diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 231a5a4bb9..967b97e032 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -36,7 +36,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-03T08:23:15Z", + "updated_at": "2021-08-03T11:45:53Z", "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1132, "watchers_count": 1132, diff --git a/2014/CVE-2014-8757.json b/2014/CVE-2014-8757.json index 2b0d2c57c6..e510f60dfe 100644 --- a/2014/CVE-2014-8757.json +++ b/2014/CVE-2014-8757.json @@ -17,8 +17,8 @@ "pushed_at": "2015-02-06T07:55:13Z", "stargazers_count": 13, "watchers_count": 13, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 13, "score": 0 } diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 29e802162b..7b4578ff92 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,7 +13,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-03T08:23:15Z", + "updated_at": "2021-08-03T11:45:53Z", "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1132, "watchers_count": 1132, diff --git a/2016/CVE-2016-8740.json b/2016/CVE-2016-8740.json index 5e9cbfbaad..4a83728ebb 100644 --- a/2016/CVE-2016-8740.json +++ b/2016/CVE-2016-8740.json @@ -21,5 +21,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 392282260, + "name": "apachedos", + "full_name": "jptr218\/apachedos", + "owner": { + "login": "jptr218", + "id": 84092766, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4", + "html_url": "https:\/\/github.com\/jptr218" + }, + "html_url": "https:\/\/github.com\/jptr218\/apachedos", + "description": "An implementation of CVE-2016-8740", + "fork": false, + "created_at": "2021-08-03T10:45:59Z", + "updated_at": "2021-08-03T10:51:09Z", + "pushed_at": "2021-08-03T10:50:17Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index f65dee8269..0ee91ac6ba 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -59,13 +59,13 @@ "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "fork": false, "created_at": "2017-04-17T08:10:07Z", - "updated_at": "2021-08-02T14:41:15Z", + "updated_at": "2021-08-03T12:54:55Z", "pushed_at": "2017-11-19T11:01:16Z", - "stargazers_count": 660, - "watchers_count": 660, + "stargazers_count": 661, + "watchers_count": 661, "forks_count": 289, "forks": 289, - "watchers": 660, + "watchers": 661, "score": 0 }, { diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 9a8ab1be78..f51d7203ef 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -289,13 +289,13 @@ "description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)", "fork": false, "created_at": "2018-01-11T09:43:46Z", - "updated_at": "2021-07-27T06:12:46Z", + "updated_at": "2021-08-03T12:01:33Z", "pushed_at": "2018-02-28T12:32:54Z", - "stargazers_count": 270, - "watchers_count": 270, + "stargazers_count": 269, + "watchers_count": 269, "forks_count": 136, "forks": 136, - "watchers": 270, + "watchers": 269, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index a76f42626e..57eface1d6 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,7 +36,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-03T08:23:15Z", + "updated_at": "2021-08-03T11:45:53Z", "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1132, "watchers_count": 1132, diff --git a/2017/CVE-2017-9841.json b/2017/CVE-2017-9841.json index 6cbc55db70..04ac0b44f5 100644 --- a/2017/CVE-2017-9841.json +++ b/2017/CVE-2017-9841.json @@ -40,8 +40,8 @@ "pushed_at": "2020-11-17T17:58:39Z", "stargazers_count": 19, "watchers_count": 19, - "forks_count": 18, - "forks": 18, + "forks_count": 19, + "forks": 19, "watchers": 19, "score": 0 }, diff --git a/2018/CVE-2018-0802.json b/2018/CVE-2018-0802.json index 090289ad6a..d868ee119d 100644 --- a/2018/CVE-2018-0802.json +++ b/2018/CVE-2018-0802.json @@ -36,13 +36,13 @@ "description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)", "fork": false, "created_at": "2018-01-11T09:43:46Z", - "updated_at": "2021-07-27T06:12:46Z", + "updated_at": "2021-08-03T12:01:33Z", "pushed_at": "2018-02-28T12:32:54Z", - "stargazers_count": 270, - "watchers_count": 270, + "stargazers_count": 269, + "watchers_count": 269, "forks_count": 136, "forks": 136, - "watchers": 270, + "watchers": 269, "score": 0 }, { diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index c731fe13bd..eb76f20fc2 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -82,13 +82,13 @@ "description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473", "fork": false, "created_at": "2018-10-03T10:18:04Z", - "updated_at": "2021-06-08T21:39:12Z", + "updated_at": "2021-08-03T13:23:56Z", "pushed_at": "2019-03-24T11:20:27Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 10, "forks": 10, - "watchers": 19, + "watchers": 20, "score": 0 }, { diff --git a/2018/CVE-2018-20250.json b/2018/CVE-2018-20250.json index 5f70fe7fa3..7d54d66833 100644 --- a/2018/CVE-2018-20250.json +++ b/2018/CVE-2018-20250.json @@ -13,13 +13,13 @@ "description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar", "fork": false, "created_at": "2019-02-22T04:52:08Z", - "updated_at": "2021-07-27T11:25:52Z", + "updated_at": "2021-08-03T12:55:32Z", "pushed_at": "2019-08-05T10:45:34Z", - "stargazers_count": 453, - "watchers_count": 453, + "stargazers_count": 454, + "watchers_count": 454, "forks_count": 182, "forks": 182, - "watchers": 453, + "watchers": 454, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index d55bf8b461..33b193f7fe 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,7 +450,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-03T08:23:15Z", + "updated_at": "2021-08-03T11:45:53Z", "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1132, "watchers_count": 1132, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 86f954f4e6..95a0aa6202 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -105,13 +105,13 @@ "description": "Using CVE-2019-0708 to Locally Promote Privileges in Windows 10 System", "fork": false, "created_at": "2019-05-15T02:58:04Z", - "updated_at": "2021-05-27T12:12:13Z", + "updated_at": "2021-08-03T09:40:05Z", "pushed_at": "2019-05-15T02:51:24Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 35, "forks": 35, - "watchers": 28, + "watchers": 29, "score": 0 }, { @@ -1025,13 +1025,13 @@ "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", - "updated_at": "2021-08-03T08:39:58Z", + "updated_at": "2021-08-03T11:05:19Z", "pushed_at": "2020-12-06T04:48:38Z", - "stargazers_count": 1155, - "watchers_count": 1155, + "stargazers_count": 1156, + "watchers_count": 1156, "forks_count": 398, "forks": 398, - "watchers": 1155, + "watchers": 1156, "score": 0 }, { @@ -1236,8 +1236,8 @@ "pushed_at": "2019-06-22T21:48:45Z", "stargazers_count": 821, "watchers_count": 821, - "forks_count": 217, - "forks": 217, + "forks_count": 218, + "forks": 218, "watchers": 821, "score": 0 }, diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index 633229124e..d7e37d01d3 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -13,13 +13,13 @@ "description": "CVE-2019-1040 with Exchange", "fork": false, "created_at": "2019-06-14T11:16:03Z", - "updated_at": "2021-07-26T17:07:27Z", + "updated_at": "2021-08-03T13:01:56Z", "pushed_at": "2021-06-18T18:43:46Z", - "stargazers_count": 195, - "watchers_count": 195, + "stargazers_count": 196, + "watchers_count": 196, "forks_count": 58, "forks": 58, - "watchers": 195, + "watchers": 196, "score": 0 }, { diff --git a/2019/CVE-2019-15165.json b/2019/CVE-2019-15165.json deleted file mode 100644 index 0672c72880..0000000000 --- a/2019/CVE-2019-15165.json +++ /dev/null @@ -1,48 +0,0 @@ -[ - { - "id": 387706891, - "name": "libpcap-without-Fix-CVE-2019-15165", - "full_name": "madhans23\/libpcap-without-Fix-CVE-2019-15165", - "owner": { - "login": "madhans23", - "id": 87687132, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87687132?v=4", - "html_url": "https:\/\/github.com\/madhans23" - }, - "html_url": "https:\/\/github.com\/madhans23\/libpcap-without-Fix-CVE-2019-15165", - "description": null, - "fork": false, - "created_at": "2021-07-20T07:18:17Z", - "updated_at": "2021-07-20T07:26:44Z", - "pushed_at": "2021-07-20T07:26:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 387732129, - "name": "libpcap-with-Fix-CVE-2019-15165", - "full_name": "madhans23\/libpcap-with-Fix-CVE-2019-15165", - "owner": { - "login": "madhans23", - "id": 87687132, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87687132?v=4", - "html_url": "https:\/\/github.com\/madhans23" - }, - "html_url": "https:\/\/github.com\/madhans23\/libpcap-with-Fix-CVE-2019-15165", - "description": null, - "fork": false, - "created_at": "2021-07-20T08:57:09Z", - "updated_at": "2021-07-20T09:03:00Z", - "pushed_at": "2021-07-20T09:03:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index fb52131958..84e3b1170c 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-08-03T01:40:18Z", + "updated_at": "2021-08-03T09:44:13Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2727, - "watchers_count": 2727, + "stargazers_count": 2728, + "watchers_count": 2728, "forks_count": 796, "forks": 796, - "watchers": 2727, + "watchers": 2728, "score": 0 }, { diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index f488d114d1..75537a8efc 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -151,8 +151,8 @@ "description": "My n-day exploit for CVE-2019-18634 (local privilege escalation)", "fork": false, "created_at": "2021-08-01T10:50:55Z", - "updated_at": "2021-08-02T16:53:17Z", - "pushed_at": "2021-08-02T14:13:51Z", + "updated_at": "2021-08-03T11:19:24Z", + "pushed_at": "2021-08-03T11:19:21Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index de87ff4fb1..5990c12811 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -151,13 +151,13 @@ "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "fork": false, "created_at": "2020-01-11T09:49:17Z", - "updated_at": "2021-07-21T19:46:37Z", + "updated_at": "2021-08-03T12:19:16Z", "pushed_at": "2021-01-24T20:18:04Z", - "stargazers_count": 127, - "watchers_count": 127, + "stargazers_count": 128, + "watchers_count": 128, "forks_count": 36, "forks": 36, - "watchers": 127, + "watchers": 128, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index f75d94f95b..a6511d8a95 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2021-07-27T06:39:30Z", + "updated_at": "2021-08-03T11:41:34Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 776, - "watchers_count": 776, - "forks_count": 164, - "forks": 164, - "watchers": 776, + "stargazers_count": 778, + "watchers_count": 778, + "forks_count": 165, + "forks": 165, + "watchers": 778, "score": 0 }, { @@ -151,7 +151,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-03T08:23:15Z", + "updated_at": "2021-08-03T11:45:53Z", "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1132, "watchers_count": 1132, diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 8f711e4bca..a71e57a100 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -36,13 +36,13 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2021-07-26T17:07:01Z", + "updated_at": "2021-08-03T09:15:36Z", "pushed_at": "2019-02-19T11:45:13Z", - "stargazers_count": 526, - "watchers_count": 526, + "stargazers_count": 527, + "watchers_count": 527, "forks_count": 145, "forks": 145, - "watchers": 526, + "watchers": 527, "score": 0 }, { diff --git a/2020/CVE-2020-14321.json b/2020/CVE-2020-14321.json index c7962e9ca9..9d61e4f9ed 100644 --- a/2020/CVE-2020-14321.json +++ b/2020/CVE-2020-14321.json @@ -13,13 +13,13 @@ "description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE", "fork": false, "created_at": "2020-07-26T01:28:53Z", - "updated_at": "2021-07-28T20:25:28Z", + "updated_at": "2021-08-03T14:59:44Z", "pushed_at": "2021-08-01T12:25:59Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 27, + "watchers_count": 27, "forks_count": 6, "forks": 6, - "watchers": 25, + "watchers": 27, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 76b78f6e90..2ce2cf3bd5 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-08-03T01:40:18Z", + "updated_at": "2021-08-03T09:44:13Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2727, - "watchers_count": 2727, + "stargazers_count": 2728, + "watchers_count": 2728, "forks_count": 796, "forks": 796, - "watchers": 2727, + "watchers": 2728, "score": 0 }, { diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json index f8e8d04fc6..22d4405b5c 100644 --- a/2020/CVE-2020-17087.json +++ b/2020/CVE-2020-17087.json @@ -59,13 +59,13 @@ "description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow", "fork": false, "created_at": "2021-07-02T16:03:16Z", - "updated_at": "2021-08-03T09:15:43Z", + "updated_at": "2021-08-03T13:38:04Z", "pushed_at": "2021-08-02T05:12:17Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 78, + "watchers_count": 78, "forks_count": 23, "forks": 23, - "watchers": 76, + "watchers": 78, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 718bdd4507..10d64603ba 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,7 +13,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-08-03T08:23:15Z", + "updated_at": "2021-08-03T11:45:53Z", "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1132, "watchers_count": 1132, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 9c16094c86..d37ee90a07 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -59,13 +59,13 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2021-07-29T19:09:34Z", + "updated_at": "2021-08-03T10:50:46Z", "pushed_at": "2021-03-10T05:01:22Z", - "stargazers_count": 277, - "watchers_count": 277, + "stargazers_count": 278, + "watchers_count": 278, "forks_count": 103, "forks": 103, - "watchers": 277, + "watchers": 278, "score": 0 }, { diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index d455a90b7f..cc3fc665d9 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -105,8 +105,8 @@ "description": null, "fork": false, "created_at": "2021-08-02T18:56:16Z", - "updated_at": "2021-08-02T20:11:18Z", - "pushed_at": "2021-08-02T20:11:15Z", + "updated_at": "2021-08-03T15:01:28Z", + "pushed_at": "2021-08-03T15:01:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-2394.json b/2021/CVE-2021-2394.json index 8b6993cbdd..19f29d5d24 100644 --- a/2021/CVE-2021-2394.json +++ b/2021/CVE-2021-2394.json @@ -13,13 +13,13 @@ "description": "POC of CVE-2021-2394", "fork": false, "created_at": "2021-08-02T04:19:11Z", - "updated_at": "2021-08-03T07:31:13Z", + "updated_at": "2021-08-03T13:55:23Z", "pushed_at": "2021-08-02T02:47:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 16, - "forks": 16, - "watchers": 1, + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 17, + "forks": 17, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-24155.json b/2021/CVE-2021-24155.json index 2fba19d9d3..c5c91170d6 100644 --- a/2021/CVE-2021-24155.json +++ b/2021/CVE-2021-24155.json @@ -13,13 +13,13 @@ "description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit", "fork": false, "created_at": "2021-07-30T11:28:53Z", - "updated_at": "2021-08-03T02:28:30Z", + "updated_at": "2021-08-03T11:51:23Z", "pushed_at": "2021-07-30T11:35:54Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 2, "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 793782d98b..aaf3fdd530 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,13 +13,13 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2021-08-03T07:18:39Z", + "updated_at": "2021-08-03T10:13:44Z", "pushed_at": "2021-06-12T08:27:09Z", - "stargazers_count": 753, - "watchers_count": 753, + "stargazers_count": 754, + "watchers_count": 754, "forks_count": 125, "forks": 125, - "watchers": 753, + "watchers": 754, "score": 0 }, { diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json index 7dd3158f0c..219aee19f7 100644 --- a/2021/CVE-2021-3490.json +++ b/2021/CVE-2021-3490.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-06-24T18:50:17Z", - "updated_at": "2021-08-03T02:21:33Z", + "updated_at": "2021-08-03T13:04:12Z", "pushed_at": "2021-07-29T17:54:10Z", - "stargazers_count": 102, - "watchers_count": 102, + "stargazers_count": 105, + "watchers_count": 105, "forks_count": 27, "forks": 27, - "watchers": 102, + "watchers": 105, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3492.json b/2021/CVE-2021-3492.json index cd204560dc..4e635ca9cc 100644 --- a/2021/CVE-2021-3492.json +++ b/2021/CVE-2021-3492.json @@ -13,8 +13,8 @@ "description": "PoC for CVE-2021-3492 used at Pwn2Own 2021", "fork": false, "created_at": "2021-06-28T09:43:31Z", - "updated_at": "2021-08-03T00:38:43Z", - "pushed_at": "2021-06-28T09:55:57Z", + "updated_at": "2021-08-03T14:48:30Z", + "pushed_at": "2021-08-03T14:48:27Z", "stargazers_count": 19, "watchers_count": 19, "forks_count": 2, diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index bf3f80288d..48dd9033cb 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -243,13 +243,13 @@ "description": "Polkit D-Bus Authentication Bypass Exploit", "fork": false, "created_at": "2021-07-30T11:41:34Z", - "updated_at": "2021-08-01T14:51:33Z", + "updated_at": "2021-08-03T11:51:20Z", "pushed_at": "2021-07-30T11:43:32Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index c8e6142d00..cc62a636a9 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -13,13 +13,13 @@ "description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation", "fork": false, "created_at": "2021-07-20T22:16:49Z", - "updated_at": "2021-08-03T03:27:56Z", + "updated_at": "2021-08-03T10:04:31Z", "pushed_at": "2021-08-01T22:22:15Z", - "stargazers_count": 164, - "watchers_count": 164, + "stargazers_count": 165, + "watchers_count": 165, "forks_count": 33, "forks": 33, - "watchers": 164, + "watchers": 165, "score": 0 }, { @@ -243,13 +243,13 @@ "description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM", "fork": false, "created_at": "2021-07-24T12:55:05Z", - "updated_at": "2021-08-02T16:24:47Z", + "updated_at": "2021-08-03T14:10:45Z", "pushed_at": "2021-07-25T15:41:33Z", - "stargazers_count": 165, - "watchers_count": 165, + "stargazers_count": 167, + "watchers_count": 167, "forks_count": 28, "forks": 28, - "watchers": 165, + "watchers": 167, "score": 0 }, { @@ -404,13 +404,13 @@ "description": "POC experiments with Volume Shadow copy Service (VSS)", "fork": false, "created_at": "2021-08-02T13:47:17Z", - "updated_at": "2021-08-02T13:51:42Z", + "updated_at": "2021-08-03T11:00:50Z", "pushed_at": "2021-08-02T13:52:20Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-37832.json b/2021/CVE-2021-37832.json new file mode 100644 index 0000000000..aaf9f57cc4 --- /dev/null +++ b/2021/CVE-2021-37832.json @@ -0,0 +1,25 @@ +[ + { + "id": 391489574, + "name": "CVE-2021-37832", + "full_name": "dievus\/CVE-2021-37832", + "owner": { + "login": "dievus", + "id": 25853389, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25853389?v=4", + "html_url": "https:\/\/github.com\/dievus" + }, + "html_url": "https:\/\/github.com\/dievus\/CVE-2021-37832", + "description": "CVE-2021-37832 - Hotel Druid 3.0.2 SQL Injection Vulnerability", + "fork": false, + "created_at": "2021-08-01T00:38:56Z", + "updated_at": "2021-08-03T13:45:02Z", + "pushed_at": "2021-08-03T13:45:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-37833.json b/2021/CVE-2021-37833.json new file mode 100644 index 0000000000..2a69ab8c28 --- /dev/null +++ b/2021/CVE-2021-37833.json @@ -0,0 +1,25 @@ +[ + { + "id": 391489074, + "name": "CVE-2021-37833", + "full_name": "dievus\/CVE-2021-37833", + "owner": { + "login": "dievus", + "id": 25853389, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25853389?v=4", + "html_url": "https:\/\/github.com\/dievus" + }, + "html_url": "https:\/\/github.com\/dievus\/CVE-2021-37833", + "description": "CVE 2021-37833 Hotel Druid 3.0.2 Reflected Cross Site Scripting", + "fork": false, + "created_at": "2021-08-01T00:34:27Z", + "updated_at": "2021-08-03T14:10:39Z", + "pushed_at": "2021-08-03T13:44:40Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index e87b6437fe..7d731ad50e 100644 --- a/README.md +++ b/README.md @@ -809,12 +809,7 @@ The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when s - [dn9uy3n/Check-CVE-2021-23383](https://github.com/dn9uy3n/Check-CVE-2021-23383) -### CVE-2021-23410 (2021-07-21) - -<code> -All versions of package msgpack are vulnerable to Deserialization of Untrusted Data via the unpack function. N.B: this affects the NPM package [msgpack](https://www.npmjs.com/package/msgpack) only, NOT the more popular package [@msgpack/msgpack](https://www.npmjs.com/package/@msgpack/msgpack). -</code> - +### CVE-2021-23410 - [azu/msgpack-CVE-2021-23410-test](https://github.com/azu/msgpack-CVE-2021-23410-test) ### CVE-2021-24027 (2021-04-06) @@ -1504,7 +1499,12 @@ Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulner - [waleedassar/CVE-2021-31184](https://github.com/waleedassar/CVE-2021-31184) -### CVE-2021-31630 +### CVE-2021-31630 (-) + +<code> +Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application. +</code> + - [h3v0x/CVE-2021-31630-OpenPLC_RCE](https://github.com/h3v0x/CVE-2021-31630-OpenPLC_RCE) ### CVE-2021-31702 (2021-05-29) @@ -1797,6 +1797,22 @@ Windows Elevation of Privilege Vulnerability ### CVE-2021-37152 - [lhashashinl/CVE-2021-37152](https://github.com/lhashashinl/CVE-2021-37152) +### CVE-2021-37832 (2021-08-03) + +<code> +A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite is being used as the application database. A malicious attacker can issue SQL commands to the SQLite database through the vulnerable idappartamenti parameter. +</code> + +- [dievus/CVE-2021-37832](https://github.com/dievus/CVE-2021-37832) + +### CVE-2021-37833 (2021-08-03) + +<code> +A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands. +</code> + +- [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833) + ### CVE-2021-123456 - [zoukba0014/cve-2021-123456](https://github.com/zoukba0014/cve-2021-123456) @@ -9155,15 +9171,6 @@ An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and - [akabe1/kr00ker](https://github.com/akabe1/kr00ker) - [mustafasevim/kr00k-vulnerability](https://github.com/mustafasevim/kr00k-vulnerability) -### CVE-2019-15165 (2019-10-03) - -<code> -sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory. -</code> - -- [madhans23/libpcap-without-Fix-CVE-2019-15165](https://github.com/madhans23/libpcap-without-Fix-CVE-2019-15165) -- [madhans23/libpcap-with-Fix-CVE-2019-15165](https://github.com/madhans23/libpcap-with-Fix-CVE-2019-15165) - ### CVE-2019-15224 (2019-08-19) <code> @@ -16534,6 +16541,7 @@ The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the P </code> - [lcfpadilha/mac0352-ep4](https://github.com/lcfpadilha/mac0352-ep4) +- [jptr218/apachedos](https://github.com/jptr218/apachedos) ### CVE-2016-8776 (2017-04-02)