From edcb821634da43194a107422a5df383062ec5acf Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 1 Jun 2021 18:11:51 +0900 Subject: [PATCH] Auto Update 2021/06/01 18:11:51 --- 2016/CVE-2016-7255.json | 4 ++-- 2017/CVE-2017-0213.json | 4 ++-- 2017/CVE-2017-5638.json | 8 ++++---- 2017/CVE-2017-9248.json | 8 ++++---- 2018/CVE-2018-14847.json | 4 ++-- 2018/CVE-2018-4121.json | 4 ++-- 2018/CVE-2018-5955.json | 12 ++++++------ 2018/CVE-2018-7600.json | 8 ++++---- 2019/CVE-2019-0193.json | 8 ++++---- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-10149.json | 4 ++-- 2019/CVE-2019-11932.json | 8 ++++---- 2019/CVE-2019-15107.json | 8 ++++---- 2019/CVE-2019-15972.json | 4 ++-- 2019/CVE-2019-17558.json | 12 ++++++------ 2020/CVE-2020-0022.json | 8 ++++---- 2020/CVE-2020-0688.json | 4 ++-- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-11651.json | 4 ++-- 2020/CVE-2020-14882.json | 8 ++++---- 2020/CVE-2020-19999.json | 25 +++++++++++++++++++++++++ 2020/CVE-2020-5902.json | 12 ++++++------ 2021/CVE-2021-19999.json | 25 +++++++++++++++++++++++++ 2021/CVE-2021-20914.json | 8 ++++---- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-21985.json | 35 +++++++++++++++++++++++++++++------ 2021/CVE-2021-25281.json | 8 ++++---- 2021/CVE-2021-25374.json | 4 ++-- 2021/CVE-2021-26295.json | 8 ++++---- 2021/CVE-2021-26868.json | 8 ++++---- 2021/CVE-2021-28476.json | 12 ++++++------ 2021/CVE-2021-29447.json | 8 ++++---- README.md | 7 +++++++ 33 files changed, 192 insertions(+), 112 deletions(-) create mode 100644 2020/CVE-2020-19999.json create mode 100644 2021/CVE-2021-19999.json diff --git a/2016/CVE-2016-7255.json b/2016/CVE-2016-7255.json index 1599f83b6f..d81aabc1d4 100644 --- a/2016/CVE-2016-7255.json +++ b/2016/CVE-2016-7255.json @@ -40,8 +40,8 @@ "pushed_at": "2017-03-09T23:00:08Z", "stargazers_count": 80, "watchers_count": 80, - "forks_count": 54, - "forks": 54, + "forks_count": 55, + "forks": 55, "watchers": 80, "score": 0 }, diff --git a/2017/CVE-2017-0213.json b/2017/CVE-2017-0213.json index 6b0f279964..30bfb5ab72 100644 --- a/2017/CVE-2017-0213.json +++ b/2017/CVE-2017-0213.json @@ -132,8 +132,8 @@ "pushed_at": "2018-04-17T23:14:39Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 7, - "forks": 7, + "forks_count": 8, + "forks": 8, "watchers": 2, "score": 0 }, diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index b2df1715d6..daae5004aa 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -312,13 +312,13 @@ "description": "An exploit for Apache Struts CVE-2017-5638", "fork": false, "created_at": "2017-03-12T02:02:25Z", - "updated_at": "2021-05-26T12:07:49Z", + "updated_at": "2021-06-01T08:23:08Z", "pushed_at": "2018-05-21T18:33:26Z", - "stargazers_count": 393, - "watchers_count": 393, + "stargazers_count": 395, + "watchers_count": 395, "forks_count": 142, "forks": 142, - "watchers": 393, + "watchers": 395, "score": 0 }, { diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index f70aebfcdf..572d72b564 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -13,13 +13,13 @@ "description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)", "fork": false, "created_at": "2018-01-16T00:23:34Z", - "updated_at": "2021-05-13T09:56:39Z", + "updated_at": "2021-06-01T06:02:08Z", "pushed_at": "2020-12-22T03:10:47Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "forks_count": 40, "forks": 40, - "watchers": 103, + "watchers": 104, "score": 0 }, { diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 05b8fe6475..d6c4a193bc 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -17,8 +17,8 @@ "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 423, "watchers_count": 423, - "forks_count": 401, - "forks": 401, + "forks_count": 402, + "forks": 402, "watchers": 423, "score": 0 }, diff --git a/2018/CVE-2018-4121.json b/2018/CVE-2018-4121.json index 6a91b72aa0..103ef4b6e2 100644 --- a/2018/CVE-2018-4121.json +++ b/2018/CVE-2018-4121.json @@ -17,8 +17,8 @@ "pushed_at": "2018-04-19T11:20:41Z", "stargazers_count": 114, "watchers_count": 114, - "forks_count": 34, - "forks": 34, + "forks_count": 35, + "forks": 35, "watchers": 114, "score": 0 }, diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 1cfade5cf0..27ff69cec4 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-05-25T10:21:05Z", + "updated_at": "2021-06-01T06:46:56Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 421, - "watchers_count": 421, - "forks_count": 99, - "forks": 99, - "watchers": 421, + "stargazers_count": 422, + "watchers_count": 422, + "forks_count": 100, + "forks": 100, + "watchers": 422, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 4ea60a1466..77982b1600 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -59,13 +59,13 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2021-05-31T15:21:45Z", + "updated_at": "2021-06-01T03:33:15Z", "pushed_at": "2021-01-08T10:31:22Z", - "stargazers_count": 480, - "watchers_count": 480, + "stargazers_count": 481, + "watchers_count": 481, "forks_count": 159, "forks": 159, - "watchers": 480, + "watchers": 481, "score": 0 }, { diff --git a/2019/CVE-2019-0193.json b/2019/CVE-2019-0193.json index ae1b5989c9..badda04cc9 100644 --- a/2019/CVE-2019-0193.json +++ b/2019/CVE-2019-0193.json @@ -36,13 +36,13 @@ "description": "Apache Solr DataImport Handler RCE", "fork": false, "created_at": "2019-08-09T06:27:39Z", - "updated_at": "2021-05-24T07:23:17Z", + "updated_at": "2021-06-01T08:12:20Z", "pushed_at": "2019-08-12T02:23:38Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "forks_count": 39, "forks": 39, - "watchers": 80, + "watchers": 81, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 4eebf9145d..b4b6f272e1 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2244,13 +2244,13 @@ "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", - "updated_at": "2021-05-24T17:12:12Z", + "updated_at": "2021-06-01T08:46:13Z", "pushed_at": "2021-02-06T00:24:21Z", - "stargazers_count": 190, - "watchers_count": 190, + "stargazers_count": 189, + "watchers_count": 189, "forks_count": 73, "forks": 73, - "watchers": 190, + "watchers": 189, "score": 0 }, { diff --git a/2019/CVE-2019-10149.json b/2019/CVE-2019-10149.json index 45aa893031..334ce81ce0 100644 --- a/2019/CVE-2019-10149.json +++ b/2019/CVE-2019-10149.json @@ -63,8 +63,8 @@ "pushed_at": "2019-06-18T14:57:22Z", "stargazers_count": 16, "watchers_count": 16, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 16, "score": 0 }, diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 175d27c7cb..0abc1d2dd3 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -13,13 +13,13 @@ "description": " double-free bug in WhatsApp exploit poc", "fork": false, "created_at": "2019-10-03T09:26:24Z", - "updated_at": "2021-05-18T00:05:13Z", + "updated_at": "2021-06-01T08:46:13Z", "pushed_at": "2021-03-19T17:23:25Z", - "stargazers_count": 248, - "watchers_count": 248, + "stargazers_count": 247, + "watchers_count": 247, "forks_count": 77, "forks": 77, - "watchers": 248, + "watchers": 247, "score": 0 }, { diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index c09dc075fa..e82c0aedfc 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -312,13 +312,13 @@ "description": null, "fork": false, "created_at": "2020-11-09T21:46:57Z", - "updated_at": "2021-05-03T05:31:35Z", + "updated_at": "2021-06-01T03:34:21Z", "pushed_at": "2021-02-07T19:51:24Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 2, "forks": 2, - "watchers": 10, + "watchers": 11, "score": 0 }, { diff --git a/2019/CVE-2019-15972.json b/2019/CVE-2019-15972.json index ea18ba76d0..920fb67b27 100644 --- a/2019/CVE-2019-15972.json +++ b/2019/CVE-2019-15972.json @@ -17,8 +17,8 @@ "pushed_at": "2019-11-20T15:05:54Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 5, - "forks": 5, + "forks_count": 6, + "forks": 6, "watchers": 4, "score": 0 } diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 739c7ce06b..cee6a632e5 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -17,8 +17,8 @@ "pushed_at": "2020-01-10T10:58:44Z", "stargazers_count": 21, "watchers_count": 21, - "forks_count": 5, - "forks": 5, + "forks_count": 4, + "forks": 4, "watchers": 21, "score": 0 }, @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-05-31T13:23:17Z", + "updated_at": "2021-06-01T06:28:54Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2604, - "watchers_count": 2604, + "stargazers_count": 2605, + "watchers_count": 2605, "forks_count": 761, "forks": 761, - "watchers": 2604, + "watchers": 2605, "score": 0 }, { diff --git a/2020/CVE-2020-0022.json b/2020/CVE-2020-0022.json index 96ee10d9f3..2ad6e2b935 100644 --- a/2020/CVE-2020-0022.json +++ b/2020/CVE-2020-0022.json @@ -59,13 +59,13 @@ "description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)", "fork": false, "created_at": "2020-08-24T19:33:10Z", - "updated_at": "2021-04-23T16:18:39Z", + "updated_at": "2021-06-01T08:38:51Z", "pushed_at": "2021-03-21T20:59:46Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 6, "forks": 6, - "watchers": 15, + "watchers": 17, "score": 0 }, { diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index bba4f33f4a..7b3c2f7cb1 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -151,8 +151,8 @@ "description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.", "fork": false, "created_at": "2020-02-28T16:04:30Z", - "updated_at": "2021-03-11T15:57:50Z", - "pushed_at": "2020-10-07T08:10:46Z", + "updated_at": "2021-06-01T07:36:56Z", + "pushed_at": "2021-06-01T07:36:53Z", "stargazers_count": 35, "watchers_count": 35, "forks_count": 12, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 42844c8bde..5cc82487b9 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -105,13 +105,13 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2021-05-31T18:31:06Z", + "updated_at": "2021-06-01T07:43:57Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 592, - "watchers_count": 592, + "stargazers_count": 593, + "watchers_count": 593, "forks_count": 197, "forks": 197, - "watchers": 592, + "watchers": 593, "score": 0 }, { diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json index 9bee4e33c4..168703ca0c 100644 --- a/2020/CVE-2020-11651.json +++ b/2020/CVE-2020-11651.json @@ -224,8 +224,8 @@ "pushed_at": "2020-10-04T16:18:45Z", "stargazers_count": 21, "watchers_count": 21, - "forks_count": 14, - "forks": 14, + "forks_count": 13, + "forks": 13, "watchers": 21, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index b61a22b1c9..6e79a23076 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-05-31T13:23:17Z", + "updated_at": "2021-06-01T06:28:54Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2604, - "watchers_count": 2604, + "stargazers_count": 2605, + "watchers_count": 2605, "forks_count": 761, "forks": 761, - "watchers": 2604, + "watchers": 2605, "score": 0 }, { diff --git a/2020/CVE-2020-19999.json b/2020/CVE-2020-19999.json new file mode 100644 index 0000000000..7208f0f821 --- /dev/null +++ b/2020/CVE-2020-19999.json @@ -0,0 +1,25 @@ +[ + { + "id": 372693347, + "name": "CVE-2020-19999test-5", + "full_name": "dorisroot1\/CVE-2020-19999test-5", + "owner": { + "login": "dorisroot1", + "id": 30891737, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30891737?v=4", + "html_url": "https:\/\/github.com\/dorisroot1" + }, + "html_url": "https:\/\/github.com\/dorisroot1\/CVE-2020-19999test-5", + "description": "cve-2021-19999test", + "fork": false, + "created_at": "2021-06-01T03:44:30Z", + "updated_at": "2021-06-01T07:25:52Z", + "pushed_at": "2021-06-01T03:44:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index e20f6ab06e..20aa91eaa8 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -197,13 +197,13 @@ "description": "exploit code for F5-Big-IP (CVE-2020-5902)", "fork": false, "created_at": "2020-07-06T01:12:23Z", - "updated_at": "2021-05-31T18:23:04Z", + "updated_at": "2021-06-01T06:34:22Z", "pushed_at": "2020-07-06T01:36:32Z", - "stargazers_count": 24, - "watchers_count": 24, - "forks_count": 12, - "forks": 12, - "watchers": 24, + "stargazers_count": 26, + "watchers_count": 26, + "forks_count": 13, + "forks": 13, + "watchers": 26, "score": 0 }, { diff --git a/2021/CVE-2021-19999.json b/2021/CVE-2021-19999.json new file mode 100644 index 0000000000..7208f0f821 --- /dev/null +++ b/2021/CVE-2021-19999.json @@ -0,0 +1,25 @@ +[ + { + "id": 372693347, + "name": "CVE-2020-19999test-5", + "full_name": "dorisroot1\/CVE-2020-19999test-5", + "owner": { + "login": "dorisroot1", + "id": 30891737, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30891737?v=4", + "html_url": "https:\/\/github.com\/dorisroot1" + }, + "html_url": "https:\/\/github.com\/dorisroot1\/CVE-2020-19999test-5", + "description": "cve-2021-19999test", + "fork": false, + "created_at": "2021-06-01T03:44:30Z", + "updated_at": "2021-06-01T07:25:52Z", + "pushed_at": "2021-06-01T03:44:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-20914.json b/2021/CVE-2021-20914.json index dee7725533..d081d700cb 100644 --- a/2021/CVE-2021-20914.json +++ b/2021/CVE-2021-20914.json @@ -13,13 +13,13 @@ "description": "POC for CVE2021-2091 VMWare ESXi RCE Exploit", "fork": false, "created_at": "2021-05-25T17:14:38Z", - "updated_at": "2021-05-26T03:06:30Z", + "updated_at": "2021-06-01T06:55:36Z", "pushed_at": "2021-05-31T17:29:25Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 2, "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 68c9b7fc65..dbe86e2d8b 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -59,13 +59,13 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2021-06-01T02:14:51Z", + "updated_at": "2021-06-01T08:46:00Z", "pushed_at": "2021-03-10T05:01:22Z", - "stargazers_count": 258, - "watchers_count": 258, + "stargazers_count": 259, + "watchers_count": 259, "forks_count": 97, "forks": 97, - "watchers": 258, + "watchers": 259, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index d54978ab87..e932d038a7 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -36,13 +36,36 @@ "description": null, "fork": false, "created_at": "2021-05-29T13:07:14Z", - "updated_at": "2021-06-01T02:13:36Z", + "updated_at": "2021-06-01T09:10:48Z", "pushed_at": "2021-05-31T06:14:36Z", - "stargazers_count": 18, - "watchers_count": 18, - "forks_count": 5, - "forks": 5, - "watchers": 18, + "stargazers_count": 38, + "watchers_count": 38, + "forks_count": 6, + "forks": 6, + "watchers": 38, + "score": 0 + }, + { + "id": 372757311, + "name": "CVE-2021-21985-Checker", + "full_name": "onSec-fr\/CVE-2021-21985-Checker", + "owner": { + "login": "onSec-fr", + "id": 59887731, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59887731?v=4", + "html_url": "https:\/\/github.com\/onSec-fr" + }, + "html_url": "https:\/\/github.com\/onSec-fr\/CVE-2021-21985-Checker", + "description": "CVE-2021-21985 Checker (credits to alt3kx).", + "fork": false, + "created_at": "2021-06-01T08:31:05Z", + "updated_at": "2021-06-01T08:32:27Z", + "pushed_at": "2021-06-01T08:32:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-25281.json b/2021/CVE-2021-25281.json index 4934ad04ed..597060419f 100644 --- a/2021/CVE-2021-25281.json +++ b/2021/CVE-2021-25281.json @@ -13,13 +13,13 @@ "description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack", "fork": false, "created_at": "2021-02-26T12:08:25Z", - "updated_at": "2021-04-02T11:22:44Z", + "updated_at": "2021-06-01T06:31:58Z", "pushed_at": "2021-03-06T12:50:35Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 4, "forks": 4, - "watchers": 22, + "watchers": 23, "score": 0 }, { diff --git a/2021/CVE-2021-25374.json b/2021/CVE-2021-25374.json index ff0ab30bfa..54c382df22 100644 --- a/2021/CVE-2021-25374.json +++ b/2021/CVE-2021-25374.json @@ -17,8 +17,8 @@ "pushed_at": "2021-04-28T17:56:04Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 5, - "forks": 5, + "forks_count": 6, + "forks": 6, "watchers": 9, "score": 0 } diff --git a/2021/CVE-2021-26295.json b/2021/CVE-2021-26295.json index 5b43b6994b..c0e7b50a39 100644 --- a/2021/CVE-2021-26295.json +++ b/2021/CVE-2021-26295.json @@ -59,13 +59,13 @@ "description": "CVE-2021-26295 EXP 可成功反弹Shell", "fork": false, "created_at": "2021-03-24T10:08:54Z", - "updated_at": "2021-05-21T10:54:15Z", + "updated_at": "2021-06-01T07:17:33Z", "pushed_at": "2021-05-10T02:09:51Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 4, "forks": 4, - "watchers": 11, + "watchers": 12, "score": 0 }, { diff --git a/2021/CVE-2021-26868.json b/2021/CVE-2021-26868.json index 49961dd681..da5d5df46a 100644 --- a/2021/CVE-2021-26868.json +++ b/2021/CVE-2021-26868.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-04-26T14:21:30Z", - "updated_at": "2021-04-29T02:14:00Z", + "updated_at": "2021-06-01T07:32:55Z", "pushed_at": "2021-04-26T14:23:48Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 2, "forks": 2, - "watchers": 12, + "watchers": 13, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index b7f52a97ab..8c3425ffec 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", "fork": false, "created_at": "2021-05-31T18:02:39Z", - "updated_at": "2021-06-01T03:12:14Z", + "updated_at": "2021-06-01T08:58:37Z", "pushed_at": "2021-05-31T21:30:00Z", - "stargazers_count": 29, - "watchers_count": 29, - "forks_count": 4, - "forks": 4, - "watchers": 29, + "stargazers_count": 71, + "watchers_count": 71, + "forks_count": 10, + "forks": 10, + "watchers": 71, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index 182dc12e24..55ac76dddf 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -13,13 +13,13 @@ "description": "WordPress - Authenticated XXE (CVE-2021-29447)", "fork": false, "created_at": "2021-04-16T20:41:26Z", - "updated_at": "2021-05-28T08:42:51Z", + "updated_at": "2021-06-01T08:00:31Z", "pushed_at": "2021-04-18T00:45:34Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 5, "forks": 5, - "watchers": 12, + "watchers": 13, "score": 0 }, { diff --git a/README.md b/README.md index 1b636f8551..6536925473 100644 --- a/README.md +++ b/README.md @@ -325,6 +325,9 @@ The overlayfs implementation in the linux kernel did not properly validate with ### CVE-2021-14562 - [Jarry1sec/CVE-2021-14562](https://github.com/Jarry1sec/CVE-2021-14562) +### CVE-2021-19999 +- [dorisroot1/CVE-2020-19999test-5](https://github.com/dorisroot1/CVE-2020-19999test-5) + ### CVE-2021-20202 (2021-05-12) @@ -534,6 +537,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to - [bigbroke/CVE-2021-21985](https://github.com/bigbroke/CVE-2021-21985) - [alt3kx/CVE-2021-21985_PoC](https://github.com/alt3kx/CVE-2021-21985_PoC) +- [onSec-fr/CVE-2021-21985-Checker](https://github.com/onSec-fr/CVE-2021-21985-Checker) ### CVE-2021-22192 (2021-03-24) @@ -4504,6 +4508,9 @@ A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapest - [154802388/CVE-2020-17531](https://github.com/154802388/CVE-2020-17531) +### CVE-2020-19999 +- [dorisroot1/CVE-2020-19999test-5](https://github.com/dorisroot1/CVE-2020-19999test-5) + ### CVE-2020-21224 (2021-02-22)