diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 0d26969c8d..7b94b6bca7 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-11T08:58:22Z", + "updated_at": "2021-05-11T11:13:35Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1024, - "watchers_count": 1024, + "stargazers_count": 1025, + "watchers_count": 1025, "forks_count": 231, "forks": 231, - "watchers": 1024, + "watchers": 1025, "score": 0 }, { diff --git a/2015/CVE-2015-3306.json b/2015/CVE-2015-3306.json index 0187f9e4d0..4ed4c3f8a9 100644 --- a/2015/CVE-2015-3306.json +++ b/2015/CVE-2015-3306.json @@ -63,8 +63,8 @@ "pushed_at": "2018-04-07T01:10:06Z", "stargazers_count": 74, "watchers_count": 74, - "forks_count": 40, - "forks": 40, + "forks_count": 41, + "forks": 41, "watchers": 74, "score": 0 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index c4a457b62f..79ba9a0bcc 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-11T08:58:22Z", + "updated_at": "2021-05-11T11:13:35Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1024, - "watchers_count": 1024, + "stargazers_count": 1025, + "watchers_count": 1025, "forks_count": 231, "forks": 231, - "watchers": 1024, + "watchers": 1025, "score": 0 }, { diff --git a/2017/CVE-2017-2370.json b/2017/CVE-2017-2370.json index 10d28e1c7c..967660cb10 100644 --- a/2017/CVE-2017-2370.json +++ b/2017/CVE-2017-2370.json @@ -1,4 +1,73 @@ [ + { + "id": 80148945, + "name": "extra_recipe", + "full_name": "maximehip\/extra_recipe", + "owner": { + "login": "maximehip", + "id": 6273425, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6273425?v=4", + "html_url": "https:\/\/github.com\/maximehip" + }, + "html_url": "https:\/\/github.com\/maximehip\/extra_recipe", + "description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004", + "fork": false, + "created_at": "2017-01-26T19:47:43Z", + "updated_at": "2017-01-26T19:48:19Z", + "pushed_at": "2017-01-26T19:48:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 80717942, + "name": "extra_recipe", + "full_name": "JackBro\/extra_recipe", + "owner": { + "login": "JackBro", + "id": 21210712, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4", + "html_url": "https:\/\/github.com\/JackBro" + }, + "html_url": "https:\/\/github.com\/JackBro\/extra_recipe", + "description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)", + "fork": false, + "created_at": "2017-02-02T11:16:38Z", + "updated_at": "2017-10-14T08:34:32Z", + "pushed_at": "2017-01-27T17:44:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 81874110, + "name": "extra_recipe-iOS-10.2", + "full_name": "Rootkitsmm-zz\/extra_recipe-iOS-10.2", + "owner": { + "login": "Rootkitsmm-zz", + "id": 5567904, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5567904?v=4", + "html_url": "https:\/\/github.com\/Rootkitsmm-zz" + }, + "html_url": "https:\/\/github.com\/Rootkitsmm-zz\/extra_recipe-iOS-10.2", + "description": "CVE-2017-2370", + "fork": false, + "created_at": "2017-02-13T21:32:40Z", + "updated_at": "2019-01-03T05:45:15Z", + "pushed_at": "2017-02-01T11:36:26Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 4, + "forks": 4, + "watchers": 1, + "score": 0 + }, { "id": 142854846, "name": "CVE-2017-2370", diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 21ee403945..fa315d710a 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-11T08:58:22Z", + "updated_at": "2021-05-11T11:13:35Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1024, - "watchers_count": 1024, + "stargazers_count": 1025, + "watchers_count": 1025, "forks_count": 231, "forks": 231, - "watchers": 1024, + "watchers": 1025, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3730.json b/2017/CVE-2017-3730.json new file mode 100644 index 0000000000..dbca927b93 --- /dev/null +++ b/2017/CVE-2017-3730.json @@ -0,0 +1,25 @@ +[ + { + "id": 79682713, + "name": "CVE-2017-3730", + "full_name": "guidovranken\/CVE-2017-3730", + "owner": { + "login": "guidovranken", + "id": 6846644, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6846644?v=4", + "html_url": "https:\/\/github.com\/guidovranken" + }, + "html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730", + "description": "OpenSSL CVE-2017-3730 proof-of-concept", + "fork": false, + "created_at": "2017-01-22T00:40:34Z", + "updated_at": "2018-12-04T20:01:55Z", + "pushed_at": "2017-01-26T01:30:54Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 6, + "forks": 6, + "watchers": 11, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index 3ea89b8059..1accfaf382 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -1,4 +1,27 @@ [ + { + "id": 84158718, + "name": "S2-045", + "full_name": "PolarisLab\/S2-045", + "owner": { + "login": "PolarisLab", + "id": 25890110, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4", + "html_url": "https:\/\/github.com\/PolarisLab" + }, + "html_url": "https:\/\/github.com\/PolarisLab\/S2-045", + "description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html", + "fork": false, + "created_at": "2017-03-07T05:30:30Z", + "updated_at": "2020-09-22T06:33:06Z", + "pushed_at": "2017-03-07T05:37:55Z", + "stargazers_count": 23, + "watchers_count": 23, + "forks_count": 12, + "forks": 12, + "watchers": 23, + "score": 0 + }, { "id": 84186490, "name": "Struts2-045-Exp", @@ -22,6 +45,29 @@ "watchers": 61, "score": 0 }, + { + "id": 84277596, + "name": "cve-2017-5638", + "full_name": "bongbongco\/cve-2017-5638", + "owner": { + "login": "bongbongco", + "id": 3170006, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4", + "html_url": "https:\/\/github.com\/bongbongco" + }, + "html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638", + "description": null, + "fork": false, + "created_at": "2017-03-08T04:17:33Z", + "updated_at": "2017-03-08T04:31:28Z", + "pushed_at": "2017-03-08T04:31:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, { "id": 84481525, "name": "S2-045-EXP-POC-TOOLS", diff --git a/2018/CVE-2018-0114.json b/2018/CVE-2018-0114.json index 56f2d20847..7e8feaa566 100644 --- a/2018/CVE-2018-0114.json +++ b/2018/CVE-2018-0114.json @@ -113,5 +113,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 366358015, + "name": "CVE-2018-0114", + "full_name": "scumdestroy\/CVE-2018-0114", + "owner": { + "login": "scumdestroy", + "id": 35894688, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35894688?v=4", + "html_url": "https:\/\/github.com\/scumdestroy" + }, + "html_url": "https:\/\/github.com\/scumdestroy\/CVE-2018-0114", + "description": "Exploit for Node-jose < 0.11.0 written in Ruby", + "fork": false, + "created_at": "2021-05-11T11:29:15Z", + "updated_at": "2021-05-11T11:31:03Z", + "pushed_at": "2021-05-11T11:31:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 0520b680fb..1bb2b0e84f 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -63,8 +63,8 @@ "pushed_at": "2020-08-18T00:00:15Z", "stargazers_count": 438, "watchers_count": 438, - "forks_count": 150, - "forks": 150, + "forks_count": 151, + "forks": 151, "watchers": 438, "score": 0 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 82f97256d9..c900c6f3ad 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-11T08:58:22Z", + "updated_at": "2021-05-11T11:13:35Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1024, - "watchers_count": 1024, + "stargazers_count": 1025, + "watchers_count": 1025, "forks_count": 231, "forks": 231, - "watchers": 1024, + "watchers": 1025, "score": 0 }, { diff --git a/2018/CVE-2018-4441.json b/2018/CVE-2018-4441.json index f1da05c474..44d09c7e48 100644 --- a/2018/CVE-2018-4441.json +++ b/2018/CVE-2018-4441.json @@ -13,13 +13,13 @@ "description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.", "fork": false, "created_at": "2019-03-08T18:06:10Z", - "updated_at": "2021-03-15T01:45:20Z", + "updated_at": "2021-05-11T13:34:08Z", "pushed_at": "2019-03-08T18:42:56Z", - "stargazers_count": 197, - "watchers_count": 197, - "forks_count": 53, - "forks": 53, - "watchers": 197, + "stargazers_count": 198, + "watchers_count": 198, + "forks_count": 54, + "forks": 54, + "watchers": 198, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0192.json b/2019/CVE-2019-0192.json index 75f4f0c20f..8497d6e46b 100644 --- a/2019/CVE-2019-0192.json +++ b/2019/CVE-2019-0192.json @@ -17,8 +17,8 @@ "pushed_at": "2019-03-10T18:33:43Z", "stargazers_count": 210, "watchers_count": 210, - "forks_count": 60, - "forks": 60, + "forks_count": 61, + "forks": 61, "watchers": 210, "score": 0 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 414d7b5d36..d272a87aea 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-05-10T07:54:29Z", + "updated_at": "2021-05-11T13:45:18Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2556, - "watchers_count": 2556, + "stargazers_count": 2557, + "watchers_count": 2557, "forks_count": 747, "forks": 747, - "watchers": 2556, + "watchers": 2557, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index cc20d5dc01..7163242614 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-11T08:58:22Z", + "updated_at": "2021-05-11T11:13:35Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1024, - "watchers_count": 1024, + "stargazers_count": 1025, + "watchers_count": 1025, "forks_count": 231, "forks": 231, - "watchers": 1024, + "watchers": 1025, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5420.json b/2019/CVE-2019-5420.json index af2f19834f..61469405d2 100644 --- a/2019/CVE-2019-5420.json +++ b/2019/CVE-2019-5420.json @@ -90,5 +90,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 366358815, + "name": "CVE-2019-5420.rb", + "full_name": "scumdestroy\/CVE-2019-5420.rb", + "owner": { + "login": "scumdestroy", + "id": 35894688, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35894688?v=4", + "html_url": "https:\/\/github.com\/scumdestroy" + }, + "html_url": "https:\/\/github.com\/scumdestroy\/CVE-2019-5420.rb", + "description": "POC Exploit written in Ruby", + "fork": false, + "created_at": "2021-05-11T11:32:18Z", + "updated_at": "2021-05-11T11:33:16Z", + "pushed_at": "2021-05-11T11:33:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 6197fb11a6..751ae2ec76 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -17,8 +17,8 @@ "pushed_at": "2019-02-20T15:35:34Z", "stargazers_count": 183, "watchers_count": 183, - "forks_count": 63, - "forks": 63, + "forks_count": 64, + "forks": 64, "watchers": 183, "score": 0 }, diff --git a/2019/CVE-2019-9081.json b/2019/CVE-2019-9081.json new file mode 100644 index 0000000000..51c96553b4 --- /dev/null +++ b/2019/CVE-2019-9081.json @@ -0,0 +1,25 @@ +[ + { + "id": 366390292, + "name": "CVE-2019-9081_poc", + "full_name": "nth347\/CVE-2019-9081_poc", + "owner": { + "login": "nth347", + "id": 20441996, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4", + "html_url": "https:\/\/github.com\/nth347" + }, + "html_url": "https:\/\/github.com\/nth347\/CVE-2019-9081_poc", + "description": "Poc for CVE-2019-9081", + "fork": false, + "created_at": "2021-05-11T13:24:19Z", + "updated_at": "2021-05-11T13:24:22Z", + "pushed_at": "2021-05-11T13:24:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10977.json b/2020/CVE-2020-10977.json index a158f177b8..16bfdc875c 100644 --- a/2020/CVE-2020-10977.json +++ b/2020/CVE-2020-10977.json @@ -36,13 +36,13 @@ "description": "GitLab 12.9.0 Arbitrary File Read ", "fork": false, "created_at": "2020-11-20T15:40:03Z", - "updated_at": "2021-05-11T09:13:10Z", + "updated_at": "2021-05-11T09:44:54Z", "pushed_at": "2021-04-23T19:21:16Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "forks_count": 14, "forks": 14, - "watchers": 39, + "watchers": 40, "score": 0 }, { diff --git a/2020/CVE-2020-12717.json b/2020/CVE-2020-12717.json index 8cf2974dd8..73a8ee22c7 100644 --- a/2020/CVE-2020-12717.json +++ b/2020/CVE-2020-12717.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2020-05-11T13:09:52Z", "updated_at": "2021-05-09T12:11:55Z", - "pushed_at": "2021-05-09T12:13:56Z", + "pushed_at": "2021-05-11T14:14:41Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 4, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 151ed491a4..6bd131585d 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -82,13 +82,13 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2021-05-11T07:46:55Z", + "updated_at": "2021-05-11T10:57:20Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 789, - "watchers_count": 789, + "stargazers_count": 790, + "watchers_count": 790, "forks_count": 229, "forks": 229, - "watchers": 789, + "watchers": 790, "score": 0 }, { diff --git a/2020/CVE-2020-14756.json b/2020/CVE-2020-14756.json index d41c10bade..d28beaf3e6 100644 --- a/2020/CVE-2020-14756.json +++ b/2020/CVE-2020-14756.json @@ -17,8 +17,8 @@ "pushed_at": "2021-01-27T01:40:56Z", "stargazers_count": 60, "watchers_count": 60, - "forks_count": 11, - "forks": 11, + "forks_count": 12, + "forks": 12, "watchers": 60, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 98156fb826..45b007a94e 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-05-10T07:54:29Z", + "updated_at": "2021-05-11T13:45:18Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2556, - "watchers_count": 2556, + "stargazers_count": 2557, + "watchers_count": 2557, "forks_count": 747, "forks": 747, - "watchers": 2556, + "watchers": 2557, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 3618e25ea8..d8f5bee0ea 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-05-11T08:27:25Z", + "updated_at": "2021-05-11T12:08:08Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 743, - "watchers_count": 743, + "stargazers_count": 744, + "watchers_count": 744, "forks_count": 238, "forks": 238, - "watchers": 743, + "watchers": 744, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 710c76f466..b8372dc7f8 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-05-11T08:58:22Z", + "updated_at": "2021-05-11T11:13:35Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1024, - "watchers_count": 1024, + "stargazers_count": 1025, + "watchers_count": 1025, "forks_count": 231, "forks": 231, - "watchers": 1024, + "watchers": 1025, "score": 0 }, { diff --git a/2020/CVE-2020-27904.json b/2020/CVE-2020-27904.json index c32f1e2ba7..8bd561f90f 100644 --- a/2020/CVE-2020-27904.json +++ b/2020/CVE-2020-27904.json @@ -13,13 +13,13 @@ "description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.", "fork": false, "created_at": "2021-03-31T09:11:29Z", - "updated_at": "2021-05-11T04:22:01Z", + "updated_at": "2021-05-11T14:47:34Z", "pushed_at": "2021-04-29T07:14:33Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "forks_count": 5, "forks": 5, - "watchers": 54, + "watchers": 55, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21975.json b/2021/CVE-2021-21975.json index 12302119c8..f15e97f68d 100644 --- a/2021/CVE-2021-21975.json +++ b/2021/CVE-2021-21975.json @@ -105,13 +105,13 @@ "description": "vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)", "fork": false, "created_at": "2021-04-06T23:24:38Z", - "updated_at": "2021-04-15T02:49:40Z", + "updated_at": "2021-05-11T10:26:11Z", "pushed_at": "2021-04-07T03:10:07Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 5, "forks": 5, - "watchers": 21, + "watchers": 22, "score": 0 }, { diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index adc88dcdfe..f92d9df21e 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -132,8 +132,8 @@ "pushed_at": "2021-04-03T12:56:37Z", "stargazers_count": 47, "watchers_count": 47, - "forks_count": 15, - "forks": 15, + "forks_count": 16, + "forks": 16, "watchers": 47, "score": 0 }, diff --git a/2021/CVE-2021-25374.json b/2021/CVE-2021-25374.json index bec2c8f319..6260a4ca5e 100644 --- a/2021/CVE-2021-25374.json +++ b/2021/CVE-2021-25374.json @@ -13,7 +13,7 @@ "description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.", "fork": false, "created_at": "2021-04-10T09:23:52Z", - "updated_at": "2021-05-05T13:31:26Z", + "updated_at": "2021-05-11T10:47:32Z", "pushed_at": "2021-04-28T17:56:04Z", "stargazers_count": 9, "watchers_count": 9, diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 0afd996122..3db7ba2dd9 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -13,13 +13,13 @@ "description": "Apache Druid 远程代码执行;检测脚本", "fork": false, "created_at": "2021-02-03T03:59:52Z", - "updated_at": "2021-04-12T01:33:43Z", + "updated_at": "2021-05-11T13:46:24Z", "pushed_at": "2021-02-03T06:06:24Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 6, "forks": 6, - "watchers": 10, + "watchers": 11, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-05-11T08:27:25Z", + "updated_at": "2021-05-11T12:08:08Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 743, - "watchers_count": 743, + "stargazers_count": 744, + "watchers_count": 744, "forks_count": 238, "forks": 238, - "watchers": 743, + "watchers": 744, "score": 0 }, { diff --git a/2021/CVE-2021-26121.json b/2021/CVE-2021-26121.json index 2678909005..ec6781f1fa 100644 --- a/2021/CVE-2021-26121.json +++ b/2021/CVE-2021-26121.json @@ -17,8 +17,8 @@ "pushed_at": "2021-04-30T15:45:02Z", "stargazers_count": 11, "watchers_count": 11, - "forks_count": 4, - "forks": 4, + "forks_count": 5, + "forks": 5, "watchers": 11, "score": 0 } diff --git a/2021/CVE-2021-26295.json b/2021/CVE-2021-26295.json index ec30e3a49e..281f6710fc 100644 --- a/2021/CVE-2021-26295.json +++ b/2021/CVE-2021-26295.json @@ -63,8 +63,8 @@ "pushed_at": "2021-05-10T02:09:51Z", "stargazers_count": 10, "watchers_count": 10, - "forks_count": 3, - "forks": 3, + "forks_count": 4, + "forks": 4, "watchers": 10, "score": 0 }, diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 7816cd5c4f..1cd1daf150 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -730,8 +730,8 @@ "pushed_at": "2021-03-24T10:39:34Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 1, "score": 0 }, diff --git a/2021/CVE-2021-26857.json b/2021/CVE-2021-26857.json index d53b5eb127..15c4ad2b61 100644 --- a/2021/CVE-2021-26857.json +++ b/2021/CVE-2021-26857.json @@ -13,13 +13,13 @@ "description": "proxylogon exploit - CVE-2021-26857", "fork": false, "created_at": "2021-03-11T17:32:32Z", - "updated_at": "2021-04-12T14:20:44Z", + "updated_at": "2021-05-11T13:08:45Z", "pushed_at": "2021-03-11T17:34:15Z", - "stargazers_count": 96, - "watchers_count": 96, + "stargazers_count": 97, + "watchers_count": 97, "forks_count": 33, "forks": 33, - "watchers": 96, + "watchers": 97, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-28482.json b/2021/CVE-2021-28482.json index 52f22ca013..f9bc213ccf 100644 --- a/2021/CVE-2021-28482.json +++ b/2021/CVE-2021-28482.json @@ -13,13 +13,13 @@ "description": "POC from TestANull for CVE-2021-28482 on Exchange Server", "fork": false, "created_at": "2021-05-03T13:54:36Z", - "updated_at": "2021-05-11T06:45:53Z", + "updated_at": "2021-05-11T14:15:32Z", "pushed_at": "2021-05-03T14:29:49Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 5, - "forks": 5, - "watchers": 6, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 7, + "forks": 7, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-29200.json b/2021/CVE-2021-29200.json new file mode 100644 index 0000000000..be47fbb105 --- /dev/null +++ b/2021/CVE-2021-29200.json @@ -0,0 +1,25 @@ +[ + { + "id": 366345649, + "name": "CVE-2021-29200", + "full_name": "r0ckysec\/CVE-2021-29200", + "owner": { + "login": "r0ckysec", + "id": 44518337, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44518337?v=4", + "html_url": "https:\/\/github.com\/r0ckysec" + }, + "html_url": "https:\/\/github.com\/r0ckysec\/CVE-2021-29200", + "description": null, + "fork": false, + "created_at": "2021-05-11T10:40:20Z", + "updated_at": "2021-05-11T13:20:45Z", + "pushed_at": "2021-05-11T10:42:40Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-30461.json b/2021/CVE-2021-30461.json index 96d42e9d81..a1f1d0103e 100644 --- a/2021/CVE-2021-30461.json +++ b/2021/CVE-2021-30461.json @@ -59,13 +59,13 @@ "description": "CVE-2021-30461", "fork": false, "created_at": "2021-05-11T04:09:04Z", - "updated_at": "2021-05-11T08:15:49Z", + "updated_at": "2021-05-11T15:09:13Z", "pushed_at": "2021-05-11T04:14:47Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 1, - "forks": 1, - "watchers": 2, + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 2, + "forks": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index ba87d5e1e1..b1a6de867b 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -431,8 +431,8 @@ "pushed_at": "2021-01-31T07:02:44Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 4, - "forks": 4, + "forks_count": 3, + "forks": 3, "watchers": 2, "score": 0 }, @@ -887,13 +887,13 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2021-05-11T08:15:07Z", - "pushed_at": "2021-03-30T14:44:38Z", - "stargazers_count": 306, - "watchers_count": 306, - "forks_count": 50, - "forks": 50, - "watchers": 306, + "updated_at": "2021-05-11T15:08:12Z", + "pushed_at": "2021-05-11T13:09:18Z", + "stargazers_count": 307, + "watchers_count": 307, + "forks_count": 51, + "forks": 51, + "watchers": 307, "score": 0 }, { diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index 0de1257a26..d355dfcb84 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -13,13 +13,13 @@ "description": "Ubuntu OverlayFS Local Privesc", "fork": false, "created_at": "2021-04-19T20:07:01Z", - "updated_at": "2021-05-11T07:16:38Z", + "updated_at": "2021-05-11T10:36:53Z", "pushed_at": "2021-04-20T00:46:14Z", - "stargazers_count": 175, - "watchers_count": 175, - "forks_count": 56, - "forks": 56, - "watchers": 175, + "stargazers_count": 176, + "watchers_count": 176, + "forks_count": 57, + "forks": 57, + "watchers": 176, "score": 0 }, { diff --git a/README.md b/README.md index eb0fe48338..9bb9a7ef76 100644 --- a/README.md +++ b/README.md @@ -930,6 +930,14 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni - [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC) +### CVE-2021-29200 (2021-04-27) + + +Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack + + +- [r0ckysec/CVE-2021-29200](https://github.com/r0ckysec/CVE-2021-29200) + ### CVE-2021-29267 (2021-03-29) @@ -6251,6 +6259,7 @@ A remote code execution vulnerability in development mode Rails <5.2.2.1, < - [cved-sources/cve-2019-5420](https://github.com/cved-sources/cve-2019-5420) - [AnasTaoutaou/CVE-2019-5420](https://github.com/AnasTaoutaou/CVE-2019-5420) - [Eremiel/CVE-2019-5420](https://github.com/Eremiel/CVE-2019-5420) +- [scumdestroy/CVE-2019-5420.rb](https://github.com/scumdestroy/CVE-2019-5420.rb) ### CVE-2019-5427 (2019-04-22) @@ -6875,6 +6884,14 @@ An XML External Entity Injection (XXE) vulnerability in the Management System (c - [nxkennedy/CVE-2019-8997](https://github.com/nxkennedy/CVE-2019-8997) +### CVE-2019-9081 (2019-02-24) + + +The Illuminate component of Laravel Framework 5.7.x has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the PendingCommand class in PendingCommand.php. + + +- [nth347/CVE-2019-9081_poc](https://github.com/nth347/CVE-2019-9081_poc) + ### CVE-2019-9153 (2019-08-22) @@ -9150,6 +9167,7 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a - [adityathebe/POC-CVE-2018-0114](https://github.com/adityathebe/POC-CVE-2018-0114) - [Eremiel/CVE-2018-0114](https://github.com/Eremiel/CVE-2018-0114) - [Starry-lord/CVE-2018-0114](https://github.com/Starry-lord/CVE-2018-0114) +- [scumdestroy/CVE-2018-0114](https://github.com/scumdestroy/CVE-2018-0114) ### CVE-2018-0202 (2018-03-27) @@ -12496,6 +12514,9 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app. +- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe) +- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe) +- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2) - [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370) ### CVE-2017-2388 (2017-04-01) @@ -12613,6 +12634,14 @@ Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Serve - [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599) +### CVE-2017-3730 (2017-05-04) + + +In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack. + + +- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730) + ### CVE-2017-3881 (2017-03-17) @@ -12712,7 +12741,9 @@ Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. +- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045) - [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp) +- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638) - [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS) - [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro) - [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638)