From f6cf6e7cbe22859d150853d06e9f91de9c72eeb8 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 30 Aug 2021 00:11:54 +0900 Subject: [PATCH] Auto Update 2021/08/30 00:11:54 --- 2014/CVE-2014-4210.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2016/CVE-2016-5195.json | 16 ++++++++-------- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-15473.json | 8 ++++---- 2018/CVE-2018-15961.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-5955.json | 8 ++++---- 2018/CVE-2018-6574.json | 8 ++++---- 2018/CVE-2018-7750.json | 4 ++-- 2019/CVE-2019-0708.json | 16 ++++++++-------- 2019/CVE-2019-1040.json | 16 ++++++++-------- 2019/CVE-2019-11358.json | 4 ++-- 2019/CVE-2019-15126.json | 12 ++++++------ 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-2618.json | 8 ++++---- 2020/CVE-2020-0787.json | 8 ++++---- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-1102.json | 2 +- 2020/CVE-2020-1472.json | 28 ++++++++++++++-------------- 2020/CVE-2020-14882.json | 8 ++++---- 2020/CVE-2020-14883.json | 8 ++++---- 2020/CVE-2020-17144.json | 8 ++++---- 2020/CVE-2020-1938.json | 16 ++++++++-------- 2020/CVE-2020-25223.json | 25 +++++++++++++++++++++++++ 2020/CVE-2020-2551.json | 16 ++++++++-------- 2021/CVE-2021-1675.json | 4 ++-- 2021/CVE-2021-22986.json | 8 ++++---- 2021/CVE-2021-25646.json | 8 ++++---- 2021/CVE-2021-26855.json | 8 ++++---- 2021/CVE-2021-26857.json | 8 ++++---- 2021/CVE-2021-29447.json | 8 ++++---- 2021/CVE-2021-3129.json | 16 ++++++++-------- 2021/CVE-2021-3156.json | 8 ++++---- 2021/CVE-2021-34527.json | 6 +++--- 2021/CVE-2021-36394.json | 4 ++-- 2021/CVE-2021-36934.json | 8 ++++---- README.md | 8 ++++++++ 38 files changed, 201 insertions(+), 168 deletions(-) create mode 100644 2020/CVE-2020-25223.json diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index f25f8da977..c05ceef770 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-27T08:01:19Z", + "updated_at": "2021-08-29T10:17:11Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1156, - "watchers_count": 1156, + "stargazers_count": 1155, + "watchers_count": 1155, "forks_count": 255, "forks": 255, - "watchers": 1156, + "watchers": 1155, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 95d77c8495..d8d3108f5c 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-27T08:01:19Z", + "updated_at": "2021-08-29T10:17:11Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1156, - "watchers_count": 1156, + "stargazers_count": 1155, + "watchers_count": 1155, "forks_count": 255, "forks": 255, - "watchers": 1156, + "watchers": 1155, "score": 0 }, { diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 719d36e458..a0cb5926ce 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -59,13 +59,13 @@ "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android", "fork": false, "created_at": "2016-10-21T11:19:21Z", - "updated_at": "2021-08-26T14:13:16Z", + "updated_at": "2021-08-29T12:10:48Z", "pushed_at": "2021-02-03T16:03:40Z", - "stargazers_count": 878, - "watchers_count": 878, + "stargazers_count": 877, + "watchers_count": 877, "forks_count": 411, "forks": 411, - "watchers": 878, + "watchers": 877, "score": 0 }, { @@ -427,13 +427,13 @@ "description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow", "fork": false, "created_at": "2017-01-20T05:28:04Z", - "updated_at": "2021-08-27T07:49:45Z", + "updated_at": "2021-08-29T12:14:26Z", "pushed_at": "2017-01-27T10:04:07Z", - "stargazers_count": 256, - "watchers_count": 256, + "stargazers_count": 255, + "watchers_count": 255, "forks_count": 104, "forks": 104, - "watchers": 256, + "watchers": 255, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 141b96c979..55ed27d644 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-27T08:01:19Z", + "updated_at": "2021-08-29T10:17:11Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1156, - "watchers_count": 1156, + "stargazers_count": 1155, + "watchers_count": 1155, "forks_count": 255, "forks": 255, - "watchers": 1156, + "watchers": 1155, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index fde5882914..3fe34305b8 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -59,13 +59,13 @@ "description": "Exploit written in Python for CVE-2018-15473 with threading and export formats", "fork": false, "created_at": "2018-08-21T00:09:56Z", - "updated_at": "2021-08-25T18:46:02Z", + "updated_at": "2021-08-29T09:30:45Z", "pushed_at": "2020-08-18T00:00:15Z", - "stargazers_count": 462, - "watchers_count": 462, + "stargazers_count": 463, + "watchers_count": 463, "forks_count": 163, "forks": 163, - "watchers": 462, + "watchers": 463, "score": 0 }, { diff --git a/2018/CVE-2018-15961.json b/2018/CVE-2018-15961.json index 72f51bd86e..953da7fece 100644 --- a/2018/CVE-2018-15961.json +++ b/2018/CVE-2018-15961.json @@ -36,13 +36,13 @@ "description": "cve-2018-15961", "fork": false, "created_at": "2019-01-21T18:15:17Z", - "updated_at": "2021-04-15T22:50:11Z", + "updated_at": "2021-08-29T09:20:35Z", "pushed_at": "2021-04-15T22:50:09Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 382d7fcc75..6cc96d6950 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-27T08:01:19Z", + "updated_at": "2021-08-29T10:17:11Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1156, - "watchers_count": 1156, + "stargazers_count": 1155, + "watchers_count": 1155, "forks_count": 255, "forks": 255, - "watchers": 1156, + "watchers": 1155, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 592187c679..dfc1248126 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-08-29T03:35:33Z", + "updated_at": "2021-08-29T10:17:19Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 442, + "watchers_count": 442, "forks_count": 107, "forks": 107, - "watchers": 443, + "watchers": 442, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-6574.json b/2018/CVE-2018-6574.json index 9b64e50303..1a5372da8c 100644 --- a/2018/CVE-2018-6574.json +++ b/2018/CVE-2018-6574.json @@ -496,13 +496,13 @@ "description": null, "fork": false, "created_at": "2019-12-02T05:40:07Z", - "updated_at": "2019-12-02T07:37:23Z", + "updated_at": "2021-08-29T10:00:31Z", "pushed_at": "2019-12-02T07:37:21Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2018/CVE-2018-7750.json b/2018/CVE-2018-7750.json index cab1dc65d7..64a6745726 100644 --- a/2018/CVE-2018-7750.json +++ b/2018/CVE-2018-7750.json @@ -17,8 +17,8 @@ "pushed_at": "2018-11-06T10:10:31Z", "stargazers_count": 17, "watchers_count": 17, - "forks_count": 8, - "forks": 8, + "forks_count": 9, + "forks": 9, "watchers": 17, "score": 0 } diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index e5a83129f1..cfe0f256f9 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -17,8 +17,8 @@ "pushed_at": "2019-05-15T14:23:11Z", "stargazers_count": 43, "watchers_count": 43, - "forks_count": 15, - "forks": 15, + "forks_count": 16, + "forks": 16, "watchers": 43, "score": 0 }, @@ -1029,8 +1029,8 @@ "pushed_at": "2020-12-06T04:48:38Z", "stargazers_count": 1157, "watchers_count": 1157, - "forks_count": 401, - "forks": 401, + "forks_count": 402, + "forks": 402, "watchers": 1157, "score": 0 }, @@ -2405,13 +2405,13 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2021-08-19T08:13:26Z", + "updated_at": "2021-08-29T10:05:46Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 221, - "watchers_count": 221, + "stargazers_count": 220, + "watchers_count": 220, "forks_count": 57, "forks": 57, - "watchers": 221, + "watchers": 220, "score": 0 }, { diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index df17268b75..c7c4968778 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -13,13 +13,13 @@ "description": "CVE-2019-1040 with Exchange", "fork": false, "created_at": "2019-06-14T11:16:03Z", - "updated_at": "2021-08-23T18:15:59Z", + "updated_at": "2021-08-29T09:25:03Z", "pushed_at": "2021-06-18T18:43:46Z", - "stargazers_count": 199, - "watchers_count": 199, + "stargazers_count": 198, + "watchers_count": 198, "forks_count": 60, "forks": 60, - "watchers": 199, + "watchers": 198, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "an impacket-dependent script exploiting CVE-2019-1040", "fork": false, "created_at": "2021-01-01T05:59:06Z", - "updated_at": "2021-08-17T10:06:58Z", + "updated_at": "2021-08-29T11:14:54Z", "pushed_at": "2021-01-01T06:10:58Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 66, + "watchers_count": 66, "forks_count": 11, "forks": 11, - "watchers": 67, + "watchers": 66, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json index 79dcf51628..0a8cfef1a3 100644 --- a/2019/CVE-2019-11358.json +++ b/2019/CVE-2019-11358.json @@ -13,7 +13,7 @@ "description": "patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428", "fork": false, "created_at": "2019-03-30T10:03:36Z", - "updated_at": "2020-06-08T19:41:31Z", + "updated_at": "2021-08-29T10:30:54Z", "pushed_at": "2020-05-05T23:33:21Z", "stargazers_count": 21, "watchers_count": 21, @@ -59,7 +59,7 @@ "description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428", "fork": false, "created_at": "2020-04-14T19:12:01Z", - "updated_at": "2021-05-26T09:28:20Z", + "updated_at": "2021-08-29T10:31:11Z", "pushed_at": "2020-05-05T23:34:04Z", "stargazers_count": 12, "watchers_count": 12, diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json index b43967fdc9..c3ea9817e1 100644 --- a/2019/CVE-2019-15126.json +++ b/2019/CVE-2019-15126.json @@ -36,13 +36,13 @@ "description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability", "fork": false, "created_at": "2020-03-13T14:53:54Z", - "updated_at": "2021-08-21T18:10:07Z", + "updated_at": "2021-08-29T15:09:21Z", "pushed_at": "2020-03-22T19:46:04Z", - "stargazers_count": 195, - "watchers_count": 195, - "forks_count": 61, - "forks": 61, - "watchers": 195, + "stargazers_count": 196, + "watchers_count": 196, + "forks_count": 62, + "forks": 62, + "watchers": 196, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index ffb6367e1d..81a13a091b 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-08-28T19:43:32Z", + "updated_at": "2021-08-29T12:40:17Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2816, - "watchers_count": 2816, + "stargazers_count": 2817, + "watchers_count": 2817, "forks_count": 815, "forks": 815, - "watchers": 2816, + "watchers": 2817, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index ef559292df..f4e3840fe0 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-27T08:01:19Z", + "updated_at": "2021-08-29T10:17:11Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1156, - "watchers_count": 1156, + "stargazers_count": 1155, + "watchers_count": 1155, "forks_count": 255, "forks": 255, - "watchers": 1156, + "watchers": 1155, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index f6607a6cfe..9006fe03d4 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,13 +13,13 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2021-08-04T15:24:41Z", + "updated_at": "2021-08-29T10:12:33Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 551, - "watchers_count": 551, + "stargazers_count": 550, + "watchers_count": 550, "forks_count": 136, "forks": 136, - "watchers": 551, + "watchers": 550, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index e7f07c807c..8e59f0a9a5 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -841,13 +841,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-08-29T07:35:49Z", + "updated_at": "2021-08-29T12:44:45Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1142, - "watchers_count": 1142, + "stargazers_count": 1143, + "watchers_count": 1143, "forks_count": 358, "forks": 358, - "watchers": 1142, + "watchers": 1143, "score": 0 }, { diff --git a/2020/CVE-2020-1102.json b/2020/CVE-2020-1102.json index 357254ce40..822ff00cf2 100644 --- a/2020/CVE-2020-1102.json +++ b/2020/CVE-2020-1102.json @@ -13,7 +13,7 @@ "description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428", "fork": false, "created_at": "2020-04-14T19:12:01Z", - "updated_at": "2021-05-26T09:28:20Z", + "updated_at": "2021-08-29T10:31:11Z", "pushed_at": "2020-05-05T23:34:04Z", "stargazers_count": 12, "watchers_count": 12, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index cef4457801..9422059d3e 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -82,13 +82,13 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2021-08-27T08:14:21Z", + "updated_at": "2021-08-29T14:04:17Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 850, - "watchers_count": 850, + "stargazers_count": 851, + "watchers_count": 851, "forks_count": 235, "forks": 235, - "watchers": 850, + "watchers": 851, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2021-08-27T05:57:12Z", + "updated_at": "2021-08-29T12:22:38Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 267, - "watchers_count": 267, - "forks_count": 47, - "forks": 47, - "watchers": 267, + "stargazers_count": 268, + "watchers_count": 268, + "forks_count": 48, + "forks": 48, + "watchers": 268, "score": 0 }, { @@ -266,13 +266,13 @@ "description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器", "fork": false, "created_at": "2020-09-15T16:10:21Z", - "updated_at": "2021-07-27T15:37:33Z", + "updated_at": "2021-08-29T10:07:55Z", "pushed_at": "2020-09-15T16:40:53Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 52, + "watchers_count": 52, "forks_count": 17, "forks": 17, - "watchers": 53, + "watchers": 52, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 476e5c48a0..db4f7412c9 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-08-28T19:43:32Z", + "updated_at": "2021-08-29T12:40:17Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2816, - "watchers_count": 2816, + "stargazers_count": 2817, + "watchers_count": 2817, "forks_count": 815, "forks": 815, - "watchers": 2816, + "watchers": 2817, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 29dad22184..db8f1de49a 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-08-27T01:38:35Z", + "updated_at": "2021-08-29T09:23:28Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 842, - "watchers_count": 842, + "stargazers_count": 841, + "watchers_count": 841, "forks_count": 265, "forks": 265, - "watchers": 842, + "watchers": 841, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17144.json b/2020/CVE-2020-17144.json index 69b6d25542..a80d2ee222 100644 --- a/2020/CVE-2020-17144.json +++ b/2020/CVE-2020-17144.json @@ -13,13 +13,13 @@ "description": "Exchange2010 authorized RCE", "fork": false, "created_at": "2020-12-09T10:30:16Z", - "updated_at": "2021-08-10T04:35:00Z", + "updated_at": "2021-08-29T09:59:26Z", "pushed_at": "2020-12-24T08:11:51Z", - "stargazers_count": 142, - "watchers_count": 142, + "stargazers_count": 141, + "watchers_count": 141, "forks_count": 38, "forks": 38, - "watchers": 142, + "watchers": 141, "score": 0 }, { diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 91660014ec..4c43efbaae 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -13,13 +13,13 @@ "description": "CVE-2020-1938", "fork": false, "created_at": "2020-02-20T16:32:52Z", - "updated_at": "2021-08-24T11:10:49Z", + "updated_at": "2021-08-29T14:43:04Z", "pushed_at": "2020-02-25T02:04:16Z", - "stargazers_count": 233, - "watchers_count": 233, + "stargazers_count": 234, + "watchers_count": 234, "forks_count": 97, "forks": 97, - "watchers": 233, + "watchers": 234, "score": 0 }, { @@ -82,13 +82,13 @@ "description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool", "fork": false, "created_at": "2020-02-20T21:00:15Z", - "updated_at": "2021-08-18T14:18:15Z", + "updated_at": "2021-08-29T14:43:08Z", "pushed_at": "2021-04-20T10:12:22Z", - "stargazers_count": 232, - "watchers_count": 232, + "stargazers_count": 233, + "watchers_count": 233, "forks_count": 98, "forks": 98, - "watchers": 232, + "watchers": 233, "score": 0 }, { diff --git a/2020/CVE-2020-25223.json b/2020/CVE-2020-25223.json new file mode 100644 index 0000000000..184ceec703 --- /dev/null +++ b/2020/CVE-2020-25223.json @@ -0,0 +1,25 @@ +[ + { + "id": 401020789, + "name": "sophucked", + "full_name": "darrenmartyn\/sophucked", + "owner": { + "login": "darrenmartyn", + "id": 49643587, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49643587?v=4", + "html_url": "https:\/\/github.com\/darrenmartyn" + }, + "html_url": "https:\/\/github.com\/darrenmartyn\/sophucked", + "description": "CVE-2020-25223", + "fork": false, + "created_at": "2021-08-29T11:08:53Z", + "updated_at": "2021-08-29T11:48:15Z", + "pushed_at": "2021-08-29T11:48:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index d398cfb615..934551d0f2 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-27T08:01:19Z", + "updated_at": "2021-08-29T10:17:11Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1156, - "watchers_count": 1156, + "stargazers_count": 1155, + "watchers_count": 1155, "forks_count": 255, "forks": 255, - "watchers": 1156, + "watchers": 1155, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Weblogic IIOP CVE-2020-2551", "fork": false, "created_at": "2020-02-28T08:46:21Z", - "updated_at": "2021-08-24T06:19:47Z", + "updated_at": "2021-08-29T10:17:10Z", "pushed_at": "2020-04-07T03:32:24Z", - "stargazers_count": 272, - "watchers_count": 272, + "stargazers_count": 271, + "watchers_count": 271, "forks_count": 73, "forks": 73, - "watchers": 272, + "watchers": 271, "score": 0 }, { diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index c77d30927b..55a6cc66c6 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -40,8 +40,8 @@ "pushed_at": "2021-07-20T15:28:13Z", "stargazers_count": 1336, "watchers_count": 1336, - "forks_count": 480, - "forks": 480, + "forks_count": 481, + "forks": 481, "watchers": 1336, "score": 0 }, diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 0cab11d9c5..8514269841 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -13,13 +13,13 @@ "description": "This is a Poc for BIGIP iControl unauth RCE ", "fork": false, "created_at": "2021-03-17T05:02:45Z", - "updated_at": "2021-07-01T19:39:28Z", + "updated_at": "2021-08-29T11:49:59Z", "pushed_at": "2021-03-17T05:10:03Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "forks_count": 9, "forks": 9, - "watchers": 49, + "watchers": 50, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 0a42b95442..5a78147d14 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-08-27T01:38:35Z", + "updated_at": "2021-08-29T09:23:28Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 842, - "watchers_count": 842, + "stargazers_count": 841, + "watchers_count": 841, "forks_count": 265, "forks": 265, - "watchers": 842, + "watchers": 841, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 97c8a1b925..67876f8427 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -841,13 +841,13 @@ "description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ", "fork": false, "created_at": "2021-03-29T21:10:34Z", - "updated_at": "2021-08-28T08:26:21Z", + "updated_at": "2021-08-29T14:21:43Z", "pushed_at": "2021-03-31T11:57:38Z", - "stargazers_count": 199, - "watchers_count": 199, + "stargazers_count": 200, + "watchers_count": 200, "forks_count": 31, "forks": 31, - "watchers": 199, + "watchers": 200, "score": 0 }, { diff --git a/2021/CVE-2021-26857.json b/2021/CVE-2021-26857.json index e18cffe53e..3c30748614 100644 --- a/2021/CVE-2021-26857.json +++ b/2021/CVE-2021-26857.json @@ -13,13 +13,13 @@ "description": "proxylogon exploit - CVE-2021-26857", "fork": false, "created_at": "2021-03-11T17:32:32Z", - "updated_at": "2021-07-22T07:52:32Z", + "updated_at": "2021-08-29T11:54:03Z", "pushed_at": "2021-03-11T17:34:15Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 101, + "watchers_count": 101, "forks_count": 35, "forks": 35, - "watchers": 100, + "watchers": 101, "score": 0 }, { diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index 2b0dd29c02..fcfb7031a7 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -13,13 +13,13 @@ "description": "WordPress - Authenticated XXE (CVE-2021-29447)", "fork": false, "created_at": "2021-04-16T20:41:26Z", - "updated_at": "2021-08-28T12:10:48Z", + "updated_at": "2021-08-29T13:09:33Z", "pushed_at": "2021-07-01T08:14:06Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 5, "forks": 5, - "watchers": 19, + "watchers": 20, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 1a72ccadff..782dfde63c 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -13,13 +13,13 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2021-08-29T02:08:41Z", + "updated_at": "2021-08-29T13:21:45Z", "pushed_at": "2021-01-29T13:59:07Z", - "stargazers_count": 136, - "watchers_count": 136, + "stargazers_count": 137, + "watchers_count": 137, "forks_count": 33, "forks": 33, - "watchers": 136, + "watchers": 137, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-27T10:16:35Z", - "updated_at": "2021-08-29T07:56:40Z", + "updated_at": "2021-08-29T12:47:51Z", "pushed_at": "2021-03-07T04:39:58Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 3, "forks": 3, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index b4dc0b1bb0..f673a7cd30 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -887,13 +887,13 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2021-08-27T22:54:46Z", + "updated_at": "2021-08-29T11:42:41Z", "pushed_at": "2021-07-23T15:46:37Z", - "stargazers_count": 366, - "watchers_count": 366, + "stargazers_count": 367, + "watchers_count": 367, "forks_count": 77, "forks": 77, - "watchers": 366, + "watchers": 367, "score": 0 }, { diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index fb1cfdb31e..342ff0230f 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -63,8 +63,8 @@ "pushed_at": "2021-07-02T12:17:50Z", "stargazers_count": 121, "watchers_count": 121, - "forks_count": 29, - "forks": 29, + "forks_count": 30, + "forks": 30, "watchers": 121, "score": 0 }, @@ -220,7 +220,7 @@ "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "fork": false, "created_at": "2021-07-05T20:13:49Z", - "updated_at": "2021-08-28T13:44:44Z", + "updated_at": "2021-08-29T11:35:14Z", "pushed_at": "2021-08-20T01:54:22Z", "stargazers_count": 628, "watchers_count": 628, diff --git a/2021/CVE-2021-36394.json b/2021/CVE-2021-36394.json index f52784035a..8483fd2014 100644 --- a/2021/CVE-2021-36394.json +++ b/2021/CVE-2021-36394.json @@ -13,8 +13,8 @@ "description": null, "fork": false, "created_at": "2021-08-28T04:21:44Z", - "updated_at": "2021-08-28T08:11:08Z", - "pushed_at": "2021-08-28T04:34:02Z", + "updated_at": "2021-08-29T14:06:31Z", + "pushed_at": "2021-08-29T14:06:28Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index a5e34a0a0a..7bd3dc8187 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -13,13 +13,13 @@ "description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation", "fork": false, "created_at": "2021-07-20T22:16:49Z", - "updated_at": "2021-08-25T03:15:21Z", + "updated_at": "2021-08-29T11:33:25Z", "pushed_at": "2021-08-01T22:22:15Z", - "stargazers_count": 175, - "watchers_count": 175, + "stargazers_count": 176, + "watchers_count": 176, "forks_count": 36, "forks": 36, - "watchers": 175, + "watchers": 176, "score": 0 }, { diff --git a/README.md b/README.md index b62ee8126b..06a709f609 100644 --- a/README.md +++ b/README.md @@ -5689,6 +5689,14 @@ The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote - [k0rup710n/Wordpress-CVE-2020-25213](https://github.com/k0rup710n/Wordpress-CVE-2020-25213) - [piruprohacking/CVE-2020-25213](https://github.com/piruprohacking/CVE-2020-25213) +### CVE-2020-25223 (2020-09-24) + + +A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11 + + +- [darrenmartyn/sophucked](https://github.com/darrenmartyn/sophucked) + ### CVE-2020-25265 (2020-12-02)