diff --git a/2018/CVE-2018-6789.json b/2018/CVE-2018-6789.json index 0f71955828..47d9d43406 100644 --- a/2018/CVE-2018-6789.json +++ b/2018/CVE-2018-6789.json @@ -67,17 +67,17 @@ "description": "PoC materials to exploit CVE-2018-6789", "fork": false, "created_at": "2019-10-10T09:36:03Z", - "updated_at": "2021-08-17T18:24:33Z", + "updated_at": "2021-11-02T20:35:40Z", "pushed_at": "2019-10-10T09:54:07Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 9, + "watchers": 8, "score": 0 }, { diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index 07ae5b660a..f4b8d21549 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -13,17 +13,17 @@ "description": "(CVE-2018-9995) Get DVR Credentials", "fork": false, "created_at": "2018-04-29T20:00:06Z", - "updated_at": "2021-10-14T20:46:17Z", + "updated_at": "2021-11-02T21:52:26Z", "pushed_at": "2019-01-23T14:27:21Z", - "stargazers_count": 458, - "watchers_count": 458, + "stargazers_count": 459, + "watchers_count": 459, "forks_count": 189, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 189, - "watchers": 458, + "watchers": 459, "score": 0 }, { @@ -148,17 +148,17 @@ "description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995", "fork": false, "created_at": "2018-09-23T20:58:40Z", - "updated_at": "2021-10-24T13:42:35Z", + "updated_at": "2021-11-02T21:47:31Z", "pushed_at": "2018-10-11T16:54:31Z", - "stargazers_count": 86, - "watchers_count": 86, + "stargazers_count": 87, + "watchers_count": 87, "forks_count": 42, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 42, - "watchers": 86, + "watchers": 87, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index ac54bdff4d..4c78b3eaf0 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -545,17 +545,17 @@ "description": "PHP-FPM Remote Command Execution Exploit", "fork": false, "created_at": "2020-11-18T07:25:37Z", - "updated_at": "2020-11-20T10:54:40Z", + "updated_at": "2021-11-02T20:02:01Z", "pushed_at": "2020-11-20T10:53:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 0, + "forks": 2, + "watchers": 1, "score": 0 }, { diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index b6b4476499..17755e2ec6 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -17,12 +17,12 @@ "pushed_at": "2020-02-19T03:47:33Z", "stargazers_count": 55, "watchers_count": 55, - "forks_count": 19, + "forks_count": 18, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 19, + "forks": 18, "watchers": 55, "score": 0 }, diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index 41a2c730f1..2856108ae9 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -186,12 +186,12 @@ "pushed_at": "2020-03-22T15:14:31Z", "stargazers_count": 339, "watchers_count": 339, - "forks_count": 87, + "forks_count": 86, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 87, + "forks": 86, "watchers": 339, "score": 0 }, diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 21e702dd15..7b11e8635b 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,17 +13,17 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2021-11-01T15:14:53Z", + "updated_at": "2021-11-02T22:04:45Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 576, - "watchers_count": 576, + "stargazers_count": 575, + "watchers_count": 575, "forks_count": 151, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 151, - "watchers": 576, + "watchers": 575, "score": 0 }, { diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json index 0c804dac37..89e43703ca 100644 --- a/2020/CVE-2020-3952.json +++ b/2020/CVE-2020-3952.json @@ -67,17 +67,17 @@ "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", - "updated_at": "2021-10-20T14:15:12Z", + "updated_at": "2021-11-02T21:09:11Z", "pushed_at": "2020-04-16T08:38:42Z", - "stargazers_count": 250, - "watchers_count": 250, + "stargazers_count": 251, + "watchers_count": 251, "forks_count": 59, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 59, - "watchers": 250, + "watchers": 251, "score": 0 }, { diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 79e0c854e7..e8f0387c4b 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -274,17 +274,17 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-10-29T17:57:22Z", + "updated_at": "2021-11-02T18:19:29Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 674, - "watchers_count": 674, - "forks_count": 179, + "stargazers_count": 675, + "watchers_count": 675, + "forks_count": 180, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 179, - "watchers": 674, + "forks": 180, + "watchers": 675, "score": 0 }, { diff --git a/2021/CVE-2021-1748.json b/2021/CVE-2021-1748.json index 4ef09f554e..4647846d60 100644 --- a/2021/CVE-2021-1748.json +++ b/2021/CVE-2021-1748.json @@ -40,17 +40,17 @@ "description": "Backporting CVE-2021-1748 patch for iOS <=14.3", "fork": false, "created_at": "2021-09-03T22:48:11Z", - "updated_at": "2021-10-24T05:42:07Z", + "updated_at": "2021-11-02T21:56:38Z", "pushed_at": "2021-09-03T22:50:08Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 19, + "watchers": 20, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-20837.json b/2021/CVE-2021-20837.json index 5a7c36403f..ab17aaa55a 100644 --- a/2021/CVE-2021-20837.json +++ b/2021/CVE-2021-20837.json @@ -40,8 +40,8 @@ "description": "XMLRPC - RCE in MovableTypePoC", "fork": false, "created_at": "2021-10-30T09:15:56Z", - "updated_at": "2021-11-01T17:27:14Z", - "pushed_at": "2021-11-01T17:27:12Z", + "updated_at": "2021-11-02T18:53:38Z", + "pushed_at": "2021-11-02T18:53:36Z", "stargazers_count": 13, "watchers_count": 13, "forks_count": 6, diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 314fc328fe..c8870e2074 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-06-05T15:42:16Z", - "updated_at": "2021-11-02T14:45:27Z", + "updated_at": "2021-11-03T00:01:25Z", "pushed_at": "2021-11-02T14:45:24Z", - "stargazers_count": 138, - "watchers_count": 138, - "forks_count": 28, + "stargazers_count": 139, + "watchers_count": 139, + "forks_count": 29, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 28, - "watchers": 138, + "forks": 29, + "watchers": 139, "score": 0 }, { @@ -121,10 +121,10 @@ "description": "CVE-2021-22205& GitLab CE\/EE RCE", "fork": false, "created_at": "2021-10-29T04:30:45Z", - "updated_at": "2021-11-02T16:10:23Z", + "updated_at": "2021-11-03T00:01:23Z", "pushed_at": "2021-10-29T04:31:15Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "forks_count": 13, "allow_forking": true, "is_template": false, @@ -133,7 +133,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 25, + "watchers": 26, "score": 0 }, { @@ -264,12 +264,12 @@ "pushed_at": "2021-10-31T15:40:34Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 3, "score": 0 }, @@ -291,12 +291,12 @@ "pushed_at": "2021-11-01T05:47:27Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 }, diff --git a/2021/CVE-2021-24086.json b/2021/CVE-2021-24086.json index 806fe909d2..8cf4e7c4c8 100644 --- a/2021/CVE-2021-24086.json +++ b/2021/CVE-2021-24086.json @@ -13,11 +13,11 @@ "description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.", "fork": false, "created_at": "2021-04-07T11:10:40Z", - "updated_at": "2021-10-21T12:34:16Z", + "updated_at": "2021-11-02T22:48:54Z", "pushed_at": "2021-04-15T12:46:54Z", - "stargazers_count": 190, - "watchers_count": 190, - "forks_count": 44, + "stargazers_count": 191, + "watchers_count": 191, + "forks_count": 45, "allow_forking": true, "is_template": false, "topics": [ @@ -28,8 +28,8 @@ "tcpip" ], "visibility": "public", - "forks": 44, - "watchers": 190, + "forks": 45, + "watchers": 191, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-30858.json b/2021/CVE-2021-30858.json index d698866283..4c5157b992 100644 --- a/2021/CVE-2021-30858.json +++ b/2021/CVE-2021-30858.json @@ -13,17 +13,17 @@ "description": "Testing CVE-2021-30858 Rev3", "fork": false, "created_at": "2021-10-14T01:51:39Z", - "updated_at": "2021-10-14T22:07:49Z", + "updated_at": "2021-11-02T22:09:15Z", "pushed_at": "2021-10-14T22:07:47Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index d9d1074e00..e97c40789c 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -229,17 +229,17 @@ "description": null, "fork": false, "created_at": "2021-10-05T23:53:48Z", - "updated_at": "2021-10-25T05:19:37Z", + "updated_at": "2021-11-02T18:29:15Z", "pushed_at": "2021-10-06T15:37:23Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 17, - "watchers": 33, + "watchers": 34, "score": 0 }, { @@ -931,12 +931,12 @@ "pushed_at": "2021-10-10T09:14:27Z", "stargazers_count": 22, "watchers_count": 22, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 15, + "forks": 16, "watchers": 22, "score": 0 }, diff --git a/2021/CVE-2021-42574.json b/2021/CVE-2021-42574.json index 5e873d4b19..3e9d8da0b9 100644 --- a/2021/CVE-2021-42574.json +++ b/2021/CVE-2021-42574.json @@ -67,8 +67,8 @@ "description": "Generate malicious files using recently published bidi-attack (CVE-2021-42574)", "fork": false, "created_at": "2021-11-02T15:32:38Z", - "updated_at": "2021-11-02T15:44:19Z", - "pushed_at": "2021-11-02T15:44:16Z", + "updated_at": "2021-11-02T23:44:44Z", + "pushed_at": "2021-11-02T23:44:41Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-42694.json b/2021/CVE-2021-42694.json new file mode 100644 index 0000000000..030face773 --- /dev/null +++ b/2021/CVE-2021-42694.json @@ -0,0 +1,29 @@ +[ + { + "id": 423992286, + "name": "CVE-2021-42694", + "full_name": "js-on\/CVE-2021-42694", + "owner": { + "login": "js-on", + "id": 55274241, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4", + "html_url": "https:\/\/github.com\/js-on" + }, + "html_url": "https:\/\/github.com\/js-on\/CVE-2021-42694", + "description": "Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)", + "fork": false, + "created_at": "2021-11-02T20:39:47Z", + "updated_at": "2021-11-02T20:40:20Z", + "pushed_at": "2021-11-02T20:40:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index 899805f6ee..7234131863 100644 --- a/README.md +++ b/README.md @@ -2493,7 +2493,12 @@ A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in - [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833) -### CVE-2021-37980 +### CVE-2021-37980 (2021-11-02) + + +Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows. + + - [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980) ### CVE-2021-38149 (2021-08-06) @@ -3104,6 +3109,14 @@ An issue was discovered in the Bidirectional Algorithm in the Unicode Specificat - [hffaust/CVE-2021-42574_and_CVE-2021-42694](https://github.com/hffaust/CVE-2021-42574_and_CVE-2021-42694) - [js-on/CVE-2021-42574](https://github.com/js-on/CVE-2021-42574) +### CVE-2021-42694 (2021-10-31) + + +An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software. + + +- [js-on/CVE-2021-42694](https://github.com/js-on/CVE-2021-42694) + ### CVE-2021-43032 - [SakuraSamuraii/CVE-2021-43032](https://github.com/SakuraSamuraii/CVE-2021-43032) @@ -15226,7 +15239,12 @@ Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56. - [Ang-YC/CVE-2017-5007](https://github.com/Ang-YC/CVE-2017-5007) -### CVE-2017-5123 +### CVE-2017-5123 (2021-11-02) + + +Insufficient data validation in waitid allowed an user to escape sandboxes on Linux. + + - [FloatingGuy/CVE-2017-5123](https://github.com/FloatingGuy/CVE-2017-5123) - [0x5068656e6f6c/CVE-2017-5123](https://github.com/0x5068656e6f6c/CVE-2017-5123) - [Synacktiv-contrib/exploiting-cve-2017-5123](https://github.com/Synacktiv-contrib/exploiting-cve-2017-5123)