diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 6c9c5c6113..83743265ad 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-12T13:23:43Z", + "updated_at": "2021-10-12T15:25:14Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1195, - "watchers_count": 1195, + "stargazers_count": 1194, + "watchers_count": 1194, "forks_count": 265, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 265, - "watchers": 1195, + "watchers": 1194, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index d89706737b..e0e587c21b 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-12T13:23:43Z", + "updated_at": "2021-10-12T15:25:14Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1195, - "watchers_count": 1195, + "stargazers_count": 1194, + "watchers_count": 1194, "forks_count": 265, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 265, - "watchers": 1195, + "watchers": 1194, "score": 0 }, { diff --git a/2016/CVE-2016-3714.json b/2016/CVE-2016-3714.json index c0de889770..cb422993d3 100644 --- a/2016/CVE-2016-3714.json +++ b/2016/CVE-2016-3714.json @@ -133,32 +133,5 @@ "forks": 39, "watchers": 63, "score": 0 - }, - { - "id": 160678045, - "name": "CVE-2016-3714", - "full_name": "HRSkraps\/CVE-2016-3714", - "owner": { - "login": "HRSkraps", - "id": 45661385, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45661385?v=4", - "html_url": "https:\/\/github.com\/HRSkraps" - }, - "html_url": "https:\/\/github.com\/HRSkraps\/CVE-2016-3714", - "description": "A reproducible environment with flag challenges for CVE-2016-3714 ", - "fork": false, - "created_at": "2018-12-06T13:23:05Z", - "updated_at": "2018-12-06T13:23:05Z", - "pushed_at": "2018-12-06T13:23:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 8b78ad449c..3f33e8b94d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-12T13:23:43Z", + "updated_at": "2021-10-12T15:25:14Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1195, - "watchers_count": 1195, + "stargazers_count": 1194, + "watchers_count": 1194, "forks_count": 265, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 265, - "watchers": 1195, + "watchers": 1194, "score": 0 }, { diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index 60321e408a..7432ba087b 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -188,7 +188,7 @@ "pushed_at": "2017-03-13T15:03:32Z", "stargazers_count": 37, "watchers_count": 37, - "forks_count": 37, + "forks_count": 38, "allow_forking": true, "is_template": false, "topics": [ @@ -196,7 +196,7 @@ "cve-2017-5638" ], "visibility": "public", - "forks": 37, + "forks": 38, "watchers": 37, "score": 0 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index e7c4ec0152..6a60c4ed1e 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-12T13:23:43Z", + "updated_at": "2021-10-12T15:25:14Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1195, - "watchers_count": 1195, + "stargazers_count": 1194, + "watchers_count": 1194, "forks_count": 265, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 265, - "watchers": 1195, + "watchers": 1194, "score": 0 }, { diff --git a/2019/CVE-2019-12725.json b/2019/CVE-2019-12725.json index cc740df873..28f75c3a5b 100644 --- a/2019/CVE-2019-12725.json +++ b/2019/CVE-2019-12725.json @@ -44,12 +44,12 @@ "pushed_at": "2021-09-22T02:19:32Z", "stargazers_count": 27, "watchers_count": 27, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 27, "score": 0 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 63c5a2e403..ddbfe180eb 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -40,17 +40,17 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2021-10-08T08:19:14Z", + "updated_at": "2021-10-12T17:08:22Z", "pushed_at": "2021-09-27T14:26:16Z", - "stargazers_count": 211, - "watchers_count": 211, + "stargazers_count": 212, + "watchers_count": 212, "forks_count": 60, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 60, - "watchers": 211, + "watchers": 212, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index fc7c587b6f..3e57cf0be2 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-12T13:23:43Z", + "updated_at": "2021-10-12T15:25:14Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1195, - "watchers_count": 1195, + "stargazers_count": 1194, + "watchers_count": 1194, "forks_count": 265, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 265, - "watchers": 1195, + "watchers": 1194, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5418.json b/2019/CVE-2019-5418.json index 189cbe7c6b..5d797391bf 100644 --- a/2019/CVE-2019-5418.json +++ b/2019/CVE-2019-5418.json @@ -101,7 +101,7 @@ "fork": false, "created_at": "2019-03-23T02:52:31Z", "updated_at": "2021-08-14T00:42:01Z", - "pushed_at": "2021-09-27T21:53:19Z", + "pushed_at": "2021-10-12T19:01:21Z", "stargazers_count": 114, "watchers_count": 114, "forks_count": 28, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index de72631072..ca713c93db 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -2022,10 +2022,10 @@ "description": "Remote Code Execution POC for CVE-2020-0796", "fork": false, "created_at": "2021-10-09T04:52:55Z", - "updated_at": "2021-10-09T05:04:42Z", + "updated_at": "2021-10-12T18:23:02Z", "pushed_at": "2021-10-09T05:03:57Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -2036,7 +2036,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index bcf2dc8016..1ad5935250 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -67,17 +67,17 @@ "description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc", "fork": false, "created_at": "2020-02-20T17:57:54Z", - "updated_at": "2021-08-24T11:15:46Z", + "updated_at": "2021-10-12T18:42:21Z", "pushed_at": "2020-02-23T17:06:06Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "forks_count": 59, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 59, - "watchers": 80, + "watchers": 81, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 78b71c786a..eb1d7227b7 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-12T13:23:43Z", + "updated_at": "2021-10-12T15:25:14Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1195, - "watchers_count": 1195, + "stargazers_count": 1194, + "watchers_count": 1194, "forks_count": 265, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 265, - "watchers": 1195, + "watchers": 1194, "score": 0 }, { diff --git a/2020/CVE-2020-35729.json b/2020/CVE-2020-35729.json index f674c1c4ae..4eba72ae53 100644 --- a/2020/CVE-2020-35729.json +++ b/2020/CVE-2020-35729.json @@ -17,7 +17,7 @@ "pushed_at": "2021-04-09T08:00:19Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -26,7 +26,7 @@ "klogserver" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 3, "score": 0 } diff --git a/2020/CVE-2020-6516.json b/2020/CVE-2020-6516.json index 70075e7e52..b27e21936c 100644 --- a/2020/CVE-2020-6516.json +++ b/2020/CVE-2020-6516.json @@ -17,12 +17,12 @@ "pushed_at": "2021-05-25T11:14:56Z", "stargazers_count": 113, "watchers_count": 113, - "forks_count": 27, + "forks_count": 28, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 27, + "forks": 28, "watchers": 113, "score": 0 } diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json index 83dd4f157f..7c5129e822 100644 --- a/2020/CVE-2020-8165.json +++ b/2020/CVE-2020-8165.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2020-05-20T04:27:52Z", "updated_at": "2021-07-15T13:04:55Z", - "pushed_at": "2021-09-28T02:50:07Z", + "pushed_at": "2021-10-12T21:13:09Z", "stargazers_count": 39, "watchers_count": 39, "forks_count": 15, diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json index 2ea0d3ba58..2f3c288e66 100644 --- a/2020/CVE-2020-8554.json +++ b/2020/CVE-2020-8554.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2020-12-01T16:58:39Z", "updated_at": "2021-10-11T17:20:02Z", - "pushed_at": "2021-10-11T17:19:59Z", + "pushed_at": "2021-10-12T19:23:44Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 033873470a..7b388bb9b2 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -40,17 +40,17 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2021-10-11T20:43:52Z", + "updated_at": "2021-10-12T17:48:42Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1409, - "watchers_count": 1409, + "stargazers_count": 1411, + "watchers_count": 1411, "forks_count": 522, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 522, - "watchers": 1409, + "watchers": 1411, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 93107d9c28..c83cfeb866 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -140,17 +140,17 @@ "description": "Proof of Concept Exploit for vCenter CVE-2021-21972", "fork": false, "created_at": "2021-02-24T16:31:34Z", - "updated_at": "2021-10-05T07:46:50Z", + "updated_at": "2021-10-12T19:43:29Z", "pushed_at": "2021-02-25T16:05:02Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 147, + "watchers_count": 147, "forks_count": 58, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 58, - "watchers": 146, + "watchers": 147, "score": 0 }, { diff --git a/2021/CVE-2021-22941.json b/2021/CVE-2021-22941.json new file mode 100644 index 0000000000..0040d30c8b --- /dev/null +++ b/2021/CVE-2021-22941.json @@ -0,0 +1,29 @@ +[ + { + "id": 416379571, + "name": "CVE-2021-22941", + "full_name": "hoavt184\/CVE-2021-22941", + "owner": { + "login": "hoavt184", + "id": 68089551, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68089551?v=4", + "html_url": "https:\/\/github.com\/hoavt184" + }, + "html_url": "https:\/\/github.com\/hoavt184\/CVE-2021-22941", + "description": null, + "fork": false, + "created_at": "2021-10-12T14:52:38Z", + "updated_at": "2021-10-12T16:07:13Z", + "pushed_at": "2021-10-12T16:05:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-2394.json b/2021/CVE-2021-2394.json index db45cfa364..b89ccebfa5 100644 --- a/2021/CVE-2021-2394.json +++ b/2021/CVE-2021-2394.json @@ -13,17 +13,17 @@ "description": "POC of CVE-2021-2394", "fork": false, "created_at": "2021-08-02T02:22:04Z", - "updated_at": "2021-09-19T05:44:27Z", + "updated_at": "2021-10-12T16:37:23Z", "pushed_at": "2021-08-16T08:02:40Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, - "watchers": 11, + "watchers": 12, "score": 0 }, { diff --git a/2021/CVE-2021-24027.json b/2021/CVE-2021-24027.json index 70075e7e52..b27e21936c 100644 --- a/2021/CVE-2021-24027.json +++ b/2021/CVE-2021-24027.json @@ -17,12 +17,12 @@ "pushed_at": "2021-05-25T11:14:56Z", "stargazers_count": 113, "watchers_count": 113, - "forks_count": 27, + "forks_count": 28, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 27, + "forks": 28, "watchers": 113, "score": 0 } diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 3c80af3655..51faf4a790 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -17,12 +17,12 @@ "pushed_at": "2021-09-22T02:19:32Z", "stargazers_count": 27, "watchers_count": 27, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 27, "score": 0 }, diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json index 00a5a1f2d6..84a2e1ac21 100644 --- a/2021/CVE-2021-30632.json +++ b/2021/CVE-2021-30632.json @@ -40,17 +40,17 @@ "description": null, "fork": false, "created_at": "2021-09-28T03:47:36Z", - "updated_at": "2021-10-12T14:54:12Z", + "updated_at": "2021-10-12T19:38:06Z", "pushed_at": "2021-09-29T02:20:40Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 22, - "watchers": 109, + "watchers": 110, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 56e24adfb1..bc645c861f 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -452,17 +452,17 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2021-10-10T02:03:00Z", + "updated_at": "2021-10-12T15:38:03Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 764, - "watchers_count": 764, + "stargazers_count": 763, + "watchers_count": 763, "forks_count": 224, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 224, - "watchers": 764, + "watchers": 763, "score": 0 }, { @@ -699,17 +699,17 @@ "description": null, "fork": false, "created_at": "2021-02-03T09:04:14Z", - "updated_at": "2021-08-28T18:19:05Z", + "updated_at": "2021-10-12T18:17:20Z", "pushed_at": "2021-02-03T09:04:15Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 0, "score": 0 }, { @@ -1321,7 +1321,7 @@ "fork": false, "created_at": "2021-08-13T14:23:09Z", "updated_at": "2021-08-17T15:22:10Z", - "pushed_at": "2021-08-17T15:22:08Z", + "pushed_at": "2021-10-12T20:51:00Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-31728.json b/2021/CVE-2021-31728.json index 5bca8cb81e..6d226c4a07 100644 --- a/2021/CVE-2021-31728.json +++ b/2021/CVE-2021-31728.json @@ -13,10 +13,10 @@ "description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.", "fork": false, "created_at": "2021-05-04T17:15:58Z", - "updated_at": "2021-10-11T05:16:20Z", + "updated_at": "2021-10-12T15:25:37Z", "pushed_at": "2021-05-10T20:42:33Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 48, + "watchers": 49, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-33044.json b/2021/CVE-2021-33044.json index 89d0ad0053..20ff2146af 100644 --- a/2021/CVE-2021-33044.json +++ b/2021/CVE-2021-33044.json @@ -13,16 +13,16 @@ "description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.", "fork": false, "created_at": "2021-10-11T22:08:47Z", - "updated_at": "2021-10-12T14:50:43Z", - "pushed_at": "2021-10-11T22:24:47Z", + "updated_at": "2021-10-12T19:01:05Z", + "pushed_at": "2021-10-12T19:03:19Z", "stargazers_count": 10, "watchers_count": 10, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 10, "score": 0 } diff --git a/2021/CVE-2021-3317.json b/2021/CVE-2021-3317.json index ccb7b49e1f..67ce9133ba 100644 --- a/2021/CVE-2021-3317.json +++ b/2021/CVE-2021-3317.json @@ -17,7 +17,7 @@ "pushed_at": "2021-04-09T07:37:29Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -26,7 +26,7 @@ "klogserver" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 3, "score": 0 } diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json index fc5799ce06..8d45453813 100644 --- a/2021/CVE-2021-34473.json +++ b/2021/CVE-2021-34473.json @@ -94,17 +94,17 @@ "description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207", "fork": false, "created_at": "2021-09-04T15:34:03Z", - "updated_at": "2021-09-27T18:02:16Z", + "updated_at": "2021-10-12T19:43:33Z", "pushed_at": "2021-09-07T15:18:45Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-34486.json b/2021/CVE-2021-34486.json index 252001a055..158a2db3bd 100644 --- a/2021/CVE-2021-34486.json +++ b/2021/CVE-2021-34486.json @@ -13,17 +13,17 @@ "description": "Windows Etw LPE", "fork": false, "created_at": "2021-10-12T03:50:44Z", - "updated_at": "2021-10-12T12:37:10Z", + "updated_at": "2021-10-12T19:31:05Z", "pushed_at": "2021-10-12T05:52:00Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 11, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-37980.json b/2021/CVE-2021-37980.json new file mode 100644 index 0000000000..0e45f7afe7 --- /dev/null +++ b/2021/CVE-2021-37980.json @@ -0,0 +1,29 @@ +[ + { + "id": 416466988, + "name": "CVE-2021-37980", + "full_name": "ZeusBox\/CVE-2021-37980", + "owner": { + "login": "ZeusBox", + "id": 78951067, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78951067?v=4", + "html_url": "https:\/\/github.com\/ZeusBox" + }, + "html_url": "https:\/\/github.com\/ZeusBox\/CVE-2021-37980", + "description": "PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)", + "fork": false, + "created_at": "2021-10-12T19:14:29Z", + "updated_at": "2021-10-12T19:27:29Z", + "pushed_at": "2021-10-12T19:27:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json index 17b91844e6..8208c5a6ce 100644 --- a/2021/CVE-2021-38647.json +++ b/2021/CVE-2021-38647.json @@ -67,17 +67,17 @@ "description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)", "fork": false, "created_at": "2021-09-16T02:11:36Z", - "updated_at": "2021-10-11T18:33:19Z", + "updated_at": "2021-10-12T19:43:31Z", "pushed_at": "2021-09-16T10:39:04Z", - "stargazers_count": 173, - "watchers_count": 173, + "stargazers_count": 174, + "watchers_count": 174, "forks_count": 50, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 50, - "watchers": 173, + "watchers": 174, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index eb70c998f3..0c1dcaca6d 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -179,12 +179,12 @@ "pushed_at": "2021-09-11T10:35:20Z", "stargazers_count": 73, "watchers_count": 73, - "forks_count": 54, + "forks_count": 55, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 54, + "forks": 55, "watchers": 73, "score": 0 }, @@ -229,17 +229,17 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2021-10-12T14:19:03Z", + "updated_at": "2021-10-12T17:18:19Z", "pushed_at": "2021-09-11T09:50:26Z", - "stargazers_count": 1272, - "watchers_count": 1272, + "stargazers_count": 1274, + "watchers_count": 1274, "forks_count": 402, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 402, - "watchers": 1272, + "watchers": 1274, "score": 0 }, { @@ -256,17 +256,17 @@ "description": null, "fork": false, "created_at": "2021-09-11T02:49:37Z", - "updated_at": "2021-09-11T02:55:42Z", + "updated_at": "2021-10-12T16:17:48Z", "pushed_at": "2021-09-11T02:49:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 0, + "forks": 2, + "watchers": 1, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 5388dbf56f..d3961dcd79 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -229,17 +229,17 @@ "description": null, "fork": false, "created_at": "2021-10-05T23:53:48Z", - "updated_at": "2021-10-12T02:54:17Z", + "updated_at": "2021-10-12T20:06:37Z", "pushed_at": "2021-10-06T15:37:23Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, - "watchers": 30, + "watchers": 31, "score": 0 }, { diff --git a/README.md b/README.md index 7d34c9465c..c37f0f89bb 100644 --- a/README.md +++ b/README.md @@ -887,6 +887,14 @@ A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3 - [optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911](https://github.com/optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911) - [jayngng/CVE-2021-22911](https://github.com/jayngng/CVE-2021-22911) +### CVE-2021-22941 (2021-09-23) + +<code> +Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller. +</code> + +- [hoavt184/CVE-2021-22941](https://github.com/hoavt184/CVE-2021-22941) + ### CVE-2021-22986 (2021-03-31) <code> @@ -2350,6 +2358,9 @@ A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in - [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833) +### CVE-2021-37980 +- [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980) + ### CVE-2021-38149 (2021-08-06) <code> @@ -17225,7 +17236,6 @@ The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and - [chusiang/CVE-2016-3714.ansible.role](https://github.com/chusiang/CVE-2016-3714.ansible.role) - [jpeanut/ImageTragick-CVE-2016-3714-RShell](https://github.com/jpeanut/ImageTragick-CVE-2016-3714-RShell) - [Hood3dRob1n/CVE-2016-3714](https://github.com/Hood3dRob1n/CVE-2016-3714) -- [HRSkraps/CVE-2016-3714](https://github.com/HRSkraps/CVE-2016-3714) ### CVE-2016-3749 (2016-07-10)