Z", - "updated_at": "2021-03-30T11:25:02Z", + "updated_at": "2021-03-31T02:07:32Z", "pushed_at": "2017-11-29T03:33:53Z", - "stargazers_count": 485, - "watchers_count": 485, + "stargazers_count": 486, + "watchers_count": 486, "forks_count": 244, "forks": 244, - "watchers": 485, + "watchers": 486, "score": 0 }, { diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 5f9e1e5019..8311275ada 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -473,8 +473,8 @@ "description": null, "fork": false, "created_at": "2020-10-18T14:01:59Z", - "updated_at": "2021-03-30T13:10:14Z", - "pushed_at": "2021-03-30T13:01:25Z", + "updated_at": "2021-03-30T21:56:22Z", + "pushed_at": "2021-03-30T21:56:20Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 6d9d7d802c..c74ad3b54b 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -59,13 +59,13 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2021-03-28T17:08:00Z", + "updated_at": "2021-03-31T01:24:54Z", "pushed_at": "2021-01-08T10:31:22Z", - "stargazers_count": 469, - "watchers_count": 469, + "stargazers_count": 470, + "watchers_count": 470, "forks_count": 157, "forks": 157, - "watchers": 469, + "watchers": 470, "score": 0 }, { diff --git a/2019/CVE-2019-12840.json b/2019/CVE-2019-12840.json index 001b31ef34..3c3499febb 100644 --- a/2019/CVE-2019-12840.json +++ b/2019/CVE-2019-12840.json @@ -82,7 +82,7 @@ "description": "CVE-2019-12840", "fork": false, "created_at": "2021-03-30T17:32:30Z", - "updated_at": "2021-03-30T17:56:15Z", + "updated_at": "2021-03-31T03:01:12Z", "pushed_at": "2021-03-30T17:56:13Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index a9de25e6e3..b00c945051 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-03-30T15:44:49Z", + "updated_at": "2021-03-31T02:56:13Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2446, - "watchers_count": 2446, - "forks_count": 703, - "forks": 703, - "watchers": 2446, + "stargazers_count": 2448, + "watchers_count": 2448, + "forks_count": 704, + "forks": 704, + "watchers": 2448, "score": 0 }, { diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index d93e878529..5b83882321 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -36,13 +36,13 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2021-03-30T14:08:19Z", + "updated_at": "2021-03-31T00:48:39Z", "pushed_at": "2019-02-19T11:45:13Z", - "stargazers_count": 487, - "watchers_count": 487, + "stargazers_count": 488, + "watchers_count": 488, "forks_count": 118, "forks": 118, - "watchers": 487, + "watchers": 488, "score": 0 }, { diff --git a/2019/CVE-2019-9153.json b/2019/CVE-2019-9153.json index a506530668..1e76c7c5fc 100644 --- a/2019/CVE-2019-9153.json +++ b/2019/CVE-2019-9153.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2019-09-11T17:17:03Z", "updated_at": "2019-09-11T17:38:24Z", - "pushed_at": "2021-03-09T17:36:47Z", + "pushed_at": "2021-03-31T00:17:49Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-10977.json b/2020/CVE-2020-10977.json index 458900ab6d..a6bbb5996d 100644 --- a/2020/CVE-2020-10977.json +++ b/2020/CVE-2020-10977.json @@ -36,13 +36,13 @@ "description": "GitLab 12.9.0 Arbitrary File Read ", "fork": false, "created_at": "2020-11-20T15:40:03Z", - "updated_at": "2021-03-30T01:52:20Z", + "updated_at": "2021-03-31T01:43:44Z", "pushed_at": "2020-11-20T16:08:08Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 10, "forks": 10, - "watchers": 27, + "watchers": 28, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 6754efbd37..8aad502020 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-03-30T15:44:49Z", + "updated_at": "2021-03-31T02:56:13Z", "pushed_at": "2020-11-07T05:55:00Z", - "stargazers_count": 2446, - "watchers_count": 2446, - "forks_count": 703, - "forks": 703, - "watchers": 2446, + "stargazers_count": 2448, + "watchers_count": 2448, + "forks_count": 704, + "forks": 704, + "watchers": 2448, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 57a3a4adf4..a5e71b482d 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-03-30T16:22:57Z", + "updated_at": "2021-03-31T02:41:29Z", "pushed_at": "2021-03-30T04:09:42Z", - "stargazers_count": 281, - "watchers_count": 281, + "stargazers_count": 282, + "watchers_count": 282, "forks_count": 64, "forks": 64, - "watchers": 281, + "watchers": 282, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14957.json b/2020/CVE-2020-14957.json deleted file mode 100644 index f479eb35e0..0000000000 --- a/2020/CVE-2020-14957.json +++ /dev/null @@ -1,25 +0,0 @@ -[ - { - "id": 272884163, - "name": "CVE-2020-14957", - "full_name": "y5s5k5\/CVE-2020-14957", - "owner": { - "login": "y5s5k5", - "id": 53048989, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53048989?v=4", - "html_url": "https:\/\/github.com\/y5s5k5" - }, - "html_url": "https:\/\/github.com\/y5s5k5\/CVE-2020-14957", - "description": " windows cleaning assistant", - "fork": false, - "created_at": "2020-06-17T05:16:08Z", - "updated_at": "2020-12-05T14:22:34Z", - "pushed_at": "2021-03-29T12:39:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 4674176639..e9e1aebff4 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -82,13 +82,13 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2021-03-30T17:08:44Z", + "updated_at": "2021-03-31T01:59:49Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 225, - "watchers_count": 225, - "forks_count": 34, - "forks": 34, - "watchers": 225, + "stargazers_count": 228, + "watchers_count": 228, + "forks_count": 35, + "forks": 35, + "watchers": 228, "score": 0 }, { diff --git a/2021/CVE-2021-1656.json b/2021/CVE-2021-1656.json index 0c57784449..75dd35e024 100644 --- a/2021/CVE-2021-1656.json +++ b/2021/CVE-2021-1656.json @@ -17,8 +17,8 @@ "pushed_at": "2021-03-30T05:31:22Z", "stargazers_count": 7, "watchers_count": 7, - "forks_count": 3, - "forks": 3, + "forks_count": 4, + "forks": 4, "watchers": 7, "score": 0 } diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index e59b1949bc..1d123cc44b 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-03-30T16:22:57Z", + "updated_at": "2021-03-31T02:41:29Z", "pushed_at": "2021-03-30T04:09:42Z", - "stargazers_count": 281, - "watchers_count": 281, + "stargazers_count": 282, + "watchers_count": 282, "forks_count": 64, "forks": 64, - "watchers": 281, + "watchers": 282, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26828.json b/2021/CVE-2021-26828.json new file mode 100644 index 0000000000..7c9f6f05bb --- /dev/null +++ b/2021/CVE-2021-26828.json @@ -0,0 +1,25 @@ +[ + { + "id": 353202709, + "name": "CVE-2021-26828_ScadaBR_RCE", + "full_name": "hevox\/CVE-2021-26828_ScadaBR_RCE", + "owner": { + "login": "hevox", + "id": 6265911, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4", + "html_url": "https:\/\/github.com\/hevox" + }, + "html_url": "https:\/\/github.com\/hevox\/CVE-2021-26828_ScadaBR_RCE", + "description": null, + "fork": false, + "created_at": "2021-03-31T02:39:02Z", + "updated_at": "2021-03-31T02:39:11Z", + "pushed_at": "2021-03-31T02:39:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3449.json b/2021/CVE-2021-3449.json index 6d5b829114..99fc7bb738 100644 --- a/2021/CVE-2021-3449.json +++ b/2021/CVE-2021-3449.json @@ -13,13 +13,13 @@ "description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻", "fork": false, "created_at": "2021-03-26T01:09:25Z", - "updated_at": "2021-03-30T18:13:57Z", + "updated_at": "2021-03-31T02:39:56Z", "pushed_at": "2021-03-29T13:42:04Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 147, + "watchers_count": 147, "forks_count": 24, "forks": 24, - "watchers": 146, + "watchers": 147, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index a8a55e2035..1278283e49 100644 --- a/README.md +++ b/README.md @@ -449,6 +449,9 @@ A local privilege escalation was discovered in the Linux kernel before 5.10.13. - [jordan9001/vsock_poc](https://github.com/jordan9001/vsock_poc) +### CVE-2021-26828 +- [hevox/CVE-2021-26828_ScadaBR_RCE](https://github.com/hevox/CVE-2021-26828_ScadaBR_RCE) + ### CVE-2021-26855 (2021-03-02) @@ -3387,14 +3390,6 @@ In Jiangmin Antivirus 16.0.13.129, the driver file (KVFG.sys) allows local users - [y5s5k5/CVE-2020-14955](https://github.com/y5s5k5/CVE-2020-14955) - [intrigus-lgtm/CVE-2020-14955](https://github.com/intrigus-lgtm/CVE-2020-14955) -### CVE-2020-14957 (2020-06-30) - - -In Windows cleaning assistant 3.2, the driver file (AtpKrnl.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x223CCD. - - -- [y5s5k5/CVE-2020-14957](https://github.com/y5s5k5/CVE-2020-14957) - ### CVE-2020-14965 (2020-06-23)