diff --git a/2012/CVE-2012-2982.json b/2012/CVE-2012-2982.json index 7c17e2f3a4..2bb0405de4 100644 --- a/2012/CVE-2012-2982.json +++ b/2012/CVE-2012-2982.json @@ -105,13 +105,13 @@ "description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution", "fork": false, "created_at": "2021-09-04T04:01:56Z", - "updated_at": "2021-09-07T05:20:53Z", + "updated_at": "2021-09-08T19:47:24Z", "pushed_at": "2021-09-04T07:25:55Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 3, "forks": 3, - "watchers": 6, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 69430eb408..dfc6374586 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -799,8 +799,8 @@ "pushed_at": "2021-02-20T19:41:03Z", "stargazers_count": 60, "watchers_count": 60, - "forks_count": 38, - "forks": 38, + "forks_count": 39, + "forks": 39, "watchers": 60, "score": 0 }, diff --git a/2016/CVE-2016-1828.json b/2016/CVE-2016-1828.json index 719e3109d1..67d93eb6d6 100644 --- a/2016/CVE-2016-1828.json +++ b/2016/CVE-2016-1828.json @@ -13,13 +13,13 @@ "description": "Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.", "fork": false, "created_at": "2016-05-18T03:49:02Z", - "updated_at": "2021-08-04T06:24:07Z", + "updated_at": "2021-09-08T19:17:58Z", "pushed_at": "2016-05-18T03:53:42Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 80, + "watchers_count": 80, "forks_count": 28, "forks": 28, - "watchers": 79, + "watchers": 80, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json index 1617d46fe9..8bd523fb64 100644 --- a/2017/CVE-2017-0144.json +++ b/2017/CVE-2017-0144.json @@ -13,13 +13,13 @@ "description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)", "fork": false, "created_at": "2017-07-16T19:44:04Z", - "updated_at": "2021-09-02T20:21:18Z", + "updated_at": "2021-09-08T20:18:12Z", "pushed_at": "2019-07-23T19:24:01Z", - "stargazers_count": 279, - "watchers_count": 279, + "stargazers_count": 280, + "watchers_count": 280, "forks_count": 112, "forks": 112, - "watchers": 279, + "watchers": 280, "score": 0 }, { diff --git a/2017/CVE-2017-8917.json b/2017/CVE-2017-8917.json index da14f65df9..f1f8d46552 100644 --- a/2017/CVE-2017-8917.json +++ b/2017/CVE-2017-8917.json @@ -36,13 +36,13 @@ "description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ", "fork": false, "created_at": "2017-11-19T16:50:39Z", - "updated_at": "2021-06-13T18:03:09Z", + "updated_at": "2021-09-08T17:53:27Z", "pushed_at": "2021-02-22T05:44:32Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 11, - "forks": 11, - "watchers": 11, + "stargazers_count": 12, + "watchers_count": 12, + "forks_count": 12, + "forks": 12, + "watchers": 12, "score": 0 }, { diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index 89a2827bab..10a5ed856c 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -174,13 +174,13 @@ "description": "Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)", "fork": false, "created_at": "2021-03-25T20:09:54Z", - "updated_at": "2021-09-04T00:45:03Z", + "updated_at": "2021-09-08T15:33:32Z", "pushed_at": "2021-09-04T00:45:00Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 4, - "forks": 4, - "watchers": 1, + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 5, + "forks": 5, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0604.json b/2019/CVE-2019-0604.json index 7b23a2f62a..6877279093 100644 --- a/2019/CVE-2019-0604.json +++ b/2019/CVE-2019-0604.json @@ -59,13 +59,13 @@ "description": "cve-2019-0604 SharePoint RCE exploit", "fork": false, "created_at": "2019-06-26T15:00:29Z", - "updated_at": "2021-07-19T01:26:08Z", + "updated_at": "2021-09-08T20:41:51Z", "pushed_at": "2019-10-18T14:49:10Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 94, + "watchers_count": 94, "forks_count": 66, "forks": 66, - "watchers": 93, + "watchers": 94, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 664027ea23..4511ae67b3 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -17,8 +17,8 @@ "pushed_at": "2019-05-15T14:23:11Z", "stargazers_count": 43, "watchers_count": 43, - "forks_count": 16, - "forks": 16, + "forks_count": 17, + "forks": 17, "watchers": 43, "score": 0 }, diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json index 7ba289238a..ae5def1c33 100644 --- a/2019/CVE-2019-12586.json +++ b/2019/CVE-2019-12586.json @@ -13,13 +13,13 @@ "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)", "fork": false, "created_at": "2019-09-03T15:08:49Z", - "updated_at": "2021-09-03T07:40:23Z", + "updated_at": "2021-09-08T17:19:19Z", "pushed_at": "2019-09-08T06:09:11Z", - "stargazers_count": 698, - "watchers_count": 698, + "stargazers_count": 699, + "watchers_count": 699, "forks_count": 59, "forks": 59, - "watchers": 698, + "watchers": 699, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-12840.json b/2019/CVE-2019-12840.json index 2b3c98f466..5d05b450e1 100644 --- a/2019/CVE-2019-12840.json +++ b/2019/CVE-2019-12840.json @@ -82,8 +82,8 @@ "description": "CVE-2019-12840", "fork": false, "created_at": "2021-03-30T17:32:30Z", - "updated_at": "2021-06-26T09:15:25Z", - "pushed_at": "2021-06-26T09:15:23Z", + "updated_at": "2021-09-08T15:35:07Z", + "pushed_at": "2021-09-08T15:35:04Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index 830fbb2ade..475bd8027d 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -312,13 +312,13 @@ "description": null, "fork": false, "created_at": "2020-11-09T21:46:57Z", - "updated_at": "2021-08-16T21:54:07Z", + "updated_at": "2021-09-08T17:51:15Z", "pushed_at": "2021-02-07T19:51:24Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 4, "forks": 4, - "watchers": 14, + "watchers": 13, "score": 0 }, { diff --git a/2019/CVE-2019-17564.json b/2019/CVE-2019-17564.json index 9693aebc11..2af570d649 100644 --- a/2019/CVE-2019-17564.json +++ b/2019/CVE-2019-17564.json @@ -106,7 +106,7 @@ "fork": false, "created_at": "2020-02-20T08:28:55Z", "updated_at": "2021-01-06T06:12:28Z", - "pushed_at": "2020-02-20T11:49:35Z", + "pushed_at": "2021-09-08T20:28:35Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 2, diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index 9fc644c87e..436a6c8279 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -36,13 +36,13 @@ "description": "Proof of Concept for CVE-2019-18634", "fork": false, "created_at": "2020-02-07T18:07:03Z", - "updated_at": "2021-08-23T01:16:26Z", + "updated_at": "2021-09-08T17:55:06Z", "pushed_at": "2020-06-04T13:17:10Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 112, + "watchers_count": 112, "forks_count": 40, "forks": 40, - "watchers": 113, + "watchers": 112, "score": 0 }, { diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 165de1e41d..6273b1d14f 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -40,8 +40,8 @@ "pushed_at": "2021-08-02T03:02:25Z", "stargazers_count": 208, "watchers_count": 208, - "forks_count": 59, - "forks": 59, + "forks_count": 58, + "forks": 58, "watchers": 208, "score": 0 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index cba0d1d6a9..97493993d5 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -82,13 +82,13 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2021-09-01T01:59:15Z", + "updated_at": "2021-09-08T17:07:59Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 780, - "watchers_count": 780, + "stargazers_count": 781, + "watchers_count": 781, "forks_count": 164, "forks": 164, - "watchers": 780, + "watchers": 781, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index c8d698413e..8c8edd1a97 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -335,13 +335,13 @@ "description": "PoC for triggering buffer overflow via CVE-2020-0796", "fork": false, "created_at": "2020-03-12T18:34:40Z", - "updated_at": "2021-08-12T05:06:28Z", + "updated_at": "2021-09-08T17:13:56Z", "pushed_at": "2020-03-14T10:04:59Z", - "stargazers_count": 275, - "watchers_count": 275, + "stargazers_count": 276, + "watchers_count": 276, "forks_count": 110, "forks": 110, - "watchers": 275, + "watchers": 276, "score": 0 }, { @@ -841,13 +841,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-09-06T12:34:57Z", + "updated_at": "2021-09-08T16:04:29Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1146, - "watchers_count": 1146, + "stargazers_count": 1147, + "watchers_count": 1147, "forks_count": 359, "forks": 359, - "watchers": 1146, + "watchers": 1147, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 62cdf82bc3..6e1fa4424f 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2021-09-08T14:24:24Z", + "updated_at": "2021-09-08T17:43:09Z", "pushed_at": "2020-10-21T12:10:28Z", - "stargazers_count": 1336, - "watchers_count": 1336, + "stargazers_count": 1338, + "watchers_count": 1338, "forks_count": 304, "forks": 304, - "watchers": 1336, + "watchers": 1338, "score": 0 }, { diff --git a/2020/CVE-2020-1948.json b/2020/CVE-2020-1948.json index 88346293c3..49cc0e41e8 100644 --- a/2020/CVE-2020-1948.json +++ b/2020/CVE-2020-1948.json @@ -83,7 +83,7 @@ "fork": false, "created_at": "2020-07-14T02:42:41Z", "updated_at": "2021-04-12T09:08:27Z", - "pushed_at": "2021-08-25T15:51:41Z", + "pushed_at": "2021-09-08T20:31:12Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 5, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 2dc0f65d08..9eda4ee7b4 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -220,13 +220,13 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-09-08T06:11:19Z", + "updated_at": "2021-09-08T16:04:17Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 594, - "watchers_count": 594, + "stargazers_count": 595, + "watchers_count": 595, "forks_count": 159, "forks": 159, - "watchers": 594, + "watchers": 595, "score": 0 }, { @@ -703,13 +703,13 @@ "description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。", "fork": false, "created_at": "2021-09-01T11:25:04Z", - "updated_at": "2021-09-08T10:38:56Z", + "updated_at": "2021-09-08T18:18:08Z", "pushed_at": "2021-09-01T11:25:22Z", - "stargazers_count": 84, - "watchers_count": 84, + "stargazers_count": 85, + "watchers_count": 85, "forks_count": 10, "forks": 10, - "watchers": 84, + "watchers": 85, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22192.json b/2021/CVE-2021-22192.json index b483312388..eb41ef697f 100644 --- a/2021/CVE-2021-22192.json +++ b/2021/CVE-2021-22192.json @@ -36,13 +36,13 @@ "description": "CVE-2021-22192", "fork": false, "created_at": "2021-04-22T09:35:57Z", - "updated_at": "2021-09-08T03:20:09Z", + "updated_at": "2021-09-08T16:48:38Z", "pushed_at": "2021-04-28T04:39:38Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 2, "forks": 2, - "watchers": 9, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 7c1ed17227..ec97ffec41 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2021-08-31T23:33:44Z", - "updated_at": "2021-09-07T16:46:11Z", + "updated_at": "2021-09-08T17:13:53Z", "pushed_at": "2021-09-01T01:01:06Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "forks_count": 12, "forks": 12, - "watchers": 39, + "watchers": 40, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Confluence Server Webwork OGNL injection", "fork": false, "created_at": "2021-09-01T07:15:17Z", - "updated_at": "2021-09-08T14:41:53Z", + "updated_at": "2021-09-08T21:09:22Z", "pushed_at": "2021-09-04T22:14:46Z", - "stargazers_count": 202, - "watchers_count": 202, - "forks_count": 43, - "forks": 43, - "watchers": 202, + "stargazers_count": 204, + "watchers_count": 204, + "forks_count": 47, + "forks": 47, + "watchers": 204, "score": 0 }, { @@ -178,8 +178,8 @@ "pushed_at": "2021-09-02T07:36:51Z", "stargazers_count": 28, "watchers_count": 28, - "forks_count": 12, - "forks": 12, + "forks_count": 13, + "forks": 13, "watchers": 28, "score": 0 }, @@ -569,8 +569,8 @@ "pushed_at": "2021-09-07T12:59:45Z", "stargazers_count": 26, "watchers_count": 26, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 26, "score": 0 }, @@ -642,5 +642,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 404430174, + "name": "CVE-2021-26084-patch-", + "full_name": "nizarbamida\/CVE-2021-26084-patch-", + "owner": { + "login": "nizarbamida", + "id": 44277400, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44277400?v=4", + "html_url": "https:\/\/github.com\/nizarbamida" + }, + "html_url": "https:\/\/github.com\/nizarbamida\/CVE-2021-26084-patch-", + "description": "CVE-2021-26084 patch as provided in \"Confluence Security Advisory - 2021-08-25\"", + "fork": false, + "created_at": "2021-09-08T17:05:16Z", + "updated_at": "2021-09-08T17:29:07Z", + "pushed_at": "2021-09-08T17:28:47Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index 0129e39c1e..a898af1f97 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -59,8 +59,8 @@ "description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.", "fork": false, "created_at": "2021-08-15T11:10:40Z", - "updated_at": "2021-08-15T17:29:21Z", - "pushed_at": "2021-08-15T11:44:02Z", + "updated_at": "2021-09-08T19:21:11Z", + "pushed_at": "2021-09-08T19:21:07Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 5540fc827c..77f512aacb 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,13 +13,13 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2021-09-07T09:07:57Z", + "updated_at": "2021-09-08T20:40:58Z", "pushed_at": "2021-06-12T08:27:09Z", - "stargazers_count": 772, - "watchers_count": 772, + "stargazers_count": 773, + "watchers_count": 773, "forks_count": 127, "forks": 127, - "watchers": 772, + "watchers": 773, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index e48fead716..f981742cd2 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -335,13 +335,13 @@ "description": "PoC for CVE-2021-3156 (sudo heap overflow)", "fork": false, "created_at": "2021-01-30T03:22:04Z", - "updated_at": "2021-09-07T17:10:50Z", + "updated_at": "2021-09-08T17:41:35Z", "pushed_at": "2021-02-08T03:42:50Z", - "stargazers_count": 409, - "watchers_count": 409, + "stargazers_count": 410, + "watchers_count": 410, "forks_count": 115, "forks": 115, - "watchers": 409, + "watchers": 410, "score": 0 }, { diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 34aad58180..cb98e4bee3 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -224,8 +224,8 @@ "pushed_at": "2021-08-20T01:54:22Z", "stargazers_count": 635, "watchers_count": 635, - "forks_count": 84, - "forks": 84, + "forks_count": 85, + "forks": 85, "watchers": 635, "score": 0 }, diff --git a/README.md b/README.md index 986ef2b50b..eb570e44e3 100644 --- a/README.md +++ b/README.md @@ -1018,6 +1018,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - [GlennPegden2/cve-2021-26084-confluence](https://github.com/GlennPegden2/cve-2021-26084-confluence) - [dock0d1/CVE-2021-26084_Confluence](https://github.com/dock0d1/CVE-2021-26084_Confluence) - [toowoxx/docker-confluence-patched](https://github.com/toowoxx/docker-confluence-patched) +- [nizarbamida/CVE-2021-26084-patch-](https://github.com/nizarbamida/CVE-2021-26084-patch-) ### CVE-2021-26119 (2021-02-21)