diff --git a/2015/CVE-2015-1427.json b/2015/CVE-2015-1427.json index 1fff96eab2..d045e3cf9d 100644 --- a/2015/CVE-2015-1427.json +++ b/2015/CVE-2015-1427.json @@ -13,10 +13,10 @@ "description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-09T20:08:56Z", - "updated_at": "2021-09-13T00:39:15Z", + "updated_at": "2021-10-21T20:50:22Z", "pushed_at": "2018-04-07T00:30:52Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 15, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 28, + "watchers": 29, "score": 0 }, { diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index d9c349c563..940ffb744d 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -98,12 +98,12 @@ "pushed_at": "2018-07-13T18:56:53Z", "stargazers_count": 134, "watchers_count": 134, - "forks_count": 51, + "forks_count": 52, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 51, + "forks": 52, "watchers": 134, "score": 0 }, diff --git a/2017/CVE-2017-12149.json b/2017/CVE-2017-12149.json index 1a8f2ce3a7..bad90bda51 100644 --- a/2017/CVE-2017-12149.json +++ b/2017/CVE-2017-12149.json @@ -40,17 +40,17 @@ "description": "CVE-2017-12149 jboss反序列化 可回显", "fork": false, "created_at": "2017-11-28T02:52:47Z", - "updated_at": "2021-10-20T15:59:00Z", + "updated_at": "2021-10-21T15:21:15Z", "pushed_at": "2019-03-13T08:57:50Z", - "stargazers_count": 123, - "watchers_count": 123, + "stargazers_count": 124, + "watchers_count": 124, "forks_count": 45, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 45, - "watchers": 123, + "watchers": 124, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index b9e8ba89f0..28a805d59b 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -67,10 +67,10 @@ "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)", "fork": false, "created_at": "2017-05-26T00:58:25Z", - "updated_at": "2021-10-04T01:36:04Z", + "updated_at": "2021-10-21T18:26:28Z", "pushed_at": "2017-10-31T16:20:29Z", - "stargazers_count": 287, - "watchers_count": 287, + "stargazers_count": 288, + "watchers_count": 288, "forks_count": 96, "allow_forking": true, "is_template": false, @@ -83,7 +83,7 @@ ], "visibility": "public", "forks": 96, - "watchers": 287, + "watchers": 288, "score": 0 }, { diff --git a/2018/CVE-2018-11235.json b/2018/CVE-2018-11235.json index 581c5af6e7..2abdbb6d60 100644 --- a/2018/CVE-2018-11235.json +++ b/2018/CVE-2018-11235.json @@ -239,12 +239,12 @@ "pushed_at": "2021-10-21T13:05:05Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 2, "score": 0 }, diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index c4008dea76..3e80f07fb1 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -17,12 +17,12 @@ "pushed_at": "2018-08-17T23:31:46Z", "stargazers_count": 163, "watchers_count": 163, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 163, "score": 0 } diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json index b2f516e8ee..9f2229aa92 100644 --- a/2019/CVE-2019-1458.json +++ b/2019/CVE-2019-1458.json @@ -13,17 +13,17 @@ "description": "POC for cve-2019-1458", "fork": false, "created_at": "2020-03-03T17:55:07Z", - "updated_at": "2021-09-08T09:19:27Z", + "updated_at": "2021-10-21T17:03:44Z", "pushed_at": "2020-03-04T07:05:24Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 145, + "watchers_count": 145, "forks_count": 51, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 51, - "watchers": 144, + "watchers": 145, "score": 0 }, { diff --git a/2020/CVE-2020-17519.json b/2020/CVE-2020-17519.json index 7b123d35b4..cd9ce20f85 100644 --- a/2020/CVE-2020-17519.json +++ b/2020/CVE-2020-17519.json @@ -256,11 +256,11 @@ "description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519", "fork": false, "created_at": "2021-10-13T17:03:56Z", - "updated_at": "2021-10-21T13:31:04Z", + "updated_at": "2021-10-21T17:48:24Z", "pushed_at": "2021-10-14T21:11:44Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 7, + "stargazers_count": 23, + "watchers_count": 23, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [ @@ -269,8 +269,8 @@ "cve-2021-42013" ], "visibility": "public", - "forks": 7, - "watchers": 20, + "forks": 8, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-24227.json b/2020/CVE-2020-24227.json index 39f3743089..11752c3656 100644 --- a/2020/CVE-2020-24227.json +++ b/2020/CVE-2020-24227.json @@ -13,17 +13,17 @@ "description": "Playground Sessions - Storing User Credentials in Plaintext", "fork": false, "created_at": "2020-11-21T12:55:42Z", - "updated_at": "2021-02-11T18:01:38Z", + "updated_at": "2021-10-21T17:04:41Z", "pushed_at": "2020-11-21T13:18:01Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-35488.json b/2020/CVE-2020-35488.json index 02f2f526df..5c6c26ff17 100644 --- a/2020/CVE-2020-35488.json +++ b/2020/CVE-2020-35488.json @@ -25,5 +25,37 @@ "forks": 0, "watchers": 2, "score": 0 + }, + { + "id": 416451757, + "name": "nxlog-ubuntu-githubactions", + "full_name": "githubfoam\/nxlog-ubuntu-githubactions", + "owner": { + "login": "githubfoam", + "id": 33146150, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33146150?v=4", + "html_url": "https:\/\/github.com\/githubfoam" + }, + "html_url": "https:\/\/github.com\/githubfoam\/nxlog-ubuntu-githubactions", + "description": "nxlog ubuntu CVE-2020-35488", + "fork": false, + "created_at": "2021-10-12T18:25:17Z", + "updated_at": "2021-10-21T20:49:27Z", + "pushed_at": "2021-10-21T20:47:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [ + "cve", + "nxlog-ce", + "ubuntu1804", + "ubuntu2004" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index af957402ba..ef715f2082 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -41,15 +41,15 @@ "fork": false, "created_at": "2020-05-21T00:41:06Z", "updated_at": "2021-10-21T11:56:01Z", - "pushed_at": "2020-05-21T10:15:35Z", + "pushed_at": "2021-10-21T18:12:50Z", "stargazers_count": 112, "watchers_count": 112, - "forks_count": 27, + "forks_count": 28, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 27, + "forks": 28, "watchers": 112, "score": 0 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 6074c04b19..14626e1f42 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -157,10 +157,10 @@ "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-07-01T09:47:13Z", - "updated_at": "2021-10-20T15:17:48Z", + "updated_at": "2021-10-21T20:10:16Z", "pushed_at": "2021-07-05T06:46:12Z", - "stargazers_count": 302, - "watchers_count": 302, + "stargazers_count": 303, + "watchers_count": 303, "forks_count": 74, "allow_forking": true, "is_template": false, @@ -176,7 +176,7 @@ ], "visibility": "public", "forks": 74, - "watchers": 302, + "watchers": 303, "score": 0 }, { diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 7e19ac877a..4d97e751b7 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -121,17 +121,17 @@ "description": "CVE-2021-1732 poc & exp; tested on 20H2", "fork": false, "created_at": "2021-04-23T08:21:54Z", - "updated_at": "2021-08-19T17:17:50Z", + "updated_at": "2021-10-21T16:40:20Z", "pushed_at": "2021-04-23T08:28:53Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 12, - "watchers": 46, + "watchers": 47, "score": 0 }, { diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json index 8d45453813..961d1131f3 100644 --- a/2021/CVE-2021-34473.json +++ b/2021/CVE-2021-34473.json @@ -13,17 +13,17 @@ "description": "nuclei scanner for proxyshell ( CVE-2021-34473 )", "fork": false, "created_at": "2021-08-10T15:01:02Z", - "updated_at": "2021-10-04T09:37:55Z", + "updated_at": "2021-10-21T16:16:19Z", "pushed_at": "2021-08-11T20:40:50Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, - "watchers": 19, + "watchers": 20, "score": 0 }, { diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 40f359996a..96700335a2 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -73,17 +73,17 @@ "description": null, "fork": false, "created_at": "2021-07-02T12:10:49Z", - "updated_at": "2021-10-05T22:05:39Z", + "updated_at": "2021-10-21T15:40:46Z", "pushed_at": "2021-07-02T12:17:50Z", - "stargazers_count": 133, - "watchers_count": 133, + "stargazers_count": 134, + "watchers_count": 134, "forks_count": 34, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 34, - "watchers": 133, + "watchers": 134, "score": 0 }, { diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 6ab5b3ab44..bfb6cf81e6 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -40,10 +40,10 @@ "description": "CVE-2021-3560 Local PrivEsc Exploit", "fork": false, "created_at": "2021-06-11T14:28:43Z", - "updated_at": "2021-09-18T02:41:48Z", + "updated_at": "2021-10-21T20:15:27Z", "pushed_at": "2021-06-12T17:48:38Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 76, + "watchers_count": 76, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -56,7 +56,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 75, + "watchers": 76, "score": 0 }, { diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index ae8591dbe3..80349e9153 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -13,10 +13,10 @@ "description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation", "fork": false, "created_at": "2021-07-20T22:16:49Z", - "updated_at": "2021-10-05T17:07:24Z", + "updated_at": "2021-10-21T19:45:59Z", "pushed_at": "2021-09-14T01:42:57Z", - "stargazers_count": 179, - "watchers_count": 179, + "stargazers_count": 180, + "watchers_count": 180, "forks_count": 36, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 179, + "watchers": 180, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index f70928f46b..a3f9382a59 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -229,17 +229,17 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2021-10-21T14:21:34Z", + "updated_at": "2021-10-21T16:48:46Z", "pushed_at": "2021-09-11T09:50:26Z", - "stargazers_count": 1282, - "watchers_count": 1282, + "stargazers_count": 1281, + "watchers_count": 1281, "forks_count": 409, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 409, - "watchers": 1282, + "watchers": 1281, "score": 0 }, { diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 20329098b5..2b0f264117 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -13,17 +13,17 @@ "description": "PoC (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2021-10-16T16:17:44Z", - "updated_at": "2021-10-21T13:41:25Z", + "updated_at": "2021-10-21T19:24:18Z", "pushed_at": "2021-10-17T13:27:53Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "forks_count": 21, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 21, - "watchers": 114, + "watchers": 115, "score": 0 }, { @@ -40,17 +40,17 @@ "description": "windows 10 14393 LPE", "fork": false, "created_at": "2021-10-20T09:24:36Z", - "updated_at": "2021-10-21T12:53:40Z", + "updated_at": "2021-10-21T16:42:02Z", "pushed_at": "2021-10-20T09:29:17Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 14, + "stargazers_count": 19, + "watchers_count": 19, + "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 17, + "forks": 16, + "watchers": 19, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index c43670788c..046f01ff0b 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -614,8 +614,8 @@ "description": "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)", "fork": false, "created_at": "2021-10-06T14:58:27Z", - "updated_at": "2021-10-13T08:11:56Z", - "pushed_at": "2021-10-10T12:59:51Z", + "updated_at": "2021-10-21T18:51:02Z", + "pushed_at": "2021-10-21T18:51:00Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 3, @@ -1506,11 +1506,11 @@ "description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519", "fork": false, "created_at": "2021-10-13T17:03:56Z", - "updated_at": "2021-10-21T13:31:04Z", + "updated_at": "2021-10-21T21:10:44Z", "pushed_at": "2021-10-14T21:11:44Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 7, + "stargazers_count": 24, + "watchers_count": 24, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [ @@ -1519,8 +1519,8 @@ "cve-2021-42013" ], "visibility": "public", - "forks": 7, - "watchers": 20, + "forks": 8, + "watchers": 24, "score": 0 }, { diff --git a/README.md b/README.md index 1b097e551a..bc8730710e 100644 --- a/README.md +++ b/README.md @@ -7288,6 +7288,7 @@ The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allo - [GuillaumePetit84/CVE-2020-35488](https://github.com/GuillaumePetit84/CVE-2020-35488) +- [githubfoam/nxlog-ubuntu-githubactions](https://github.com/githubfoam/nxlog-ubuntu-githubactions) ### CVE-2020-35489 (2020-12-17)