forked from vulscanteam/vulscan
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathupdata.json
1 lines (1 loc) · 7.82 KB
/
updata.json
1
[{"vulDate": "2017-02-21", "desc": "\n redis\u672a\u6388\u6743\u6f0f\u6d1e\n ", "name": "redis Unauthorized access", "vulID": "1"}, {"vulDate": "2017-04-06", "desc": "\n Docker \u672a\u6388\u6743\u6f0f\u6d1e\n ", "name": "Docker Unauthorized access", "vulID": "10"}, {"vulDate": "2017-06-26", "desc": "\n \u654f\u611f\u6587\u4ef6\u6cc4\u6f0f\u6f0f\u6d1e\n ", "name": "Sensitive file info", "vulID": "11"}, {"vulDate": "2017-06-26", "desc": "\n \u76ee\u5f55\u5217\u8868\u6f0f\u6d1e\n ", "name": "Parent Directory info", "vulID": "12"}, {"vulDate": "2017-06-29", "desc": "\n Jboss \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\n ", "name": "JBoss serialization getshell", "vulID": "13"}, {"vulDate": "2017-06-30", "desc": "\n weblogic \u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\n ", "name": "weblogic serialization getshell", "vulID": "14"}, {"vulDate": "2017-07-11", "desc": "\n iis6.0 PUT\u5199\u6587\u4ef6\u6f0f\u6d1e\n ", "name": "iis webdav PUT getshell", "vulID": "15"}, {"vulDate": "2017-11-14", "desc": "\n Typecho install.php\u53cd\u5e8f\u5217\u5316\u6f0f\u6d1e\n ", "name": "Typecho install.php Unserialize", "vulID": "16"}, {"vulDate": "2017-10-27", "desc": "\n CVE-2017-12617 tomcat PUT \u6f0f\u6d1e\uff1b\n ", "name": "tomcat Unauthorized PUT", "vulID": "18"}, {"vulDate": "2017-12-12", "desc": "\n everything\u654f\u611f\u6587\u4ef6\u6f0f\u6d1e\n ", "name": "Everything Directory list", "vulID": "19"}, {"vulDate": "2017-02-22", "desc": "\n Mongodb\u672a\u6388\u6743\u6f0f\u6d1e\n ", "name": "Mongodb Unauthorized access", "vulID": "2"}, {"vulDate": "2014-04-01", "desc": "\n openSSL\u5fc3\u810f\u6ef4\u8840\u6f0f\u6d1e\n ", "name": "opssl Heart-Blood", "vulID": "20"}, {"vulDate": "2017-12-12", "desc": "\n memcached\u672a\u6388\u6743\u6f0f\u6d1e\n ", "name": "memcached Unauthorized access", "vulID": "21"}, {"vulDate": "2017-02-21", "desc": "\n Elasticsearch\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\n ", "name": "Elasticsearch Unauthorized Access", "vulID": "22"}, {"vulDate": "2018-05-09", "desc": "\n jenkins\u672a\u6388\u6743\u6f0f\u6d1e\n ", "name": "jenkins Unauthorized access", "vulID": "23"}, {"vulDate": "2018-05-07", "desc": "\n Host\u5934\u6ce8\u5165\u6f0f\u6d1e\n ", "name": "http header Injection", "vulID": "25"}, {"vulDate": "2018-05-11", "desc": "\n CouchDB \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\n ", "name": "CouchDB Unauthorized access", "vulID": "26"}, {"vulDate": "2018-05-11", "desc": "\n ZooKeeper \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\n ", "name": "ZooKeeper Unauthorized access", "vulID": "27"}, {"vulDate": "2018-05-11", "desc": "\n Hadoop \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\n ", "name": "Hadoop Unauthorized Access", "vulID": "28"}, {"vulDate": "2018-05-15", "desc": "\n Postgresql \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\n ", "name": "Postgresql Unauthorized access & Weak-Password", "vulID": "29"}, {"vulDate": "2017-02-28", "desc": "\n Tomcat CVE-2016-8735 \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\n ", "name": "Tomcat CVE-2016-8735 Command execution", "vulID": "3"}, {"vulDate": "2018-05-15", "desc": "\n rsync \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\n ", "name": "rsync Unauthorized access", "vulID": "30"}, {"vulDate": "2018-05-16", "desc": "\n Dubbo \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\n ", "name": "Dubbo Unauthorized Access", "vulID": "31"}, {"vulDate": "2018-06-05", "desc": "\n ActiveMQ \u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\n ", "name": "ActiveMQ Unauthorized access", "vulID": "32"}, {"vulDate": "2018-05-22", "desc": "\n ftp \u5b58\u5728\u5f31\u53e3\u4ee4\n ", "name": "ftp Unauthorized access", "vulID": "33"}, {"vulDate": "2018-05-17", "desc": "\n tomcat weakpass\n ", "name": "tomcat weakpass", "vulID": "34"}, {"vulDate": "2018-05-22", "desc": "\n ssh \u5b58\u5728\u5f31\u53e3\u4ee4\n ", "name": "ssh Unauthorized access", "vulID": "35"}, {"vulDate": "2018-06-7", "desc": "\n \u6c38\u6052\u4e4b\u84dd\n ", "name": "smb os injection", "vulID": "36"}, {"vulDate": "2018-06-05", "desc": "\n HTTP CORS \u8de8\u57df\n ", "name": "CORS", "vulID": "37"}, {"vulDate": "2018-06-8", "desc": "\n mysql \u5f31\u53e3\u4ee4\n ", "name": "mysql weak pass", "vulID": "38"}, {"vulDate": "2018-07-9", "desc": "\n fastcgi read file vulnerability\uff0cfastcgi \u5c1d\u8bd5\u8bfb\u6587\u4ef6\uff0c\u8be5\u6f0f\u6d1e\u53ef\u6267\u884c\u547d\u4ee4\n ", "name": "fastcgi read file vulnerability", "vulID": "39"}, {"vulDate": "2017-03-01", "desc": "\n Thinkphp\u6b63\u5219-e\u6a21\u5f0f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\n ", "name": "Thinkphp Command execution", "vulID": "4"}, {"vulDate": "2018-07-10", "desc": "\n crossdomain.xml CORS \u8de8\u57df\n ", "name": "crossdomain-cors", "vulID": "40"}, {"vulDate": "2018-07-20", "desc": "\n webLogic-CVE-2018-2894 getshell\n ", "name": "webLogic file upload", "vulID": "41"}, {"vulDate": "2018-07-24", "desc": "\n Tomcat uploadfile vulnerability\uff0cCVE-2017-12615\n ", "name": "Tomcat uploadfile vulnerability", "vulID": "42"}, {"vulDate": "2018-07-26", "desc": "\n Jenkins\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\n ", "name": "Jenkins arbitrary file read", "vulID": "43"}, {"vulDate": "2018-08-03", "desc": "\n DNS \u57df\u4f20\u9001\u6f0f\u6d1e\n ", "name": "Domain transfer ", "vulID": "44"}, {"vulDate": "2018-08-16", "desc": "\n IIS 6.0 webdav RCE\uff0cCVE-2017-7269\n ", "name": "CVE-2017-7269", "vulID": "45"}, {"vulDate": "2018-07-24", "desc": "\n webLogic-CVE-2017-3248 RCE\n ", "name": "webLogic Remote code execution", "vulID": "47"}, {"vulDate": "2018-07-24", "desc": "\n webLogic-CVE-2017-2628 RCE\n ", "name": "webLogic Remote code execution CVE-2017-2628", "vulID": "48"}, {"vulDate": "2018-08-20", "desc": "\n Nginx \u6574\u6570\u6ea2\u51fa\n ", "name": "Nginx Remote Integer Overflow Vulnerability", "vulID": "49"}, {"vulDate": "2017-03-07", "desc": "\n Struts \u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\n ", "name": "Strust2 Coder execution", "vulID": "5"}, {"vulDate": "2018-08-21", "desc": "\n metinfo 6.0.0 \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\n ", "name": "metinfo 6.0.0 any file read", "vulID": "50"}, {"vulDate": "2018-08-23", "desc": "\n Ueditor .net\u4efb\u610f\u6587\u4ef6\u4e0a\u4f20\u5bfc\u81f4getshell\n ", "name": "Ueditor .net upload", "vulID": "51"}, {"vulDate": "2018-08-24", "desc": "\n ssh \u7528\u6237\u679a\u4e3e cve-2018-15473\n ", "name": "ssh username enumeration", "vulID": "52"}, {"vulDate": "2018-08-17", "desc": "\n CVE-2017-2893\n java -cp ysoserial-0.0.6-SNAPSHOT-BETA-all.jar ysoserial.exploit.JRMPListener 1099 JDK7u10 'ping -c 2 rce.t00ls.7272e87394b4f7c0088c966cba58c1dd.tu4.org'\n ", "name": "webLogic Remote code execution CVE-2018-2893", "vulID": "53"}, {"vulDate": "2018-09-18", "desc": "\n MS15-034 HTTP.sys \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\uff08CVE-2015-1635\uff09\u76ee\u524d\u4ec5\u80fd\u4f5c\u4e3aDOS\u653b\u51fb\n ", "name": "HTTP.sys RCE(only DOS) CVE-2015-1635", "vulID": "54"}, {"vulDate": "2018-12-11", "desc": "\n thinkphp getshell\n ", "name": "thinkphp getshell", "vulID": "55"}, {"vulDate": "2017-03-13", "desc": "\n Fckeditor\u4e0a\u4f20\u89e3\u6790\u6f0f\u6d1e \n ", "name": "Fckeditor info", "vulID": "6"}, {"vulDate": "2017-03-22", "desc": "\n Solr \u672a\u6388\u6743\u6f0f\u6d1e\n ", "name": "Solr Unauthorized access", "vulID": "7"}, {"vulDate": "2017-03-22", "desc": "\n Druid \u672a\u6388\u6743\u6f0f\u6d1e\n ", "name": "Druid Unauthorized access", "vulID": "8"}, {"vulDate": "2017-03-22", "desc": "\n Zabbix SQL\u6ce8\u5165\u6f0f\u6d1e\n ", "name": "Zabbix SQL Injection", "vulID": "9"}]