diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index 3ad8a105b3..5cbfb59dfd 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -73,13 +73,13 @@ "pushed_at": "2017-11-19T11:01:16Z", "stargazers_count": 685, "watchers_count": 685, - "forks_count": 290, + "forks_count": 291, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 290, + "forks": 291, "watchers": 685, "score": 0 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index b7f236e0ab..52f8b15489 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1216,13 +1216,13 @@ "pushed_at": "2020-04-01T01:46:17Z", "stargazers_count": 53, "watchers_count": 53, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 53, "score": 0 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 48274fa426..c523d1cf0f 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -118,10 +118,10 @@ "description": "Weblogic IIOP CVE-2020-2551", "fork": false, "created_at": "2020-02-28T08:46:21Z", - "updated_at": "2022-08-23T01:15:35Z", + "updated_at": "2022-08-24T21:05:32Z", "pushed_at": "2020-04-07T03:32:24Z", - "stargazers_count": 298, - "watchers_count": 298, + "stargazers_count": 299, + "watchers_count": 299, "forks_count": 74, "allow_forking": true, "is_template": false, @@ -129,7 +129,7 @@ "topics": [], "visibility": "public", "forks": 74, - "watchers": 298, + "watchers": 299, "score": 0 }, { diff --git a/2020/CVE-2020-29134.json b/2020/CVE-2020-29134.json index 9c065a48bc..af8b5e23e7 100644 --- a/2020/CVE-2020-29134.json +++ b/2020/CVE-2020-29134.json @@ -13,10 +13,10 @@ "description": "Exploit CVE-2020-29134 - TOTVS Fluig Platform - Path Traversal", "fork": false, "created_at": "2021-02-11T13:44:40Z", - "updated_at": "2022-02-22T01:57:13Z", - "pushed_at": "2021-03-13T01:22:39Z", - "stargazers_count": 4, - "watchers_count": 4, + "updated_at": "2022-08-24T19:24:28Z", + "pushed_at": "2022-08-24T19:24:25Z", + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -35,7 +35,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1056.json b/2021/CVE-2021-1056.json new file mode 100644 index 0000000000..a75ae327f5 --- /dev/null +++ b/2021/CVE-2021-1056.json @@ -0,0 +1,34 @@ +[ + { + "id": 327884232, + "name": "CVE-2021-1056", + "full_name": "pokerfaceSad\/CVE-2021-1056", + "owner": { + "login": "pokerfaceSad", + "id": 22297037, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22297037?v=4", + "html_url": "https:\/\/github.com\/pokerfaceSad" + }, + "html_url": "https:\/\/github.com\/pokerfaceSad\/CVE-2021-1056", + "description": "PoC for CVE-2021-1056, related to GPU Container Security", + "fork": false, + "created_at": "2021-01-08T11:29:48Z", + "updated_at": "2022-06-22T02:08:32Z", + "pushed_at": "2021-01-12T09:21:02Z", + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 6, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2021-1056", + "gpu-container", + "kubernetes-clusters" + ], + "visibility": "public", + "forks": 6, + "watchers": 14, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-1647.json b/2021/CVE-2021-1647.json new file mode 100644 index 0000000000..1ffcd32ca3 --- /dev/null +++ b/2021/CVE-2021-1647.json @@ -0,0 +1,30 @@ +[ + { + "id": 332213147, + "name": "cve-2021-1647", + "full_name": "findcool\/cve-2021-1647", + "owner": { + "login": "findcool", + "id": 73280456, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73280456?v=4", + "html_url": "https:\/\/github.com\/findcool" + }, + "html_url": "https:\/\/github.com\/findcool\/cve-2021-1647", + "description": null, + "fork": false, + "created_at": "2021-01-23T13:10:35Z", + "updated_at": "2021-01-23T13:10:37Z", + "pushed_at": "2021-01-20T14:55:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index ce379e17d1..c52e91ab90 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -41,10 +41,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2022-08-21T16:45:09Z", + "updated_at": "2022-08-24T21:07:58Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1596, - "watchers_count": 1596, + "stargazers_count": 1597, + "watchers_count": 1597, "forks_count": 574, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 574, - "watchers": 1596, + "watchers": 1597, "score": 0 }, { diff --git a/2021/CVE-2021-2109.json b/2021/CVE-2021-2109.json index eba3df6e22..c70a5229be 100644 --- a/2021/CVE-2021-2109.json +++ b/2021/CVE-2021-2109.json @@ -1,4 +1,65 @@ [ + { + "id": 331847444, + "name": "CVE-2021-2109", + "full_name": "Al1ex\/CVE-2021-2109", + "owner": { + "login": "Al1ex", + "id": 38161463, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", + "html_url": "https:\/\/github.com\/Al1ex" + }, + "html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-2109", + "description": "CVE-2021-2109 && Weblogic Server RCE via JNDI", + "fork": false, + "created_at": "2021-01-22T05:37:11Z", + "updated_at": "2022-07-27T14:25:40Z", + "pushed_at": "2021-01-22T05:52:26Z", + "stargazers_count": 28, + "watchers_count": 28, + "forks_count": 9, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2021-2109", + "jndi", + "rce", + "weblogic" + ], + "visibility": "public", + "forks": 9, + "watchers": 28, + "score": 0 + }, + { + "id": 331873303, + "name": "CVE-2021-2109", + "full_name": "rabbitsafe\/CVE-2021-2109", + "owner": { + "login": "rabbitsafe", + "id": 33046073, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4", + "html_url": "https:\/\/github.com\/rabbitsafe" + }, + "html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-2109", + "description": null, + "fork": false, + "created_at": "2021-01-22T07:43:46Z", + "updated_at": "2022-07-16T15:08:14Z", + "pushed_at": "2021-01-22T08:34:11Z", + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 11, + "score": 0 + }, { "id": 367086891, "name": "CVE-2021-2109_poc", diff --git a/2021/CVE-2021-2119.json b/2021/CVE-2021-2119.json index a815222954..7ddcd0e5a6 100644 --- a/2021/CVE-2021-2119.json +++ b/2021/CVE-2021-2119.json @@ -1,4 +1,32 @@ [ + { + "id": 329979678, + "name": "RWCTF21-VirtualBox-61-escape", + "full_name": "Sauercloud\/RWCTF21-VirtualBox-61-escape", + "owner": { + "login": "Sauercloud", + "id": 41395211, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41395211?v=4", + "html_url": "https:\/\/github.com\/Sauercloud" + }, + "html_url": "https:\/\/github.com\/Sauercloud\/RWCTF21-VirtualBox-61-escape", + "description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119", + "fork": false, + "created_at": "2021-01-15T17:32:24Z", + "updated_at": "2022-07-26T02:45:47Z", + "pushed_at": "2021-01-23T01:25:22Z", + "stargazers_count": 124, + "watchers_count": 124, + "forks_count": 20, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 20, + "watchers": 124, + "score": 0 + }, { "id": 471867550, "name": "Sauercloude", diff --git a/2021/CVE-2021-25094.json b/2021/CVE-2021-25094.json index eb80710b5b..617788e641 100644 --- a/2021/CVE-2021-25094.json +++ b/2021/CVE-2021-25094.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-01-03T21:19:42Z", - "updated_at": "2022-08-13T16:32:55Z", + "updated_at": "2022-08-24T20:48:06Z", "pushed_at": "2022-05-24T07:48:39Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0 }, { @@ -41,10 +41,10 @@ "description": "GILANG - Exploiter for CVE-2021-25094", "fork": false, "created_at": "2022-07-10T02:01:11Z", - "updated_at": "2022-07-10T02:06:57Z", + "updated_at": "2022-08-24T19:19:13Z", "pushed_at": "2022-07-10T02:06:55Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2021/CVE-2021-3019.json b/2021/CVE-2021-3019.json index b05195691d..5245cb9a64 100644 --- a/2021/CVE-2021-3019.json +++ b/2021/CVE-2021-3019.json @@ -1,4 +1,32 @@ [ + { + "id": 328097281, + "name": "CVE-2021-3019", + "full_name": "B1anda0\/CVE-2021-3019", + "owner": { + "login": "B1anda0", + "id": 74232513, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4", + "html_url": "https:\/\/github.com\/B1anda0" + }, + "html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-3019", + "description": "lanproxy 目录遍历漏洞批量检测 (CVE-2021-3019)", + "fork": false, + "created_at": "2021-01-09T07:11:38Z", + "updated_at": "2021-10-24T05:59:19Z", + "pushed_at": "2021-01-09T07:14:26Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 4, + "score": 0 + }, { "id": 328546705, "name": "CVE-2021-3019", @@ -27,6 +55,34 @@ "watchers": 13, "score": 0 }, + { + "id": 329537345, + "name": "CVE-2021-3019", + "full_name": "Maksim-venus\/CVE-2021-3019", + "owner": { + "login": "Maksim-venus", + "id": 35008035, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35008035?v=4", + "html_url": "https:\/\/github.com\/Maksim-venus" + }, + "html_url": "https:\/\/github.com\/Maksim-venus\/CVE-2021-3019", + "description": "lanproxy 目录遍历漏洞批量检测用户名密码POC (CVE-2021-3019)", + "fork": false, + "created_at": "2021-01-14T07:19:21Z", + "updated_at": "2021-11-25T06:50:40Z", + "pushed_at": "2021-01-14T07:52:31Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 3, + "score": 0 + }, { "id": 346618078, "name": "CVE-2021-3019", diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index f7b7551518..a8bf68a651 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -27,6 +27,90 @@ "watchers": 222, "score": 0 }, + { + "id": 331843308, + "name": "CVE-2021-3129", + "full_name": "SNCKER\/CVE-2021-3129", + "owner": { + "login": "SNCKER", + "id": 49559334, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4", + "html_url": "https:\/\/github.com\/SNCKER" + }, + "html_url": "https:\/\/github.com\/SNCKER\/CVE-2021-3129", + "description": "Laravel debug rce", + "fork": false, + "created_at": "2021-01-22T05:12:21Z", + "updated_at": "2022-08-10T11:46:01Z", + "pushed_at": "2021-01-24T05:28:07Z", + "stargazers_count": 111, + "watchers_count": 111, + "forks_count": 52, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 52, + "watchers": 111, + "score": 0 + }, + { + "id": 332682252, + "name": "laravel-CVE-2021-3129-EXP", + "full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP", + "owner": { + "login": "SecPros-Team", + "id": 77960183, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4", + "html_url": "https:\/\/github.com\/SecPros-Team" + }, + "html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP", + "description": null, + "fork": false, + "created_at": "2021-01-25T08:42:28Z", + "updated_at": "2022-08-22T19:21:35Z", + "pushed_at": "2021-01-25T08:49:59Z", + "stargazers_count": 45, + "watchers_count": 45, + "forks_count": 28, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 28, + "watchers": 45, + "score": 0 + }, + { + "id": 333316985, + "name": "Laravel_CVE-2021-3129_EXP", + "full_name": "crisprss\/Laravel_CVE-2021-3129_EXP", + "owner": { + "login": "crisprss", + "id": 55953931, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55953931?v=4", + "html_url": "https:\/\/github.com\/crisprss" + }, + "html_url": "https:\/\/github.com\/crisprss\/Laravel_CVE-2021-3129_EXP", + "description": null, + "fork": false, + "created_at": "2021-01-27T05:44:52Z", + "updated_at": "2022-07-21T09:16:22Z", + "pushed_at": "2021-01-27T06:23:34Z", + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 7, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 7, + "watchers": 18, + "score": 0 + }, { "id": 333380316, "name": "CVE-2021-3129_exploit", diff --git a/2021/CVE-2021-3130.json b/2021/CVE-2021-3130.json new file mode 100644 index 0000000000..37dc76e328 --- /dev/null +++ b/2021/CVE-2021-3130.json @@ -0,0 +1,30 @@ +[ + { + "id": 331557374, + "name": "CVE-2021-3130", + "full_name": "jet-pentest\/CVE-2021-3130", + "owner": { + "login": "jet-pentest", + "id": 71512502, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4", + "html_url": "https:\/\/github.com\/jet-pentest" + }, + "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3130", + "description": null, + "fork": false, + "created_at": "2021-01-21T08:04:32Z", + "updated_at": "2021-02-14T09:24:07Z", + "pushed_at": "2021-01-21T12:31:34Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3131.json b/2021/CVE-2021-3131.json new file mode 100644 index 0000000000..3f705c162b --- /dev/null +++ b/2021/CVE-2021-3131.json @@ -0,0 +1,30 @@ +[ + { + "id": 329230328, + "name": "CVE-2021-3131", + "full_name": "jet-pentest\/CVE-2021-3131", + "owner": { + "login": "jet-pentest", + "id": 71512502, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4", + "html_url": "https:\/\/github.com\/jet-pentest" + }, + "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3131", + "description": "CVE-2021-3131", + "fork": false, + "created_at": "2021-01-13T07:41:25Z", + "updated_at": "2021-12-15T14:41:14Z", + "pushed_at": "2021-01-13T07:54:38Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index be4799b9a2..6e8845e97e 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1,4 +1,60 @@ [ + { + "id": 333199828, + "name": "CVE-2021-3156", + "full_name": "mr-r3b00t\/CVE-2021-3156", + "owner": { + "login": "mr-r3b00t", + "id": 14963690, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4", + "html_url": "https:\/\/github.com\/mr-r3b00t" + }, + "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-3156", + "description": null, + "fork": false, + "created_at": "2021-01-26T19:53:04Z", + "updated_at": "2021-09-15T04:55:34Z", + "pushed_at": "2021-01-26T20:09:53Z", + "stargazers_count": 34, + "watchers_count": 34, + "forks_count": 31, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 31, + "watchers": 34, + "score": 0 + }, + { + "id": 333450928, + "name": "sudo_cve-2021-3156", + "full_name": "nexcess\/sudo_cve-2021-3156", + "owner": { + "login": "nexcess", + "id": 651829, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/651829?v=4", + "html_url": "https:\/\/github.com\/nexcess" + }, + "html_url": "https:\/\/github.com\/nexcess\/sudo_cve-2021-3156", + "description": null, + "fork": false, + "created_at": "2021-01-27T14:40:57Z", + "updated_at": "2021-09-27T02:51:00Z", + "pushed_at": "2021-01-27T18:21:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 333483141, "name": "CVE-2021-3156", @@ -27,6 +83,34 @@ "watchers": 115, "score": 0 }, + { + "id": 333492305, + "name": "CVE-2021-3156", + "full_name": "unauth401\/CVE-2021-3156", + "owner": { + "login": "unauth401", + "id": 61272656, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61272656?v=4", + "html_url": "https:\/\/github.com\/unauth401" + }, + "html_url": "https:\/\/github.com\/unauth401\/CVE-2021-3156", + "description": null, + "fork": false, + "created_at": "2021-01-27T16:35:43Z", + "updated_at": "2022-07-13T09:51:39Z", + "pushed_at": "2021-01-27T15:19:23Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 25, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 25, + "watchers": 4, + "score": 0 + }, { "id": 333557918, "name": "CVE-2021-3156", @@ -55,6 +139,34 @@ "watchers": 0, "score": 0 }, + { + "id": 333569622, + "name": "CVE-2021-3156-PATCHER", + "full_name": "elbee-cyber\/CVE-2021-3156-PATCHER", + "owner": { + "login": "elbee-cyber", + "id": 66045908, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66045908?v=4", + "html_url": "https:\/\/github.com\/elbee-cyber" + }, + "html_url": "https:\/\/github.com\/elbee-cyber\/CVE-2021-3156-PATCHER", + "description": "This simple bash script will patch the recently discovered sudo heap overflow vulnerability.", + "fork": false, + "created_at": "2021-01-27T21:49:06Z", + "updated_at": "2021-02-03T09:13:52Z", + "pushed_at": "2021-01-28T05:25:26Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 4, + "score": 0 + }, { "id": 333619288, "name": "CVE-2021-3156-Baron-Samedit", @@ -83,6 +195,34 @@ "watchers": 18, "score": 0 }, + { + "id": 333620703, + "name": "cve-2021-3156", + "full_name": "yaunsky\/cve-2021-3156", + "owner": { + "login": "yaunsky", + "id": 48243087, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4", + "html_url": "https:\/\/github.com\/yaunsky" + }, + "html_url": "https:\/\/github.com\/yaunsky\/cve-2021-3156", + "description": "cve-2021-3156;sudo堆溢出漏洞;漏洞检测", + "fork": false, + "created_at": "2021-01-28T02:20:24Z", + "updated_at": "2021-04-18T22:59:59Z", + "pushed_at": "2021-01-28T02:21:30Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 6, + "score": 0 + }, { "id": 333700525, "name": "CVE-2021-3156-Exp", diff --git a/2021/CVE-2021-3157.json b/2021/CVE-2021-3157.json new file mode 100644 index 0000000000..38eb9a58de --- /dev/null +++ b/2021/CVE-2021-3157.json @@ -0,0 +1,30 @@ +[ + { + "id": 333708745, + "name": "cve-2021-3157", + "full_name": "CrackerCat\/cve-2021-3157", + "owner": { + "login": "CrackerCat", + "id": 17995064, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4", + "html_url": "https:\/\/github.com\/CrackerCat" + }, + "html_url": "https:\/\/github.com\/CrackerCat\/cve-2021-3157", + "description": "脚本小子竟是我自己?", + "fork": false, + "created_at": "2021-01-28T09:27:49Z", + "updated_at": "2022-01-07T08:58:03Z", + "pushed_at": "2021-01-28T02:57:24Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3164.json b/2021/CVE-2021-3164.json new file mode 100644 index 0000000000..4f9fa682ea --- /dev/null +++ b/2021/CVE-2021-3164.json @@ -0,0 +1,30 @@ +[ + { + "id": 331173610, + "name": "cve-2021-3164", + "full_name": "rmccarth\/cve-2021-3164", + "owner": { + "login": "rmccarth", + "id": 36937649, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36937649?v=4", + "html_url": "https:\/\/github.com\/rmccarth" + }, + "html_url": "https:\/\/github.com\/rmccarth\/cve-2021-3164", + "description": "Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file. The application is written primarily with PHP so we use PHP in our PoC ", + "fork": false, + "created_at": "2021-01-20T02:48:46Z", + "updated_at": "2021-10-16T06:43:27Z", + "pushed_at": "2021-01-20T02:49:27Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 5447373734..7c2f1acccc 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -69,7 +69,7 @@ "description": "PrintNightmare (CVE-2021-34527) PoC Exploit", "fork": false, "created_at": "2022-08-23T20:20:45Z", - "updated_at": "2022-08-24T18:08:28Z", + "updated_at": "2022-08-24T18:29:33Z", "pushed_at": "2022-08-24T14:56:51Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 061b5d0e8b..4d65f2d6f5 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,10 +13,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2022-08-24T11:29:09Z", + "updated_at": "2022-08-24T23:33:58Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1129, - "watchers_count": 1129, + "stargazers_count": 1130, + "watchers_count": 1130, "forks_count": 296, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 296, - "watchers": 1129, + "watchers": 1130, "score": 0 }, { diff --git a/2021/CVE-2021-43129.json b/2021/CVE-2021-43129.json index 678bab0cc6..edae297b4e 100644 --- a/2021/CVE-2021-43129.json +++ b/2021/CVE-2021-43129.json @@ -13,10 +13,10 @@ "description": "Vulnerability in D2L Brightspace's Learning Management System(LMS)", "fork": false, "created_at": "2022-04-12T21:04:44Z", - "updated_at": "2022-07-20T18:17:26Z", + "updated_at": "2022-08-24T20:53:15Z", "pushed_at": "2022-04-29T06:20:22Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 14bbacda3c..f2c0fc4790 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -17,13 +17,13 @@ "pushed_at": "2022-07-25T20:41:30Z", "stargazers_count": 30, "watchers_count": 30, - "forks_count": 18, + "forks_count": 19, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, + "forks": 19, "watchers": 30, "score": 0 }, @@ -5700,10 +5700,10 @@ "description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks", "fork": false, "created_at": "2021-12-20T12:01:52Z", - "updated_at": "2022-03-13T14:53:55Z", + "updated_at": "2022-08-24T20:49:18Z", "pushed_at": "2021-12-20T12:03:48Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 5, "allow_forking": true, "is_template": false, @@ -5717,7 +5717,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json index 630cb21486..4a95a903ef 100644 --- a/2022/CVE-2022-0337.json +++ b/2022/CVE-2022-0337.json @@ -13,10 +13,10 @@ "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "fork": false, "created_at": "2022-03-19T08:10:46Z", - "updated_at": "2022-08-24T06:40:45Z", + "updated_at": "2022-08-24T18:39:35Z", "pushed_at": "2022-03-19T12:01:26Z", - "stargazers_count": 283, - "watchers_count": 283, + "stargazers_count": 284, + "watchers_count": 284, "forks_count": 34, "allow_forking": true, "is_template": false, @@ -40,7 +40,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 283, + "watchers": 284, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1802.json b/2022/CVE-2022-1802.json index 9f0b0d4a3e..f49555cd2a 100644 --- a/2022/CVE-2022-1802.json +++ b/2022/CVE-2022-1802.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-08-20T03:01:30Z", - "updated_at": "2022-08-24T17:27:58Z", + "updated_at": "2022-08-24T23:03:30Z", "pushed_at": "2022-08-24T08:53:11Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 62, + "watchers_count": 62, "forks_count": 16, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 59, + "watchers": 62, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 531bcd0b87..39b022eb50 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-08-24T12:49:15Z", + "updated_at": "2022-08-24T20:37:22Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 632, - "watchers_count": 632, + "stargazers_count": 631, + "watchers_count": 631, "forks_count": 130, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 130, - "watchers": 632, + "watchers": 631, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index a718b76e22..035a371863 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -210,10 +210,10 @@ "description": "CVE-2022-26134 - Atlassian Confluence unauthenticated OGNL injection vulnerability (RCE).", "fork": false, "created_at": "2022-06-03T21:07:30Z", - "updated_at": "2022-08-23T18:59:05Z", + "updated_at": "2022-08-24T23:43:54Z", "pushed_at": "2022-06-06T20:24:06Z", - "stargazers_count": 257, - "watchers_count": 257, + "stargazers_count": 258, + "watchers_count": 258, "forks_count": 71, "allow_forking": true, "is_template": false, @@ -233,7 +233,7 @@ ], "visibility": "public", "forks": 71, - "watchers": 257, + "watchers": 258, "score": 0 }, { diff --git a/2022/CVE-2022-27255.json b/2022/CVE-2022-27255.json index cdcff055a0..b2dd37b89b 100644 --- a/2022/CVE-2022-27255.json +++ b/2022/CVE-2022-27255.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-07-06T17:29:04Z", - "updated_at": "2022-08-24T08:30:41Z", + "updated_at": "2022-08-24T22:33:46Z", "pushed_at": "2022-08-19T00:41:08Z", - "stargazers_count": 151, - "watchers_count": 151, + "stargazers_count": 153, + "watchers_count": 153, "forks_count": 28, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 151, + "watchers": 153, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json index e2ff9d7d60..f28ee3eace 100644 --- a/2022/CVE-2022-27925.json +++ b/2022/CVE-2022-27925.json @@ -125,11 +125,11 @@ "description": "Zimbra CVE-2022-27925 PoC", "fork": false, "created_at": "2022-08-20T15:58:29Z", - "updated_at": "2022-08-22T08:27:34Z", - "pushed_at": "2022-08-20T17:24:15Z", + "updated_at": "2022-08-24T19:17:11Z", + "pushed_at": "2022-08-24T19:12:24Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -141,7 +141,7 @@ "zimbra" ], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 3, "score": 0 } diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 2aa65e58e0..8da4f236bd 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -425,10 +425,10 @@ "description": "Just another PoC for the new MSDT-Exploit", "fork": false, "created_at": "2022-06-01T11:37:08Z", - "updated_at": "2022-08-24T12:12:29Z", + "updated_at": "2022-08-24T19:14:27Z", "pushed_at": "2022-07-28T10:56:46Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 4, "allow_forking": true, "is_template": false, @@ -436,7 +436,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 10, + "watchers": 9, "score": 0 }, { @@ -772,10 +772,10 @@ "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。", "fork": false, "created_at": "2022-06-02T12:33:18Z", - "updated_at": "2022-08-16T06:47:53Z", + "updated_at": "2022-08-24T22:21:40Z", "pushed_at": "2022-06-06T07:19:53Z", - "stargazers_count": 328, - "watchers_count": 328, + "stargazers_count": 329, + "watchers_count": 329, "forks_count": 47, "allow_forking": true, "is_template": false, @@ -783,7 +783,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 328, + "watchers": 329, "score": 0 }, { diff --git a/2022/CVE-2022-36446.json b/2022/CVE-2022-36446.json index c4fd001201..165410679c 100644 --- a/2022/CVE-2022-36446.json +++ b/2022/CVE-2022-36446.json @@ -13,10 +13,10 @@ "description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.", "fork": false, "created_at": "2022-08-11T11:47:17Z", - "updated_at": "2022-08-24T16:04:14Z", + "updated_at": "2022-08-24T21:24:10Z", "pushed_at": "2022-08-23T15:57:41Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 78, + "watchers_count": 78, "forks_count": 25, "allow_forking": true, "is_template": false, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 25, - "watchers": 77, + "watchers": 78, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-36946.json b/2022/CVE-2022-36946.json index 5273e2687e..e561dabef5 100644 --- a/2022/CVE-2022-36946.json +++ b/2022/CVE-2022-36946.json @@ -13,7 +13,7 @@ "description": "CVE-2022-36946 linux kernel panic in netfilter_queue", "fork": false, "created_at": "2022-07-28T11:22:13Z", - "updated_at": "2022-08-11T05:32:54Z", + "updated_at": "2022-08-24T20:46:25Z", "pushed_at": "2022-08-10T13:59:47Z", "stargazers_count": 11, "watchers_count": 11, @@ -26,6 +26,7 @@ "denial-of-service", "kernel", "linux", + "linux-kernel", "security" ], "visibility": "public", diff --git a/README.md b/README.md index 47070dcbf8..139739773a 100644 --- a/README.md +++ b/README.md @@ -3776,6 +3776,14 @@ In ResolverActivity, there is a possible user interaction bypass due to a tapjac - [nanopathi/framework_base_AOSP10_r33_CVE-2021-0954](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0954) +### CVE-2021-1056 (2021-01-07) + + +NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure. + + +- [pokerfaceSad/CVE-2021-1056](https://github.com/pokerfaceSad/CVE-2021-1056) + ### CVE-2021-1585 (2021-07-08) @@ -3784,6 +3792,14 @@ A vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher co - [jbaines-r7/staystaystay](https://github.com/jbaines-r7/staystaystay) +### CVE-2021-1647 (2021-01-12) + + +Microsoft Defender Remote Code Execution Vulnerability + + +- [findcool/cve-2021-1647](https://github.com/findcool/cve-2021-1647) + ### CVE-2021-1656 (2021-01-12) @@ -3892,6 +3908,8 @@ Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Op Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). +- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109) +- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109) - [yuaneuro/CVE-2021-2109_poc](https://github.com/yuaneuro/CVE-2021-2109_poc) - [coco0x0a/CVE-2021-2109](https://github.com/coco0x0a/CVE-2021-2109) @@ -3901,6 +3919,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). +- [Sauercloud/RWCTF21-VirtualBox-61-escape](https://github.com/Sauercloud/RWCTF21-VirtualBox-61-escape) - [chatbottesisgmailh/Sauercloude](https://github.com/chatbottesisgmailh/Sauercloude) - [shi10587s/Sauercloude](https://github.com/shi10587s/Sauercloude) @@ -3950,7 +3969,9 @@ Vulnerability in the Oracle Business Intelligence Enterprise Edition product of ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet. +- [B1anda0/CVE-2021-3019](https://github.com/B1anda0/CVE-2021-3019) - [0xf4n9x/CVE-2021-3019](https://github.com/0xf4n9x/CVE-2021-3019) +- [Maksim-venus/CVE-2021-3019](https://github.com/Maksim-venus/CVE-2021-3019) - [murataydemir/CVE-2021-3019](https://github.com/murataydemir/CVE-2021-3019) - [Aoyuh/cve-2021-3019](https://github.com/Aoyuh/cve-2021-3019) - [givemefivw/CVE-2021-3019](https://github.com/givemefivw/CVE-2021-3019) @@ -3978,6 +3999,9 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic - [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits) +- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129) +- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP) +- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP) - [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit) - [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129) - [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129) @@ -3986,6 +4010,22 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic - [joshuavanderpoll/CVE-2021-3129](https://github.com/joshuavanderpoll/CVE-2021-3129) - [914525753/Laravel-CVE-2021-3129](https://github.com/914525753/Laravel-CVE-2021-3129) +### CVE-2021-3130 (2021-01-20) + + +Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible. + + +- [jet-pentest/CVE-2021-3130](https://github.com/jet-pentest/CVE-2021-3130) + +### CVE-2021-3131 (2021-01-13) + + +The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter. + + +- [jet-pentest/CVE-2021-3131](https://github.com/jet-pentest/CVE-2021-3131) + ### CVE-2021-3138 (2021-01-13) @@ -4000,9 +4040,14 @@ In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2 Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. +- [mr-r3b00t/CVE-2021-3156](https://github.com/mr-r3b00t/CVE-2021-3156) +- [nexcess/sudo_cve-2021-3156](https://github.com/nexcess/sudo_cve-2021-3156) - [reverse-ex/CVE-2021-3156](https://github.com/reverse-ex/CVE-2021-3156) +- [unauth401/CVE-2021-3156](https://github.com/unauth401/CVE-2021-3156) - [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156) +- [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER) - [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit) +- [yaunsky/cve-2021-3156](https://github.com/yaunsky/cve-2021-3156) - [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp) - [ph4ntonn/CVE-2021-3156](https://github.com/ph4ntonn/CVE-2021-3156) - [binw2018/CVE-2021-3156-SCRIPT](https://github.com/binw2018/CVE-2021-3156-SCRIPT) @@ -4053,6 +4098,17 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based - [FrancescoMarchiori/CVE-2021-3156](https://github.com/FrancescoMarchiori/CVE-2021-3156) - [baka9moe/CVE-2021-3156-TestReport](https://github.com/baka9moe/CVE-2021-3156-TestReport) +### CVE-2021-3157 +- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157) + +### CVE-2021-3164 (2021-01-21) + + +ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file via a POST request to resources.php. + + +- [rmccarth/cve-2021-3164](https://github.com/rmccarth/cve-2021-3164) + ### CVE-2021-3165 (2021-01-26)