From f005b71f268a466a0f837a076402c7885924e85d Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 16 Aug 2021 00:12:47 +0900 Subject: [PATCH] Auto Update 2021/08/16 00:12:47 --- 2014/CVE-2014-0160.json | 23 +++++++++++++++++++++++ 2017/CVE-2017-5638.json | 8 ++++---- 2017/CVE-2017-7494.json | 4 ++-- 2018/CVE-2018-2879.json | 4 ++-- 2018/CVE-2018-8581.json | 4 ++-- 2018/CVE-2018-9995.json | 25 +------------------------ 2019/CVE-2019-0708.json | 16 ++++++++-------- 2020/CVE-2020-0069.json | 8 ++++---- 2020/CVE-2020-11651.json | 8 ++++---- 2020/CVE-2020-14321.json | 4 ++-- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-25686.json | 4 ++-- 2020/CVE-2020-3433.json | 12 ++++++------ 2021/CVE-2021-1675.json | 12 ++++++------ 2021/CVE-2021-2394.json | 8 ++++---- 2021/CVE-2021-28476.json | 23 +++++++++++++++++++++++ 2021/CVE-2021-34527.json | 4 ++-- 2021/CVE-2021-36934.json | 4 ++-- README.md | 3 ++- 19 files changed, 103 insertions(+), 79 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 571abdacd6..2277c151ba 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -1240,5 +1240,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 396322717, + "name": "bleeding-heart", + "full_name": "pierceoneill\/bleeding-heart", + "owner": { + "login": "pierceoneill", + "id": 37594104, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4", + "html_url": "https:\/\/github.com\/pierceoneill" + }, + "html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart", + "description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.", + "fork": false, + "created_at": "2021-08-15T11:05:23Z", + "updated_at": "2021-08-15T11:13:05Z", + "pushed_at": "2021-08-15T11:13:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index bc52a6c4e6..df56fa2a92 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -1393,13 +1393,13 @@ "description": null, "fork": false, "created_at": "2021-03-09T12:56:08Z", - "updated_at": "2021-04-04T16:57:46Z", + "updated_at": "2021-08-15T12:24:09Z", "pushed_at": "2021-04-03T14:42:10Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 55f826a53a..67164c9782 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -109,8 +109,8 @@ "pushed_at": "2017-05-30T16:13:24Z", "stargazers_count": 38, "watchers_count": 38, - "forks_count": 22, - "forks": 22, + "forks_count": 23, + "forks": 23, "watchers": 38, "score": 0 }, diff --git a/2018/CVE-2018-2879.json b/2018/CVE-2018-2879.json index cbf85ba0b9..056f189c4b 100644 --- a/2018/CVE-2018-2879.json +++ b/2018/CVE-2018-2879.json @@ -13,8 +13,8 @@ "description": null, "fork": false, "created_at": "2018-07-26T19:31:45Z", - "updated_at": "2021-08-04T16:44:06Z", - "pushed_at": "2018-07-27T12:09:40Z", + "updated_at": "2021-08-15T14:18:14Z", + "pushed_at": "2021-08-15T14:18:12Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 7, diff --git a/2018/CVE-2018-8581.json b/2018/CVE-2018-8581.json index fc20d7d912..205514b36a 100644 --- a/2018/CVE-2018-8581.json +++ b/2018/CVE-2018-8581.json @@ -63,8 +63,8 @@ "pushed_at": "2019-06-21T11:29:41Z", "stargazers_count": 322, "watchers_count": 322, - "forks_count": 70, - "forks": 70, + "forks_count": 72, + "forks": 72, "watchers": 322, "score": 0 } diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index 80a269ed52..79de2f84d4 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -344,29 +344,6 @@ "watchers": 2, "score": 0 }, - { - "id": 368409342, - "name": "CVE-2018-9995-Exploit", - "full_name": "kienquoc102\/CVE-2018-9995-Exploit", - "owner": { - "login": "kienquoc102", - "id": 84182708, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84182708?v=4", - "html_url": "https:\/\/github.com\/kienquoc102" - }, - "html_url": "https:\/\/github.com\/kienquoc102\/CVE-2018-9995-Exploit", - "description": null, - "fork": false, - "created_at": "2021-05-18T05:19:28Z", - "updated_at": "2021-06-04T12:03:29Z", - "pushed_at": "2021-06-04T12:03:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 374551249, "name": "CVE-2018-9995-2", @@ -381,7 +358,7 @@ "description": null, "fork": false, "created_at": "2021-06-07T05:57:43Z", - "updated_at": "2021-08-04T09:32:35Z", + "updated_at": "2021-08-15T10:30:19Z", "pushed_at": "2021-06-10T11:42:32Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index b07989f0fc..5745dd93f9 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1025,13 +1025,13 @@ "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", - "updated_at": "2021-08-03T11:05:19Z", + "updated_at": "2021-08-15T10:02:05Z", "pushed_at": "2020-12-06T04:48:38Z", - "stargazers_count": 1156, - "watchers_count": 1156, + "stargazers_count": 1155, + "watchers_count": 1155, "forks_count": 400, "forks": 400, - "watchers": 1156, + "watchers": 1155, "score": 0 }, { @@ -2244,13 +2244,13 @@ "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", - "updated_at": "2021-07-30T03:25:43Z", + "updated_at": "2021-08-15T10:18:04Z", "pushed_at": "2021-02-06T00:24:21Z", - "stargazers_count": 189, - "watchers_count": 189, + "stargazers_count": 188, + "watchers_count": 188, "forks_count": 72, "forks": 72, - "watchers": 189, + "watchers": 188, "score": 0 }, { diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json index c44511fd49..85548d9a9a 100644 --- a/2020/CVE-2020-0069.json +++ b/2020/CVE-2020-0069.json @@ -13,13 +13,13 @@ "description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).", "fork": false, "created_at": "2019-09-06T12:12:48Z", - "updated_at": "2021-07-27T20:29:33Z", + "updated_at": "2021-08-15T11:10:50Z", "pushed_at": "2021-05-31T21:22:33Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "forks_count": 10, "forks": 10, - "watchers": 65, + "watchers": 66, "score": 0 }, { diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json index 120470200b..048da42ca9 100644 --- a/2020/CVE-2020-11651.json +++ b/2020/CVE-2020-11651.json @@ -105,13 +105,13 @@ "description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652", "fork": false, "created_at": "2020-05-04T11:52:28Z", - "updated_at": "2021-07-01T18:10:42Z", + "updated_at": "2021-08-15T11:52:58Z", "pushed_at": "2020-07-10T09:30:47Z", - "stargazers_count": 96, - "watchers_count": 96, + "stargazers_count": 97, + "watchers_count": 97, "forks_count": 39, "forks": 39, - "watchers": 96, + "watchers": 97, "score": 0 }, { diff --git a/2020/CVE-2020-14321.json b/2020/CVE-2020-14321.json index df59757eb5..9ea7b1fc3f 100644 --- a/2020/CVE-2020-14321.json +++ b/2020/CVE-2020-14321.json @@ -17,8 +17,8 @@ "pushed_at": "2021-08-01T12:25:59Z", "stargazers_count": 32, "watchers_count": 32, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 32, "score": 0 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index e01fecc7f3..7ea4fea79d 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2021-08-11T16:14:12Z", + "updated_at": "2021-08-15T14:24:27Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 351, - "watchers_count": 351, + "stargazers_count": 352, + "watchers_count": 352, "forks_count": 106, "forks": 106, - "watchers": 351, + "watchers": 352, "score": 0 }, { diff --git a/2020/CVE-2020-25686.json b/2020/CVE-2020-25686.json index 969b7dfc50..778fe44d60 100644 --- a/2020/CVE-2020-25686.json +++ b/2020/CVE-2020-25686.json @@ -17,8 +17,8 @@ "pushed_at": "2021-01-24T09:05:40Z", "stargazers_count": 72, "watchers_count": 72, - "forks_count": 34, - "forks": 34, + "forks_count": 35, + "forks": 35, "watchers": 72, "score": 0 } diff --git a/2020/CVE-2020-3433.json b/2020/CVE-2020-3433.json index 4653258d13..7536083f75 100644 --- a/2020/CVE-2020-3433.json +++ b/2020/CVE-2020-3433.json @@ -13,13 +13,13 @@ "description": "PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-3435 ", "fork": false, "created_at": "2020-09-25T20:53:48Z", - "updated_at": "2021-08-15T04:52:29Z", + "updated_at": "2021-08-15T11:35:37Z", "pushed_at": "2020-09-25T20:55:17Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 8, - "forks": 8, - "watchers": 14, + "stargazers_count": 15, + "watchers_count": 15, + "forks_count": 10, + "forks": 10, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index a370b5c362..a2d206bbca 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -36,13 +36,13 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2021-08-14T13:05:37Z", + "updated_at": "2021-08-15T14:08:24Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1305, - "watchers_count": 1305, + "stargazers_count": 1307, + "watchers_count": 1307, "forks_count": 471, "forks": 471, - "watchers": 1305, + "watchers": 1307, "score": 0 }, { @@ -224,8 +224,8 @@ "pushed_at": "2021-07-05T08:54:06Z", "stargazers_count": 556, "watchers_count": 556, - "forks_count": 146, - "forks": 146, + "forks_count": 147, + "forks": 147, "watchers": 556, "score": 0 }, diff --git a/2021/CVE-2021-2394.json b/2021/CVE-2021-2394.json index 88a6df4209..19a7475adc 100644 --- a/2021/CVE-2021-2394.json +++ b/2021/CVE-2021-2394.json @@ -13,13 +13,13 @@ "description": "POC of CVE-2021-2394", "fork": false, "created_at": "2021-08-02T02:22:04Z", - "updated_at": "2021-08-15T03:50:31Z", + "updated_at": "2021-08-15T11:08:47Z", "pushed_at": "2021-08-15T03:48:55Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index 155d176069..9217ec04c9 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -44,5 +44,28 @@ "forks": 1, "watchers": 8, "score": 0 + }, + { + "id": 396324186, + "name": "CVE-2021-28476-tools-env", + "full_name": "sh4m2hwz\/CVE-2021-28476-tools-env", + "owner": { + "login": "sh4m2hwz", + "id": 77354315, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77354315?v=4", + "html_url": "https:\/\/github.com\/sh4m2hwz" + }, + "html_url": "https:\/\/github.com\/sh4m2hwz\/CVE-2021-28476-tools-env", + "description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.", + "fork": false, + "created_at": "2021-08-15T11:10:40Z", + "updated_at": "2021-08-15T11:44:04Z", + "pushed_at": "2021-08-15T11:44:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 16ae958ea2..0ba1719ea7 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -109,8 +109,8 @@ "pushed_at": "2021-07-19T01:22:40Z", "stargazers_count": 23, "watchers_count": 23, - "forks_count": 12, - "forks": 12, + "forks_count": 13, + "forks": 13, "watchers": 23, "score": 0 }, diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index fbbb292b0f..b80e410d38 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -247,8 +247,8 @@ "pushed_at": "2021-07-25T15:41:33Z", "stargazers_count": 181, "watchers_count": 181, - "forks_count": 36, - "forks": 36, + "forks_count": 37, + "forks": 37, "watchers": 181, "score": 0 }, diff --git a/README.md b/README.md index 2200965778..e85f067fd2 100644 --- a/README.md +++ b/README.md @@ -1307,6 +1307,7 @@ Hyper-V Remote Code Execution Vulnerability - [0vercl0k/CVE-2021-28476](https://github.com/0vercl0k/CVE-2021-28476) - [bluefrostsecurity/CVE-2021-28476](https://github.com/bluefrostsecurity/CVE-2021-28476) +- [sh4m2hwz/CVE-2021-28476-tools-env](https://github.com/sh4m2hwz/CVE-2021-28476-tools-env) ### CVE-2021-28480 (2021-04-13) @@ -11869,7 +11870,6 @@ TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in - [akuhidayat/HTC](https://github.com/akuhidayat/HTC) - [g5q2/cve-2018-9995](https://github.com/g5q2/cve-2018-9995) - [HACKGM/CVE-2018-9995](https://github.com/HACKGM/CVE-2018-9995) -- [kienquoc102/CVE-2018-9995-Exploit](https://github.com/kienquoc102/CVE-2018-9995-Exploit) - [kienquoc102/CVE-2018-9995-2](https://github.com/kienquoc102/CVE-2018-9995-2) ### CVE-2018-10118 (2018-04-15) @@ -17829,6 +17829,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p - [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan) - [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us) - [BelminD/heartbleed](https://github.com/BelminD/heartbleed) +- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart) ### CVE-2014-0166 (2014-04-09)