From 40bab6838823349f0d45dc61e4c3393c56dcc2c2 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Thu, 7 Oct 2021 00:13:09 +0900 Subject: [PATCH] Auto Update 2021/10/07 00:13:09 --- 2006/CVE-2006-4468.json | 27 - 2006/CVE-2006-4469.json | 27 - 2006/CVE-2006-4470.json | 27 - 2006/CVE-2006-4471.json | 27 - 2006/CVE-2006-4472.json | 27 - 2007/CVE-2007-4188.json | 27 - 2007/CVE-2007-4189.json | 27 - 2007/CVE-2007-4190.json | 27 - 2007/CVE-2007-5577.json | 27 - 2008/CVE-2008-4796.json | 27 - 2010/CVE-2010-4756.json | 27 - 2012/CVE-2012-0881.json | 27 - 2013/CVE-2013-0340.json | 27 - 2013/CVE-2013-1914.json | 27 - 2013/CVE-2013-2763.json | 27 - 2013/CVE-2013-6276.json | 27 - 2013/CVE-2013-7423.json | 27 - 2014/CVE-2014-0160.json | 8 +- 2014/CVE-2014-3704.json | 25 - 2014/CVE-2014-4611.json | 27 - 2015/CVE-2015-0235.json | 25 - 2015/CVE-2015-7547.json | 25 - 2016/CVE-2016-10033.json | 25 - 2016/CVE-2016-10045.json | 27 - 2016/CVE-2016-1234.json | 27 - 2016/CVE-2016-20012.json | 27 - 2016/CVE-2016-2568.json | 27 - 2016/CVE-2016-3720.json | 27 - 2016/CVE-2016-4529.json | 27 - 2016/CVE-2016-5195.json | 4 +- 2016/CVE-2016-5385.json | 27 - 2016/CVE-2016-6555.json | 27 - 2016/CVE-2016-6556.json | 27 - 2016/CVE-2016-7190.json | 8 +- 2017/CVE-2017-11189.json | 27 - 2017/CVE-2017-12613.json | 27 - 2017/CVE-2017-12617.json | 4 +- 2017/CVE-2017-12678.json | 27 - 2017/CVE-2017-14121.json | 27 - 2017/CVE-2017-5638.json | 4 +- 2017/CVE-2017-6026.json | 27 - 2017/CVE-2017-6028.json | 27 - 2017/CVE-2017-6030.json | 27 - 2018/CVE-2018-10023.json | 27 - 2018/CVE-2018-11439.json | 27 - 2018/CVE-2018-14773.json | 27 - 2018/CVE-2018-16177.json | 27 - 2018/CVE-2018-16871.json | 27 - 2018/CVE-2018-20217.json | 27 - 2018/CVE-2018-5729.json | 27 - 2018/CVE-2018-5730.json | 27 - 2018/CVE-2018-6242.json | 8 +- 2018/CVE-2018-7789.json | 27 - 2018/CVE-2018-7790.json | 27 - 2018/CVE-2018-7821.json | 27 - 2018/CVE-2018-7842.json | 27 - 2018/CVE-2018-8256.json | 27 - 2019/CVE-2019-0205.json | 27 - 2019/CVE-2019-0227.json | 25 - 2019/CVE-2019-10095.json | 27 - 2019/CVE-2019-10156.json | 27 - 2019/CVE-2019-10172.json | 25 - 2019/CVE-2019-10181.json | 27 - 2019/CVE-2019-10206.json | 27 - 2019/CVE-2019-10910.json | 27 - 2019/CVE-2019-10911.json | 27 - 2019/CVE-2019-10953.json | 27 - 2019/CVE-2019-11358.json | 25 - 2019/CVE-2019-11595.json | 27 - 2019/CVE-2019-11708.json | 8 +- 2019/CVE-2019-11831.json | 27 - 2019/CVE-2019-12823.json | 27 - 2019/CVE-2019-14846.json | 27 - 2019/CVE-2019-14864.json | 27 - 2019/CVE-2019-14904.json | 27 - 2019/CVE-2019-17495.json | 25 - 2019/CVE-2019-17571.json | 25 - 2019/CVE-2019-18413.json | 27 - 2019/CVE-2019-19797.json | 27 - 2019/CVE-2019-25052.json | 27 - 2019/CVE-2019-3820.json | 27 - 2019/CVE-2019-6447.json | 8 +- 2019/CVE-2019-6820.json | 27 - 2019/CVE-2019-7254.json | 27 - 2019/CVE-2019-9060.json | 27 - 2020/CVE-2020-10684.json | 27 - 2020/CVE-2020-10685.json | 27 - 2020/CVE-2020-10729.json | 27 - 2020/CVE-2020-12080.json | 27 - 2020/CVE-2020-12082.json | 27 - 2020/CVE-2020-12083.json | 27 - 2020/CVE-2020-13929.json | 27 - 2020/CVE-2020-13936.json | 27 - 2020/CVE-2020-13949.json | 27 - 2020/CVE-2020-13959.json | 27 - 2020/CVE-2020-14119.json | 27 - 2020/CVE-2020-14124.json | 27 - 2020/CVE-2020-1416.json | 27 - 2020/CVE-2020-14308.json | 27 - 2020/CVE-2020-14311.json | 27 - 2020/CVE-2020-14330.json | 27 - 2020/CVE-2020-14332.json | 27 - 2020/CVE-2020-14343.json | 25 - 2020/CVE-2020-14365.json | 27 - 2020/CVE-2020-14386.json | 25 - 2020/CVE-2020-14409.json | 27 - 2020/CVE-2020-14410.json | 27 - 2020/CVE-2020-1472.json | 8 +- 2020/CVE-2020-15250.json | 27 - 2020/CVE-2020-15256.json | 27 - 2020/CVE-2020-15705.json | 27 - 2020/CVE-2020-15744.json | 27 - 2020/CVE-2020-1733.json | 27 - 2020/CVE-2020-1735.json | 27 - 2020/CVE-2020-1739.json | 27 - 2020/CVE-2020-1740.json | 27 - 2020/CVE-2020-1746.json | 27 - 2020/CVE-2020-1753.json | 27 - 2020/CVE-2020-18683.json | 27 - 2020/CVE-2020-18685.json | 27 - 2020/CVE-2020-18913.json | 27 - 2020/CVE-2020-19143.json | 27 - 2020/CVE-2020-19144.json | 27 - 2020/CVE-2020-19551.json | 27 - 2020/CVE-2020-19553.json | 27 - 2020/CVE-2020-19554.json | 27 - 2020/CVE-2020-19822.json | 27 - 2020/CVE-2020-19915.json | 27 - 2020/CVE-2020-19949.json | 27 - 2020/CVE-2020-19950.json | 27 - 2020/CVE-2020-19951.json | 27 - 2020/CVE-2020-20128.json | 27 - 2020/CVE-2020-20129.json | 27 - 2020/CVE-2020-20131.json | 27 - 2020/CVE-2020-20508.json | 27 - 2020/CVE-2020-20514.json | 27 - 2020/CVE-2020-20662.json | 27 - 2020/CVE-2020-20663.json | 27 - 2020/CVE-2020-20664.json | 27 - 2020/CVE-2020-20665.json | 27 - 2020/CVE-2020-20692.json | 27 - 2020/CVE-2020-20693.json | 27 - 2020/CVE-2020-20695.json | 27 - 2020/CVE-2020-20696.json | 27 - 2020/CVE-2020-20781.json | 27 - 2020/CVE-2020-20796.json | 27 - 2020/CVE-2020-20797.json | 27 - 2020/CVE-2020-20799.json | 27 - 2020/CVE-2020-20902.json | 27 - 2020/CVE-2020-21121.json | 27 - 2020/CVE-2020-21122.json | 27 - 2020/CVE-2020-21124.json | 27 - 2020/CVE-2020-21125.json | 27 - 2020/CVE-2020-21321.json | 27 - 2020/CVE-2020-21322.json | 27 - 2020/CVE-2020-21468.json | 27 - 2020/CVE-2020-21480.json | 27 - 2020/CVE-2020-21481.json | 27 - 2020/CVE-2020-21482.json | 27 - 2020/CVE-2020-21483.json | 27 - 2020/CVE-2020-21529.json | 27 - 2020/CVE-2020-21530.json | 27 - 2020/CVE-2020-21531.json | 27 - 2020/CVE-2020-21532.json | 27 - 2020/CVE-2020-21533.json | 27 - 2020/CVE-2020-21534.json | 27 - 2020/CVE-2020-21535.json | 27 - 2020/CVE-2020-21547.json | 27 - 2020/CVE-2020-21548.json | 27 - 2020/CVE-2020-21564.json | 27 - 2020/CVE-2020-21594.json | 27 - 2020/CVE-2020-21595.json | 27 - 2020/CVE-2020-21596.json | 27 - 2020/CVE-2020-21597.json | 27 - 2020/CVE-2020-21598.json | 27 - 2020/CVE-2020-21599.json | 27 - 2020/CVE-2020-21600.json | 27 - 2020/CVE-2020-21601.json | 27 - 2020/CVE-2020-21602.json | 27 - 2020/CVE-2020-21603.json | 27 - 2020/CVE-2020-21604.json | 27 - 2020/CVE-2020-21605.json | 27 - 2020/CVE-2020-21606.json | 27 - 2020/CVE-2020-21675.json | 27 - 2020/CVE-2020-21676.json | 27 - 2020/CVE-2020-21784.json | 27 - 2020/CVE-2020-21787.json | 27 - 2020/CVE-2020-21913.json | 27 - 2020/CVE-2020-21936.json | 27 - 2020/CVE-2020-23266.json | 27 - 2020/CVE-2020-23267.json | 27 - 2020/CVE-2020-23269.json | 27 - 2020/CVE-2020-23273.json | 27 - 2020/CVE-2020-23478.json | 27 - 2020/CVE-2020-23481.json | 27 - 2020/CVE-2020-23659.json | 27 - 2020/CVE-2020-24327.json | 27 - 2020/CVE-2020-24511.json | 27 - 2020/CVE-2020-24512.json | 27 - 2020/CVE-2020-24574.json | 27 - 2020/CVE-2020-2551.json | 8 +- 2020/CVE-2020-25649.json | 27 - 2020/CVE-2020-25901.json | 27 - 2020/CVE-2020-26181.json | 27 - 2020/CVE-2020-26301.json | 27 - 2020/CVE-2020-26556.json | 27 - 2020/CVE-2020-26558.json | 27 - 2020/CVE-2020-27153.json | 27 - 2020/CVE-2020-27339.json | 27 - 2020/CVE-2020-27942.json | 27 - 2020/CVE-2020-28020.json | 27 - 2020/CVE-2020-28214.json | 27 - 2020/CVE-2020-28220.json | 27 - 2020/CVE-2020-28480.json | 27 - 2020/CVE-2020-28589.json | 27 - 2020/CVE-2020-3204.json | 27 - 2020/CVE-2020-3206.json | 27 - 2020/CVE-2020-3214.json | 27 - 2020/CVE-2020-3217.json | 27 - 2020/CVE-2020-3218.json | 27 - 2020/CVE-2020-3219.json | 27 - 2020/CVE-2020-3221.json | 27 - 2020/CVE-2020-3225.json | 27 - 2020/CVE-2020-3226.json | 27 - 2020/CVE-2020-3228.json | 27 - 2020/CVE-2020-3230.json | 27 - 2020/CVE-2020-3235.json | 27 - 2020/CVE-2020-3238.json | 27 - 2020/CVE-2020-3242.json | 27 - 2020/CVE-2020-3244.json | 27 - 2020/CVE-2020-3259.json | 27 - 2020/CVE-2020-3263.json | 27 - 2020/CVE-2020-3272.json | 27 - 2020/CVE-2020-3283.json | 27 - 2020/CVE-2020-3304.json | 27 - 2020/CVE-2020-3307.json | 27 - 2020/CVE-2020-3379.json | 27 - 2020/CVE-2020-3383.json | 27 - 2020/CVE-2020-3387.json | 27 - 2020/CVE-2020-3391.json | 27 - 2020/CVE-2020-3398.json | 27 - 2020/CVE-2020-3426.json | 27 - 2020/CVE-2020-3429.json | 27 - 2020/CVE-2020-3434.json | 27 - 2020/CVE-2020-3435.json | 27 - 2020/CVE-2020-3441.json | 27 - 2020/CVE-2020-3444.json | 27 - 2020/CVE-2020-3451.json | 27 - 2020/CVE-2020-3452.json | 25 - 2020/CVE-2020-3453.json | 27 - 2020/CVE-2020-3465.json | 27 - 2020/CVE-2020-3470.json | 27 - 2020/CVE-2020-3471.json | 27 - 2020/CVE-2020-3472.json | 27 - 2020/CVE-2020-3475.json | 27 - 2020/CVE-2020-3477.json | 27 - 2020/CVE-2020-36193.json | 27 - 2020/CVE-2020-36277.json | 27 - 2020/CVE-2020-36278.json | 27 - 2020/CVE-2020-36279.json | 27 - 2020/CVE-2020-36280.json | 27 - 2020/CVE-2020-36281.json | 27 - 2020/CVE-2020-3960.json | 27 - 2020/CVE-2020-4690.json | 27 - 2020/CVE-2020-4803.json | 27 - 2020/CVE-2020-4805.json | 27 - 2020/CVE-2020-4809.json | 27 - 2020/CVE-2020-4941.json | 27 - 2020/CVE-2020-4944.json | 27 - 2020/CVE-2020-5398.json | 25 - 2020/CVE-2020-5902.json | 8 +- 2020/CVE-2020-7524.json | 27 - 2020/CVE-2020-7565.json | 27 - 2020/CVE-2020-7566.json | 27 - 2020/CVE-2020-8561.json | 27 - 2020/CVE-2020-8955.json | 27 - 2020/CVE-2020-9281.json | 27 - 2020/CVE-2020-9759.json | 27 - 2020/CVE-2020-9760.json | 27 - 2021/CVE-2021-0002.json | 27 - 2021/CVE-2021-0006.json | 27 - 2021/CVE-2021-0007.json | 27 - 2021/CVE-2021-0008.json | 27 - 2021/CVE-2021-0009.json | 27 - 2021/CVE-2021-0012.json | 27 - 2021/CVE-2021-0061.json | 27 - 2021/CVE-2021-0062.json | 27 - 2021/CVE-2021-0114.json | 27 - 2021/CVE-2021-0129.json | 27 - 2021/CVE-2021-0422.json | 27 - 2021/CVE-2021-0423.json | 27 - 2021/CVE-2021-0424.json | 27 - 2021/CVE-2021-0425.json | 27 - 2021/CVE-2021-0610.json | 27 - 2021/CVE-2021-0611.json | 27 - 2021/CVE-2021-0612.json | 27 - 2021/CVE-2021-0660.json | 27 - 2021/CVE-2021-10086.json | 27 + 2021/CVE-2021-123456.json | 27 + 2021/CVE-2021-1419.json | 27 - 2021/CVE-2021-1480.json | 27 + 2021/CVE-2021-1546.json | 27 - 2021/CVE-2021-1588.json | 27 - 2021/CVE-2021-1589.json | 27 - 2021/CVE-2021-1590.json | 27 - 2021/CVE-2021-1591.json | 27 - 2021/CVE-2021-1592.json | 27 - 2021/CVE-2021-1612.json | 27 - 2021/CVE-2021-1615.json | 27 - 2021/CVE-2021-1622.json | 27 - 2021/CVE-2021-1675.json | 612 +- 2021/CVE-2021-1810.json | 27 - 2021/CVE-2021-1829.json | 27 - 2021/CVE-2021-1830.json | 27 - 2021/CVE-2021-1831.json | 27 - 2021/CVE-2021-1832.json | 27 - 2021/CVE-2021-1833.json | 27 - 2021/CVE-2021-1858.json | 27 - 2021/CVE-2021-1881.json | 27 - 2021/CVE-2021-1885.json | 27 - 2021/CVE-2021-1939.json | 27 - 2021/CVE-2021-1947.json | 27 - 2021/CVE-2021-1976.json | 27 - 2021/CVE-2021-20117.json | 27 - 2021/CVE-2021-20118.json | 27 - 2021/CVE-2021-20208.json | 27 - 2021/CVE-2021-20314.json | 27 - 2021/CVE-2021-20377.json | 27 - 2021/CVE-2021-20434.json | 27 - 2021/CVE-2021-20435.json | 27 - 2021/CVE-2021-20484.json | 27 - 2021/CVE-2021-20485.json | 27 - 2021/CVE-2021-20496.json | 27 - 2021/CVE-2021-20497.json | 27 - 2021/CVE-2021-20498.json | 27 - 2021/CVE-2021-20499.json | 27 - 2021/CVE-2021-20500.json | 27 - 2021/CVE-2021-20510.json | 27 - 2021/CVE-2021-20511.json | 27 - 2021/CVE-2021-20523.json | 27 - 2021/CVE-2021-20524.json | 27 - 2021/CVE-2021-20533.json | 27 - 2021/CVE-2021-20534.json | 27 - 2021/CVE-2021-20537.json | 27 - 2021/CVE-2021-20554.json | 27 - 2021/CVE-2021-20563.json | 27 - 2021/CVE-2021-20578.json | 27 - 2021/CVE-2021-20746.json | 27 - 2021/CVE-2021-20786.json | 27 - 2021/CVE-2021-20790.json | 27 - 2021/CVE-2021-20791.json | 27 - 2021/CVE-2021-20793.json | 27 - 2021/CVE-2021-20808.json | 27 - 2021/CVE-2021-20809.json | 27 - 2021/CVE-2021-20810.json | 27 - 2021/CVE-2021-20811.json | 27 - 2021/CVE-2021-20812.json | 27 - 2021/CVE-2021-20813.json | 27 - 2021/CVE-2021-20814.json | 27 - 2021/CVE-2021-20815.json | 27 - 2021/CVE-2021-20825.json | 27 - 2021/CVE-2021-20828.json | 27 - 2021/CVE-2021-20829.json | 27 - 2021/CVE-2021-21295.json | 27 - 2021/CVE-2021-21300.json | 25 + 2021/CVE-2021-21315.json | 25 + 2021/CVE-2021-21409.json | 27 - 2021/CVE-2021-21522.json | 27 - 2021/CVE-2021-21569.json | 27 - 2021/CVE-2021-21570.json | 27 - 2021/CVE-2021-21742.json | 27 - 2021/CVE-2021-21798.json | 27 - 2021/CVE-2021-21834.json | 27 - 2021/CVE-2021-21836.json | 27 - 2021/CVE-2021-21837.json | 27 - 2021/CVE-2021-21838.json | 27 - 2021/CVE-2021-21839.json | 27 - 2021/CVE-2021-21840.json | 27 - 2021/CVE-2021-21841.json | 27 - 2021/CVE-2021-21842.json | 27 - 2021/CVE-2021-21843.json | 27 - 2021/CVE-2021-21844.json | 27 - 2021/CVE-2021-21845.json | 27 - 2021/CVE-2021-21846.json | 27 - 2021/CVE-2021-21847.json | 27 - 2021/CVE-2021-21848.json | 27 - 2021/CVE-2021-21849.json | 27 - 2021/CVE-2021-21850.json | 27 - 2021/CVE-2021-21853.json | 27 - 2021/CVE-2021-21867.json | 27 - 2021/CVE-2021-21868.json | 27 - 2021/CVE-2021-21869.json | 27 - 2021/CVE-2021-21913.json | 27 - 2021/CVE-2021-21972.json | 25 + 2021/CVE-2021-21985.json | 50 + 2021/CVE-2021-21993.json | 27 - 2021/CVE-2021-22005.json | 41 +- 2021/CVE-2021-22018.json | 27 - 2021/CVE-2021-22019.json | 27 - 2021/CVE-2021-22020.json | 27 - 2021/CVE-2021-22098.json | 27 - 2021/CVE-2021-22146.json | 27 + 2021/CVE-2021-22204.json | 50 + 2021/CVE-2021-22555.json | 75 + 2021/CVE-2021-22699.json | 27 - 2021/CVE-2021-22868.json | 27 - 2021/CVE-2021-22869.json | 27 - 2021/CVE-2021-22911.json | 25 + 2021/CVE-2021-22922.json | 27 - 2021/CVE-2021-22924.json | 27 - 2021/CVE-2021-22925.json | 27 - 2021/CVE-2021-22926.json | 27 - 2021/CVE-2021-22939.json | 27 - 2021/CVE-2021-22948.json | 27 - 2021/CVE-2021-22949.json | 27 - 2021/CVE-2021-22950.json | 27 - 2021/CVE-2021-22952.json | 27 - 2021/CVE-2021-22953.json | 27 - 2021/CVE-2021-23026.json | 27 - 2021/CVE-2021-23027.json | 27 - 2021/CVE-2021-23030.json | 27 - 2021/CVE-2021-23031.json | 27 - 2021/CVE-2021-23054.json | 27 - 2021/CVE-2021-23410.json | 27 + 2021/CVE-2021-23420.json | 27 - 2021/CVE-2021-23434.json | 27 - 2021/CVE-2021-23441.json | 27 - 2021/CVE-2021-23442.json | 27 - 2021/CVE-2021-23443.json | 27 - 2021/CVE-2021-23444.json | 27 - 2021/CVE-2021-2394.json | 25 + 2021/CVE-2021-24155.json | 27 + 2021/CVE-2021-24176.json | 27 - 2021/CVE-2021-24274.json | 27 - 2021/CVE-2021-24275.json | 27 - 2021/CVE-2021-24276.json | 27 - 2021/CVE-2021-24286.json | 27 - 2021/CVE-2021-24287.json | 27 - 2021/CVE-2021-24347.json | 27 + 2021/CVE-2021-24396.json | 27 - 2021/CVE-2021-24397.json | 27 - 2021/CVE-2021-24398.json | 27 - 2021/CVE-2021-24399.json | 27 - 2021/CVE-2021-24400.json | 27 - 2021/CVE-2021-24401.json | 27 - 2021/CVE-2021-24402.json | 27 - 2021/CVE-2021-24403.json | 27 - 2021/CVE-2021-24404.json | 27 - 2021/CVE-2021-24511.json | 27 - 2021/CVE-2021-24525.json | 27 - 2021/CVE-2021-24530.json | 27 - 2021/CVE-2021-24545.json | 8 +- 2021/CVE-2021-24569.json | 27 - 2021/CVE-2021-24582.json | 27 - 2021/CVE-2021-24583.json | 27 - 2021/CVE-2021-24584.json | 27 - 2021/CVE-2021-24585.json | 27 - 2021/CVE-2021-24587.json | 27 - 2021/CVE-2021-24596.json | 27 - 2021/CVE-2021-24597.json | 27 - 2021/CVE-2021-24600.json | 27 - 2021/CVE-2021-24604.json | 27 - 2021/CVE-2021-24606.json | 27 - 2021/CVE-2021-24609.json | 27 - 2021/CVE-2021-24610.json | 27 - 2021/CVE-2021-24613.json | 27 - 2021/CVE-2021-24618.json | 27 - 2021/CVE-2021-24620.json | 27 - 2021/CVE-2021-24632.json | 27 - 2021/CVE-2021-24633.json | 27 - 2021/CVE-2021-24634.json | 27 - 2021/CVE-2021-24635.json | 27 - 2021/CVE-2021-24636.json | 27 - 2021/CVE-2021-24637.json | 27 - 2021/CVE-2021-24638.json | 27 - 2021/CVE-2021-24639.json | 27 - 2021/CVE-2021-2464.json | 27 - 2021/CVE-2021-24640.json | 27 - 2021/CVE-2021-24643.json | 27 - 2021/CVE-2021-24652.json | 27 - 2021/CVE-2021-24657.json | 27 - 2021/CVE-2021-24659.json | 27 - 2021/CVE-2021-24660.json | 27 - 2021/CVE-2021-24661.json | 27 - 2021/CVE-2021-24663.json | 27 - 2021/CVE-2021-24667.json | 27 - 2021/CVE-2021-24670.json | 27 - 2021/CVE-2021-24741.json | 25 - 2021/CVE-2021-25737.json | 27 - 2021/CVE-2021-25740.json | 27 - 2021/CVE-2021-25741.json | 27 - 2021/CVE-2021-26084.json | 25 - 2021/CVE-2021-26690.json | 27 + 2021/CVE-2021-26691.json | 27 + 2021/CVE-2021-26750.json | 27 - 2021/CVE-2021-26794.json | 27 - 2021/CVE-2021-26814.json | 25 + 2021/CVE-2021-27044.json | 27 - 2021/CVE-2021-27045.json | 27 - 2021/CVE-2021-27046.json | 27 - 2021/CVE-2021-27340.json | 27 - 2021/CVE-2021-27341.json | 27 - 2021/CVE-2021-27391.json | 27 - 2021/CVE-2021-27556.json | 27 - 2021/CVE-2021-27578.json | 27 - 2021/CVE-2021-27662.json | 27 - 2021/CVE-2021-27850.json | 25 + 2021/CVE-2021-27912.json | 27 - 2021/CVE-2021-27913.json | 27 - 2021/CVE-2021-27965.json | 25 + 2021/CVE-2021-28116.json | 27 - 2021/CVE-2021-28163.json | 27 - 2021/CVE-2021-28164.json | 27 - 2021/CVE-2021-28165.json | 27 - 2021/CVE-2021-28169.json | 27 - 2021/CVE-2021-28378.json | 27 + 2021/CVE-2021-28547.json | 27 - 2021/CVE-2021-28550.json | 27 - 2021/CVE-2021-28553.json | 27 - 2021/CVE-2021-28559.json | 27 - 2021/CVE-2021-28560.json | 27 - 2021/CVE-2021-28561.json | 27 - 2021/CVE-2021-28564.json | 27 - 2021/CVE-2021-28565.json | 27 - 2021/CVE-2021-28674.json | 27 - 2021/CVE-2021-28694.json | 27 - 2021/CVE-2021-28695.json | 27 - 2021/CVE-2021-28696.json | 27 - 2021/CVE-2021-28697.json | 27 - 2021/CVE-2021-28698.json | 27 - 2021/CVE-2021-28699.json | 27 - 2021/CVE-2021-28700.json | 27 - 2021/CVE-2021-28701.json | 27 - 2021/CVE-2021-28901.json | 27 - 2021/CVE-2021-28960.json | 27 - 2021/CVE-2021-29425.json | 27 - 2021/CVE-2021-29484.json | 27 - 2021/CVE-2021-29699.json | 27 - 2021/CVE-2021-29742.json | 27 - 2021/CVE-2021-29750.json | 27 - 2021/CVE-2021-29752.json | 27 - 2021/CVE-2021-29763.json | 27 - 2021/CVE-2021-29773.json | 27 - 2021/CVE-2021-29795.json | 27 - 2021/CVE-2021-29800.json | 27 - 2021/CVE-2021-29806.json | 27 - 2021/CVE-2021-29807.json | 27 - 2021/CVE-2021-29808.json | 27 - 2021/CVE-2021-29809.json | 27 - 2021/CVE-2021-29810.json | 27 - 2021/CVE-2021-29811.json | 27 - 2021/CVE-2021-29812.json | 27 - 2021/CVE-2021-29813.json | 27 - 2021/CVE-2021-29814.json | 27 - 2021/CVE-2021-29815.json | 27 - 2021/CVE-2021-29816.json | 27 - 2021/CVE-2021-29817.json | 27 - 2021/CVE-2021-29818.json | 27 - 2021/CVE-2021-29819.json | 27 - 2021/CVE-2021-29820.json | 27 - 2021/CVE-2021-29821.json | 27 - 2021/CVE-2021-29825.json | 27 - 2021/CVE-2021-29831.json | 27 - 2021/CVE-2021-29832.json | 27 - 2021/CVE-2021-29833.json | 27 - 2021/CVE-2021-29834.json | 27 - 2021/CVE-2021-29842.json | 27 - 2021/CVE-2021-29856.json | 27 - 2021/CVE-2021-29894.json | 27 - 2021/CVE-2021-29904.json | 27 - 2021/CVE-2021-29905.json | 27 - 2021/CVE-2021-30086.json | 27 - 2021/CVE-2021-30123.json | 27 - 2021/CVE-2021-30137.json | 27 - 2021/CVE-2021-30261.json | 27 - 2021/CVE-2021-3045.json | 27 - 2021/CVE-2021-3046.json | 27 - 2021/CVE-2021-30461.json | 25 + 2021/CVE-2021-30468.json | 27 - 2021/CVE-2021-3047.json | 27 - 2021/CVE-2021-3048.json | 27 - 2021/CVE-2021-3050.json | 27 - 2021/CVE-2021-30542.json | 27 - 2021/CVE-2021-30543.json | 27 - 2021/CVE-2021-30641.json | 27 + 2021/CVE-2021-30653.json | 27 - 2021/CVE-2021-30654.json | 27 - 2021/CVE-2021-30671.json | 27 - 2021/CVE-2021-30682.json | 27 - 2021/CVE-2021-30684.json | 27 - 2021/CVE-2021-30686.json | 27 - 2021/CVE-2021-30687.json | 27 - 2021/CVE-2021-30688.json | 27 - 2021/CVE-2021-30689.json | 27 - 2021/CVE-2021-30690.json | 27 - 2021/CVE-2021-30691.json | 27 - 2021/CVE-2021-30692.json | 27 - 2021/CVE-2021-30693.json | 27 - 2021/CVE-2021-30694.json | 27 - 2021/CVE-2021-30695.json | 27 - 2021/CVE-2021-30696.json | 27 - 2021/CVE-2021-30697.json | 27 - 2021/CVE-2021-30698.json | 27 - 2021/CVE-2021-30699.json | 27 - 2021/CVE-2021-30700.json | 27 - 2021/CVE-2021-30701.json | 27 - 2021/CVE-2021-30703.json | 27 - 2021/CVE-2021-30704.json | 27 - 2021/CVE-2021-30705.json | 27 - 2021/CVE-2021-30713.json | 27 - 2021/CVE-2021-30768.json | 27 - 2021/CVE-2021-30773.json | 27 - 2021/CVE-2021-30776.json | 27 - 2021/CVE-2021-30777.json | 27 - 2021/CVE-2021-30779.json | 27 - 2021/CVE-2021-30780.json | 27 - 2021/CVE-2021-30781.json | 27 - 2021/CVE-2021-30783.json | 27 - 2021/CVE-2021-30858.json | 27 - 2021/CVE-2021-30860.json | 25 - 2021/CVE-2021-31166.json | 25 + 2021/CVE-2021-3129.json | 33 +- 2021/CVE-2021-31535.json | 27 - 2021/CVE-2021-3156.json | 25 + 2021/CVE-2021-31604.json | 27 - 2021/CVE-2021-31605.json | 27 - 2021/CVE-2021-31606.json | 27 - 2021/CVE-2021-31630.json | 27 + 2021/CVE-2021-31721.json | 27 - 2021/CVE-2021-31728.json | 8 +- 2021/CVE-2021-31799.json | 27 - 2021/CVE-2021-31810.json | 27 - 2021/CVE-2021-31819.json | 27 - 2021/CVE-2021-31836.json | 27 - 2021/CVE-2021-31841.json | 27 - 2021/CVE-2021-31842.json | 27 - 2021/CVE-2021-31843.json | 27 - 2021/CVE-2021-31844.json | 27 - 2021/CVE-2021-31845.json | 27 - 2021/CVE-2021-31847.json | 27 - 2021/CVE-2021-31878.json | 27 - 2021/CVE-2021-31891.json | 27 - 2021/CVE-2021-31923.json | 27 - 2021/CVE-2021-31989.json | 27 - 2021/CVE-2021-32265.json | 27 - 2021/CVE-2021-32268.json | 27 - 2021/CVE-2021-32269.json | 27 - 2021/CVE-2021-32270.json | 27 - 2021/CVE-2021-32271.json | 27 - 2021/CVE-2021-32272.json | 27 - 2021/CVE-2021-32273.json | 27 - 2021/CVE-2021-32274.json | 27 - 2021/CVE-2021-32275.json | 27 - 2021/CVE-2021-32276.json | 27 - 2021/CVE-2021-32277.json | 27 - 2021/CVE-2021-32278.json | 27 - 2021/CVE-2021-32280.json | 27 - 2021/CVE-2021-32281.json | 27 - 2021/CVE-2021-32282.json | 27 - 2021/CVE-2021-32283.json | 27 - 2021/CVE-2021-32284.json | 27 - 2021/CVE-2021-32285.json | 27 - 2021/CVE-2021-32286.json | 27 - 2021/CVE-2021-32287.json | 27 - 2021/CVE-2021-32288.json | 27 - 2021/CVE-2021-32289.json | 27 - 2021/CVE-2021-32294.json | 27 - 2021/CVE-2021-32297.json | 27 - 2021/CVE-2021-32298.json | 27 - 2021/CVE-2021-32299.json | 27 - 2021/CVE-2021-32466.json | 27 - 2021/CVE-2021-32558.json | 27 - 2021/CVE-2021-32610.json | 27 - 2021/CVE-2021-32777.json | 27 - 2021/CVE-2021-32778.json | 27 - 2021/CVE-2021-32808.json | 27 - 2021/CVE-2021-32809.json | 27 - 2021/CVE-2021-3281.json | 27 + 2021/CVE-2021-32838.json | 27 - 2021/CVE-2021-32839.json | 27 - 2021/CVE-2021-32931.json | 27 - 2021/CVE-2021-32955.json | 27 - 2021/CVE-2021-32959.json | 27 - 2021/CVE-2021-32963.json | 27 - 2021/CVE-2021-32967.json | 27 - 2021/CVE-2021-32971.json | 27 - 2021/CVE-2021-32979.json | 27 - 2021/CVE-2021-32983.json | 27 - 2021/CVE-2021-32987.json | 27 - 2021/CVE-2021-32991.json | 27 - 2021/CVE-2021-32995.json | 27 - 2021/CVE-2021-32999.json | 27 - 2021/CVE-2021-33003.json | 27 - 2021/CVE-2021-33007.json | 27 - 2021/CVE-2021-33015.json | 27 - 2021/CVE-2021-33019.json | 27 - 2021/CVE-2021-33044.json | 27 - 2021/CVE-2021-33045.json | 27 - 2021/CVE-2021-33193.json | 27 - 2021/CVE-2021-33560.json | 30 +- 2021/CVE-2021-33594.json | 27 - 2021/CVE-2021-33595.json | 27 - 2021/CVE-2021-33690.json | 27 - 2021/CVE-2021-33691.json | 27 - 2021/CVE-2021-33692.json | 27 - 2021/CVE-2021-33693.json | 27 - 2021/CVE-2021-33694.json | 27 - 2021/CVE-2021-33695.json | 27 - 2021/CVE-2021-33696.json | 27 - 2021/CVE-2021-33697.json | 27 - 2021/CVE-2021-33698.json | 27 - 2021/CVE-2021-33700.json | 27 - 2021/CVE-2021-33701.json | 27 - 2021/CVE-2021-33704.json | 27 - 2021/CVE-2021-33705.json | 27 - 2021/CVE-2021-33719.json | 27 - 2021/CVE-2021-33720.json | 27 - 2021/CVE-2021-33737.json | 27 - 2021/CVE-2021-33829.json | 27 - 2021/CVE-2021-33904.json | 27 - 2021/CVE-2021-33909.json | 125 +- 2021/CVE-2021-34045.json | 27 + 2021/CVE-2021-34345.json | 27 - 2021/CVE-2021-34352.json | 27 - 2021/CVE-2021-34354.json | 27 - 2021/CVE-2021-34355.json | 27 - 2021/CVE-2021-34356.json | 27 - 2021/CVE-2021-34369.json | 27 - 2021/CVE-2021-34370.json | 27 - 2021/CVE-2021-3438.json | 52 + 2021/CVE-2021-34428.json | 27 - 2021/CVE-2021-34429.json | 27 - 2021/CVE-2021-34470.json | 27 + 2021/CVE-2021-34496.json | 27 + ...VE-2021-34423.json => CVE-2021-34523.json} | 6 +- 2021/CVE-2021-34527.json | 404 +- 2021/CVE-2021-34558.json | 27 + 2021/CVE-2021-34570.json | 27 - 2021/CVE-2021-34571.json | 27 - 2021/CVE-2021-34572.json | 27 - 2021/CVE-2021-34573.json | 27 - 2021/CVE-2021-34576.json | 27 - 2021/CVE-2021-34636.json | 27 - 2021/CVE-2021-34640.json | 27 - 2021/CVE-2021-34647.json | 27 - 2021/CVE-2021-34648.json | 27 - 2021/CVE-2021-34650.json | 27 - 2021/CVE-2021-34723.json | 27 - 2021/CVE-2021-34798.json | 27 - 2021/CVE-2021-3493.json | 50 + 2021/CVE-2021-35027.json | 27 - 2021/CVE-2021-35028.json | 27 - 2021/CVE-2021-35042.json | 25 + 2021/CVE-2021-3516.json | 27 + 2021/CVE-2021-35197.json | 27 - 2021/CVE-2021-35198.json | 27 - 2021/CVE-2021-35199.json | 27 - 2021/CVE-2021-35200.json | 27 - 2021/CVE-2021-35201.json | 27 - 2021/CVE-2021-35202.json | 27 - 2021/CVE-2021-35203.json | 27 - 2021/CVE-2021-35204.json | 27 - 2021/CVE-2021-35205.json | 27 - 2021/CVE-2021-35296.json | 4 +- 2021/CVE-2021-3544.json | 27 - 2021/CVE-2021-35448.json | 27 + 2021/CVE-2021-3545.json | 27 - 2021/CVE-2021-3546.json | 27 - 2021/CVE-2021-35464.json | 25 + 2021/CVE-2021-35478.json | 27 - 2021/CVE-2021-35479.json | 27 - 2021/CVE-2021-3560.json | 100 + 2021/CVE-2021-3561.json | 27 - 2021/CVE-2021-35940.json | 27 - 2021/CVE-2021-35943.json | 27 - 2021/CVE-2021-35944.json | 27 - 2021/CVE-2021-35945.json | 27 - 2021/CVE-2021-35956.json | 27 + 2021/CVE-2021-36004.json | 27 - 2021/CVE-2021-36134.json | 27 - 2021/CVE-2021-36159.json | 27 - 2021/CVE-2021-36160.json | 27 - 2021/CVE-2021-36218.json | 27 - 2021/CVE-2021-36219.json | 27 - 2021/CVE-2021-3625.json | 27 + 2021/CVE-2021-3626.json | 27 - 2021/CVE-2021-3628.json | 27 - 2021/CVE-2021-36283.json | 27 - 2021/CVE-2021-36284.json | 27 - 2021/CVE-2021-36285.json | 27 - 2021/CVE-2021-36286.json | 27 - 2021/CVE-2021-3634.json | 27 - 2021/CVE-2021-36359.json | 27 - 2021/CVE-2021-36363.json | 27 - 2021/CVE-2021-36364.json | 27 - 2021/CVE-2021-36365.json | 27 - 2021/CVE-2021-36366.json | 27 - 2021/CVE-2021-36582.json | 25 - 2021/CVE-2021-36621.json | 27 - 2021/CVE-2021-3673.json | 27 - 2021/CVE-2021-36745.json | 27 - 2021/CVE-2021-36746.json | 27 + 2021/CVE-2021-36747.json | 27 + 2021/CVE-2021-36749.json | 27 - 2021/CVE-2021-36754.json | 27 - 2021/CVE-2021-3679.json | 27 + 2021/CVE-2021-36798.json | 8 +- 2021/CVE-2021-36799.json | 27 + 2021/CVE-2021-3682.json | 27 - 2021/CVE-2021-36823.json | 27 - 2021/CVE-2021-36841.json | 27 - 2021/CVE-2021-36870.json | 27 - 2021/CVE-2021-36871.json | 27 - 2021/CVE-2021-36872.json | 27 - 2021/CVE-2021-36873.json | 27 - 2021/CVE-2021-36874.json | 27 - 2021/CVE-2021-36875.json | 27 - 2021/CVE-2021-36876.json | 27 - 2021/CVE-2021-36877.json | 27 - 2021/CVE-2021-36878.json | 27 - 2021/CVE-2021-36879.json | 27 - 2021/CVE-2021-36880.json | 27 - 2021/CVE-2021-36928.json | 27 - 2021/CVE-2021-36934.json | 400 +- 2021/CVE-2021-36983.json | 27 - 2021/CVE-2021-3712.json | 27 - 2021/CVE-2021-3713.json | 27 - 2021/CVE-2021-37152.json | 27 + 2021/CVE-2021-37202.json | 27 - 2021/CVE-2021-37203.json | 27 - 2021/CVE-2021-37206.json | 27 - 2021/CVE-2021-37267.json | 27 - 2021/CVE-2021-37271.json | 27 - 2021/CVE-2021-37414.json | 27 - 2021/CVE-2021-37419.json | 27 - 2021/CVE-2021-37420.json | 27 - 2021/CVE-2021-37422.json | 27 - 2021/CVE-2021-37423.json | 27 - 2021/CVE-2021-37424.json | 27 - 2021/CVE-2021-3747.json | 27 - 2021/CVE-2021-37539.json | 27 - 2021/CVE-2021-37576.json | 27 - 2021/CVE-2021-37605.json | 27 - 2021/CVE-2021-37608.json | 27 - 2021/CVE-2021-37694.json | 27 - 2021/CVE-2021-37695.json | 27 - 2021/CVE-2021-3770.json | 27 - 2021/CVE-2021-37741.json | 27 - 2021/CVE-2021-37749.json | 27 - 2021/CVE-2021-37750.json | 27 - 2021/CVE-2021-37761.json | 27 - 2021/CVE-2021-3778.json | 27 - 2021/CVE-2021-37833.json | 27 + 2021/CVE-2021-37909.json | 27 - 2021/CVE-2021-37912.json | 27 - 2021/CVE-2021-37913.json | 27 - 2021/CVE-2021-37925.json | 27 - 2021/CVE-2021-37927.json | 27 - 2021/CVE-2021-3794.json | 27 - 2021/CVE-2021-3795.json | 27 - 2021/CVE-2021-3796.json | 27 - 2021/CVE-2021-3797.json | 27 - 2021/CVE-2021-3799.json | 27 - 2021/CVE-2021-3801.json | 27 - 2021/CVE-2021-3803.json | 27 - 2021/CVE-2021-3804.json | 27 - 2021/CVE-2021-3805.json | 27 - 2021/CVE-2021-3806.json | 27 - 2021/CVE-2021-3807.json | 27 - 2021/CVE-2021-38085.json | 27 - 2021/CVE-2021-3810.json | 27 - 2021/CVE-2021-3811.json | 27 - 2021/CVE-2021-38112.json | 27 - 2021/CVE-2021-3812.json | 27 - 2021/CVE-2021-38124.json | 27 - 2021/CVE-2021-38149.json | 27 + 2021/CVE-2021-38153.json | 27 - 2021/CVE-2021-38156.json | 27 - 2021/CVE-2021-38173.json | 27 - 2021/CVE-2021-38176.json | 27 - 2021/CVE-2021-3818.json | 27 - 2021/CVE-2021-3819.json | 27 - 2021/CVE-2021-3820.json | 27 - 2021/CVE-2021-3822.json | 27 - 2021/CVE-2021-3824.json | 27 - 2021/CVE-2021-3828.json | 27 - 2021/CVE-2021-3830.json | 27 - 2021/CVE-2021-38300.json | 27 - 2021/CVE-2021-38303.json | 27 - 2021/CVE-2021-38304.json | 27 - 2021/CVE-2021-38385.json | 27 - 2021/CVE-2021-38402.json | 27 - 2021/CVE-2021-38404.json | 27 - 2021/CVE-2021-38406.json | 27 - 2021/CVE-2021-38514.json | 27 - 2021/CVE-2021-38516.json | 27 - 2021/CVE-2021-38527.json | 27 - 2021/CVE-2021-38534.json | 27 - 2021/CVE-2021-38604.json | 27 - 2021/CVE-2021-38635.json | 27 - 2021/CVE-2021-38669.json | 27 - 2021/CVE-2021-38675.json | 27 - 2021/CVE-2021-38714.json | 27 - 2021/CVE-2021-38863.json | 27 - 2021/CVE-2021-38864.json | 27 - 2021/CVE-2021-38870.json | 27 - 2021/CVE-2021-38877.json | 27 - 2021/CVE-2021-38899.json | 27 - 2021/CVE-2021-39111.json | 27 - 2021/CVE-2021-39113.json | 27 - 2021/CVE-2021-39117.json | 27 - 2021/CVE-2021-39138.json | 27 - 2021/CVE-2021-39139.json | 27 - 2021/CVE-2021-39140.json | 27 - 2021/CVE-2021-39141.json | 25 - 2021/CVE-2021-39144.json | 27 - 2021/CVE-2021-39145.json | 27 - 2021/CVE-2021-39146.json | 27 - 2021/CVE-2021-39147.json | 27 - 2021/CVE-2021-39148.json | 27 - 2021/CVE-2021-39149.json | 27 - 2021/CVE-2021-39150.json | 27 - 2021/CVE-2021-39151.json | 27 - 2021/CVE-2021-39152.json | 27 - 2021/CVE-2021-39153.json | 27 - 2021/CVE-2021-39154.json | 27 - 2021/CVE-2021-39159.json | 27 - 2021/CVE-2021-39189.json | 27 - 2021/CVE-2021-39201.json | 27 - 2021/CVE-2021-39204.json | 27 - 2021/CVE-2021-39205.json | 27 - 2021/CVE-2021-39206.json | 27 - 2021/CVE-2021-39208.json | 27 - 2021/CVE-2021-39209.json | 27 - 2021/CVE-2021-39210.json | 27 - 2021/CVE-2021-39211.json | 27 - 2021/CVE-2021-39213.json | 27 - 2021/CVE-2021-39214.json | 27 - 2021/CVE-2021-39215.json | 27 - 2021/CVE-2021-39216.json | 27 - 2021/CVE-2021-39218.json | 27 - 2021/CVE-2021-39219.json | 27 - 2021/CVE-2021-39227.json | 27 - 2021/CVE-2021-39228.json | 27 - 2021/CVE-2021-39229.json | 27 - 2021/CVE-2021-39230.json | 27 - 2021/CVE-2021-39239.json | 27 - 2021/CVE-2021-39246.json | 27 - 2021/CVE-2021-39271.json | 27 - 2021/CVE-2021-39275.json | 27 - 2021/CVE-2021-39307.json | 27 - 2021/CVE-2021-39325.json | 27 - 2021/CVE-2021-39327.json | 27 - 2021/CVE-2021-39339.json | 27 - 2021/CVE-2021-39371.json | 27 - 2021/CVE-2021-39375.json | 27 - 2021/CVE-2021-39392.json | 27 - 2021/CVE-2021-39402.json | 27 - 2021/CVE-2021-39404.json | 27 - 2021/CVE-2021-39514.json | 27 - 2021/CVE-2021-39531.json | 27 - 2021/CVE-2021-39532.json | 27 - 2021/CVE-2021-39533.json | 27 - 2021/CVE-2021-39534.json | 27 - 2021/CVE-2021-39535.json | 27 - 2021/CVE-2021-39536.json | 27 - 2021/CVE-2021-39537.json | 27 - 2021/CVE-2021-39818.json | 27 - 2021/CVE-2021-39819.json | 27 - 2021/CVE-2021-39821.json | 27 - 2021/CVE-2021-39823.json | 27 - 2021/CVE-2021-39824.json | 27 - 2021/CVE-2021-39825.json | 27 - 2021/CVE-2021-39826.json | 27 - 2021/CVE-2021-39827.json | 27 - 2021/CVE-2021-39828.json | 27 - 2021/CVE-2021-39862.json | 27 - 2021/CVE-2021-39865.json | 27 - 2021/CVE-2021-40066.json | 27 - 2021/CVE-2021-40067.json | 27 - 2021/CVE-2021-40097.json | 27 - 2021/CVE-2021-40098.json | 27 - 2021/CVE-2021-40099.json | 27 - 2021/CVE-2021-40100.json | 27 - 2021/CVE-2021-40102.json | 27 - 2021/CVE-2021-40103.json | 27 - 2021/CVE-2021-40104.json | 27 - 2021/CVE-2021-40105.json | 27 - 2021/CVE-2021-40106.json | 27 - 2021/CVE-2021-40108.json | 27 - 2021/CVE-2021-40109.json | 27 - 2021/CVE-2021-40145.json | 27 - 2021/CVE-2021-40153.json | 27 - 2021/CVE-2021-40155.json | 27 - 2021/CVE-2021-40156.json | 27 - 2021/CVE-2021-40157.json | 27 - 2021/CVE-2021-40238.json | 27 - 2021/CVE-2021-40309.json | 27 - 2021/CVE-2021-40310.json | 27 - 2021/CVE-2021-40346.json | 25 - 2021/CVE-2021-40349.json | 27 - 2021/CVE-2021-40354.json | 27 - 2021/CVE-2021-40355.json | 27 - 2021/CVE-2021-40356.json | 27 - 2021/CVE-2021-40357.json | 27 - 2021/CVE-2021-40438.json | 27 - 2021/CVE-2021-40444.json | 12 +- 2021/CVE-2021-40490.json | 27 - 2021/CVE-2021-40516.json | 27 - 2021/CVE-2021-40530.json | 27 - 2021/CVE-2021-40639.json | 27 - 2021/CVE-2021-40654.json | 27 - 2021/CVE-2021-40655.json | 27 - 2021/CVE-2021-40670.json | 27 - 2021/CVE-2021-40674.json | 27 - 2021/CVE-2021-40690.json | 27 - 2021/CVE-2021-40697.json | 27 - 2021/CVE-2021-40700.json | 27 - 2021/CVE-2021-40701.json | 27 - 2021/CVE-2021-40702.json | 27 - 2021/CVE-2021-40703.json | 27 - 2021/CVE-2021-40708.json | 27 - 2021/CVE-2021-40709.json | 27 - 2021/CVE-2021-40710.json | 27 - 2021/CVE-2021-40711.json | 27 - 2021/CVE-2021-40712.json | 27 - 2021/CVE-2021-40713.json | 27 - 2021/CVE-2021-40714.json | 27 - 2021/CVE-2021-40715.json | 27 - 2021/CVE-2021-40825.json | 27 - 2021/CVE-2021-40845.json | 25 - 2021/CVE-2021-40862.json | 27 - 2021/CVE-2021-40868.json | 27 - 2021/CVE-2021-40875.json | 25 - 2021/CVE-2021-40881.json | 27 - 2021/CVE-2021-40921.json | 27 - 2021/CVE-2021-40922.json | 27 - 2021/CVE-2021-40923.json | 27 - 2021/CVE-2021-40924.json | 27 - 2021/CVE-2021-40925.json | 27 - 2021/CVE-2021-40926.json | 27 - 2021/CVE-2021-40927.json | 27 - 2021/CVE-2021-40928.json | 27 - 2021/CVE-2021-40964.json | 27 - 2021/CVE-2021-40965.json | 27 - 2021/CVE-2021-40966.json | 27 - 2021/CVE-2021-40968.json | 27 - 2021/CVE-2021-40969.json | 27 - 2021/CVE-2021-40970.json | 27 - 2021/CVE-2021-40971.json | 27 - 2021/CVE-2021-40972.json | 27 - 2021/CVE-2021-40973.json | 27 - 2021/CVE-2021-40975.json | 27 - 2021/CVE-2021-40981.json | 27 - 2021/CVE-2021-41061.json | 27 - 2021/CVE-2021-41073.json | 27 - 2021/CVE-2021-41077.json | 27 - 2021/CVE-2021-41079.json | 27 - 2021/CVE-2021-41082.json | 27 - 2021/CVE-2021-41083.json | 27 - 2021/CVE-2021-41086.json | 27 - 2021/CVE-2021-41088.json | 27 - 2021/CVE-2021-41303.json | 27 - 2021/CVE-2021-41314.json | 27 - 2021/CVE-2021-41315.json | 27 - 2021/CVE-2021-41316.json | 27 - 2021/CVE-2021-41317.json | 27 - 2021/CVE-2021-41326.json | 27 - 2021/CVE-2021-41380.json | 27 - 2021/CVE-2021-41381.json | 27 - 2021/CVE-2021-41382.json | 27 - 2021/CVE-2021-41383.json | 27 - 2021/CVE-2021-41387.json | 27 - 2021/CVE-2021-41390.json | 27 - 2021/CVE-2021-41391.json | 27 - 2021/CVE-2021-41392.json | 27 - 2021/CVE-2021-41393.json | 27 - 2021/CVE-2021-41394.json | 27 - 2021/CVE-2021-41395.json | 27 - 2021/CVE-2021-41428.json | 27 - 2021/CVE-2021-41461.json | 27 - 2021/CVE-2021-41462.json | 27 - 2021/CVE-2021-41463.json | 27 - 2021/CVE-2021-41464.json | 27 - 2021/CVE-2021-41465.json | 27 - 2021/CVE-2021-41467.json | 27 - 2021/CVE-2021-41503.json | 27 - 2021/CVE-2021-41504.json | 27 - 2021/CVE-2021-41525.json | 27 - 2021/CVE-2021-41533.json | 27 - 2021/CVE-2021-41534.json | 27 - 2021/CVE-2021-41535.json | 27 - 2021/CVE-2021-41536.json | 27 - 2021/CVE-2021-41537.json | 27 - 2021/CVE-2021-41538.json | 27 - 2021/CVE-2021-41539.json | 27 - 2021/CVE-2021-41540.json | 27 - 2021/CVE-2021-41558.json | 27 - 2021/CVE-2021-41581.json | 27 - 2021/CVE-2021-41584.json | 27 - 2021/CVE-2021-41586.json | 27 - 2021/CVE-2021-41587.json | 27 - 2021/CVE-2021-41588.json | 27 - 2021/CVE-2021-41617.json | 27 - 2021/CVE-2021-41720.json | 27 - 2021/CVE-2021-41764.json | 27 - 2021/CVE-2021-41773.json | 230 +- README.md | 8270 +---------------- 1108 files changed, 3471 insertions(+), 36157 deletions(-) delete mode 100644 2006/CVE-2006-4468.json delete mode 100644 2006/CVE-2006-4469.json delete mode 100644 2006/CVE-2006-4470.json delete mode 100644 2006/CVE-2006-4471.json delete mode 100644 2006/CVE-2006-4472.json delete mode 100644 2007/CVE-2007-4188.json delete mode 100644 2007/CVE-2007-4189.json delete mode 100644 2007/CVE-2007-4190.json delete mode 100644 2007/CVE-2007-5577.json delete mode 100644 2008/CVE-2008-4796.json delete mode 100644 2010/CVE-2010-4756.json delete mode 100644 2012/CVE-2012-0881.json delete mode 100644 2013/CVE-2013-0340.json delete mode 100644 2013/CVE-2013-1914.json delete mode 100644 2013/CVE-2013-2763.json delete mode 100644 2013/CVE-2013-6276.json delete mode 100644 2013/CVE-2013-7423.json delete mode 100644 2014/CVE-2014-4611.json delete mode 100644 2016/CVE-2016-10045.json delete mode 100644 2016/CVE-2016-1234.json delete mode 100644 2016/CVE-2016-20012.json delete mode 100644 2016/CVE-2016-2568.json delete mode 100644 2016/CVE-2016-3720.json delete mode 100644 2016/CVE-2016-4529.json delete mode 100644 2016/CVE-2016-5385.json delete mode 100644 2016/CVE-2016-6555.json delete mode 100644 2016/CVE-2016-6556.json delete mode 100644 2017/CVE-2017-11189.json delete mode 100644 2017/CVE-2017-12613.json delete mode 100644 2017/CVE-2017-12678.json delete mode 100644 2017/CVE-2017-14121.json delete mode 100644 2017/CVE-2017-6026.json delete mode 100644 2017/CVE-2017-6028.json delete mode 100644 2017/CVE-2017-6030.json delete mode 100644 2018/CVE-2018-10023.json delete mode 100644 2018/CVE-2018-11439.json delete mode 100644 2018/CVE-2018-14773.json delete mode 100644 2018/CVE-2018-16177.json delete mode 100644 2018/CVE-2018-16871.json delete mode 100644 2018/CVE-2018-20217.json delete mode 100644 2018/CVE-2018-5729.json delete mode 100644 2018/CVE-2018-5730.json delete mode 100644 2018/CVE-2018-7789.json delete mode 100644 2018/CVE-2018-7790.json delete mode 100644 2018/CVE-2018-7821.json delete mode 100644 2018/CVE-2018-7842.json delete mode 100644 2018/CVE-2018-8256.json delete mode 100644 2019/CVE-2019-0205.json delete mode 100644 2019/CVE-2019-10095.json delete mode 100644 2019/CVE-2019-10156.json delete mode 100644 2019/CVE-2019-10181.json delete mode 100644 2019/CVE-2019-10206.json delete mode 100644 2019/CVE-2019-10910.json delete mode 100644 2019/CVE-2019-10911.json delete mode 100644 2019/CVE-2019-10953.json delete mode 100644 2019/CVE-2019-11595.json delete mode 100644 2019/CVE-2019-11831.json delete mode 100644 2019/CVE-2019-12823.json delete mode 100644 2019/CVE-2019-14846.json delete mode 100644 2019/CVE-2019-14864.json delete mode 100644 2019/CVE-2019-14904.json delete mode 100644 2019/CVE-2019-18413.json delete mode 100644 2019/CVE-2019-19797.json delete mode 100644 2019/CVE-2019-25052.json delete mode 100644 2019/CVE-2019-3820.json delete mode 100644 2019/CVE-2019-6820.json delete mode 100644 2019/CVE-2019-7254.json delete mode 100644 2019/CVE-2019-9060.json delete mode 100644 2020/CVE-2020-10684.json delete mode 100644 2020/CVE-2020-10685.json delete mode 100644 2020/CVE-2020-10729.json delete mode 100644 2020/CVE-2020-12080.json delete mode 100644 2020/CVE-2020-12082.json delete mode 100644 2020/CVE-2020-12083.json delete mode 100644 2020/CVE-2020-13929.json delete mode 100644 2020/CVE-2020-13936.json delete mode 100644 2020/CVE-2020-13949.json delete mode 100644 2020/CVE-2020-13959.json delete mode 100644 2020/CVE-2020-14119.json delete mode 100644 2020/CVE-2020-14124.json delete mode 100644 2020/CVE-2020-1416.json delete mode 100644 2020/CVE-2020-14308.json delete mode 100644 2020/CVE-2020-14311.json delete mode 100644 2020/CVE-2020-14330.json delete mode 100644 2020/CVE-2020-14332.json delete mode 100644 2020/CVE-2020-14365.json delete mode 100644 2020/CVE-2020-14409.json delete mode 100644 2020/CVE-2020-14410.json delete mode 100644 2020/CVE-2020-15250.json delete mode 100644 2020/CVE-2020-15256.json delete mode 100644 2020/CVE-2020-15705.json delete mode 100644 2020/CVE-2020-15744.json delete mode 100644 2020/CVE-2020-1733.json delete mode 100644 2020/CVE-2020-1735.json delete mode 100644 2020/CVE-2020-1739.json delete mode 100644 2020/CVE-2020-1740.json delete mode 100644 2020/CVE-2020-1746.json delete mode 100644 2020/CVE-2020-1753.json delete mode 100644 2020/CVE-2020-18683.json delete mode 100644 2020/CVE-2020-18685.json delete mode 100644 2020/CVE-2020-18913.json delete mode 100644 2020/CVE-2020-19143.json delete mode 100644 2020/CVE-2020-19144.json delete mode 100644 2020/CVE-2020-19551.json delete mode 100644 2020/CVE-2020-19553.json delete mode 100644 2020/CVE-2020-19554.json delete mode 100644 2020/CVE-2020-19822.json delete mode 100644 2020/CVE-2020-19915.json delete mode 100644 2020/CVE-2020-19949.json delete mode 100644 2020/CVE-2020-19950.json delete mode 100644 2020/CVE-2020-19951.json delete mode 100644 2020/CVE-2020-20128.json delete mode 100644 2020/CVE-2020-20129.json delete mode 100644 2020/CVE-2020-20131.json delete mode 100644 2020/CVE-2020-20508.json delete mode 100644 2020/CVE-2020-20514.json delete mode 100644 2020/CVE-2020-20662.json delete mode 100644 2020/CVE-2020-20663.json delete mode 100644 2020/CVE-2020-20664.json delete mode 100644 2020/CVE-2020-20665.json delete mode 100644 2020/CVE-2020-20692.json delete mode 100644 2020/CVE-2020-20693.json delete mode 100644 2020/CVE-2020-20695.json delete mode 100644 2020/CVE-2020-20696.json delete mode 100644 2020/CVE-2020-20781.json delete mode 100644 2020/CVE-2020-20796.json delete mode 100644 2020/CVE-2020-20797.json delete mode 100644 2020/CVE-2020-20799.json delete mode 100644 2020/CVE-2020-20902.json delete mode 100644 2020/CVE-2020-21121.json delete mode 100644 2020/CVE-2020-21122.json delete mode 100644 2020/CVE-2020-21124.json delete mode 100644 2020/CVE-2020-21125.json delete mode 100644 2020/CVE-2020-21321.json delete mode 100644 2020/CVE-2020-21322.json delete mode 100644 2020/CVE-2020-21468.json delete mode 100644 2020/CVE-2020-21480.json delete mode 100644 2020/CVE-2020-21481.json delete mode 100644 2020/CVE-2020-21482.json delete mode 100644 2020/CVE-2020-21483.json delete mode 100644 2020/CVE-2020-21529.json delete mode 100644 2020/CVE-2020-21530.json delete mode 100644 2020/CVE-2020-21531.json delete mode 100644 2020/CVE-2020-21532.json delete mode 100644 2020/CVE-2020-21533.json delete mode 100644 2020/CVE-2020-21534.json delete mode 100644 2020/CVE-2020-21535.json delete mode 100644 2020/CVE-2020-21547.json delete mode 100644 2020/CVE-2020-21548.json delete mode 100644 2020/CVE-2020-21564.json delete mode 100644 2020/CVE-2020-21594.json delete mode 100644 2020/CVE-2020-21595.json delete mode 100644 2020/CVE-2020-21596.json delete mode 100644 2020/CVE-2020-21597.json delete mode 100644 2020/CVE-2020-21598.json delete mode 100644 2020/CVE-2020-21599.json delete mode 100644 2020/CVE-2020-21600.json delete mode 100644 2020/CVE-2020-21601.json delete mode 100644 2020/CVE-2020-21602.json delete mode 100644 2020/CVE-2020-21603.json delete mode 100644 2020/CVE-2020-21604.json delete mode 100644 2020/CVE-2020-21605.json delete mode 100644 2020/CVE-2020-21606.json delete mode 100644 2020/CVE-2020-21675.json delete mode 100644 2020/CVE-2020-21676.json delete mode 100644 2020/CVE-2020-21784.json delete mode 100644 2020/CVE-2020-21787.json delete mode 100644 2020/CVE-2020-21913.json delete mode 100644 2020/CVE-2020-21936.json delete mode 100644 2020/CVE-2020-23266.json delete mode 100644 2020/CVE-2020-23267.json delete mode 100644 2020/CVE-2020-23269.json delete mode 100644 2020/CVE-2020-23273.json delete mode 100644 2020/CVE-2020-23478.json delete mode 100644 2020/CVE-2020-23481.json delete mode 100644 2020/CVE-2020-23659.json delete mode 100644 2020/CVE-2020-24327.json delete mode 100644 2020/CVE-2020-24511.json delete mode 100644 2020/CVE-2020-24512.json delete mode 100644 2020/CVE-2020-24574.json delete mode 100644 2020/CVE-2020-25649.json delete mode 100644 2020/CVE-2020-25901.json delete mode 100644 2020/CVE-2020-26181.json delete mode 100644 2020/CVE-2020-26301.json delete mode 100644 2020/CVE-2020-26556.json delete mode 100644 2020/CVE-2020-26558.json delete mode 100644 2020/CVE-2020-27153.json delete mode 100644 2020/CVE-2020-27339.json delete mode 100644 2020/CVE-2020-27942.json delete mode 100644 2020/CVE-2020-28020.json delete mode 100644 2020/CVE-2020-28214.json delete mode 100644 2020/CVE-2020-28220.json delete mode 100644 2020/CVE-2020-28480.json delete mode 100644 2020/CVE-2020-28589.json delete mode 100644 2020/CVE-2020-3204.json delete mode 100644 2020/CVE-2020-3206.json delete mode 100644 2020/CVE-2020-3214.json delete mode 100644 2020/CVE-2020-3217.json delete mode 100644 2020/CVE-2020-3218.json delete mode 100644 2020/CVE-2020-3219.json delete mode 100644 2020/CVE-2020-3221.json delete mode 100644 2020/CVE-2020-3225.json delete mode 100644 2020/CVE-2020-3226.json delete mode 100644 2020/CVE-2020-3228.json delete mode 100644 2020/CVE-2020-3230.json delete mode 100644 2020/CVE-2020-3235.json delete mode 100644 2020/CVE-2020-3238.json delete mode 100644 2020/CVE-2020-3242.json delete mode 100644 2020/CVE-2020-3244.json delete mode 100644 2020/CVE-2020-3259.json delete mode 100644 2020/CVE-2020-3263.json delete mode 100644 2020/CVE-2020-3272.json delete mode 100644 2020/CVE-2020-3283.json delete mode 100644 2020/CVE-2020-3304.json delete mode 100644 2020/CVE-2020-3307.json delete mode 100644 2020/CVE-2020-3379.json delete mode 100644 2020/CVE-2020-3383.json delete mode 100644 2020/CVE-2020-3387.json delete mode 100644 2020/CVE-2020-3391.json delete mode 100644 2020/CVE-2020-3398.json delete mode 100644 2020/CVE-2020-3426.json delete mode 100644 2020/CVE-2020-3429.json delete mode 100644 2020/CVE-2020-3434.json delete mode 100644 2020/CVE-2020-3435.json delete mode 100644 2020/CVE-2020-3441.json delete mode 100644 2020/CVE-2020-3444.json delete mode 100644 2020/CVE-2020-3451.json delete mode 100644 2020/CVE-2020-3453.json delete mode 100644 2020/CVE-2020-3465.json delete mode 100644 2020/CVE-2020-3470.json delete mode 100644 2020/CVE-2020-3471.json delete mode 100644 2020/CVE-2020-3472.json delete mode 100644 2020/CVE-2020-3475.json delete mode 100644 2020/CVE-2020-3477.json delete mode 100644 2020/CVE-2020-36193.json delete mode 100644 2020/CVE-2020-36277.json delete mode 100644 2020/CVE-2020-36278.json delete mode 100644 2020/CVE-2020-36279.json delete mode 100644 2020/CVE-2020-36280.json delete mode 100644 2020/CVE-2020-36281.json delete mode 100644 2020/CVE-2020-3960.json delete mode 100644 2020/CVE-2020-4690.json delete mode 100644 2020/CVE-2020-4803.json delete mode 100644 2020/CVE-2020-4805.json delete mode 100644 2020/CVE-2020-4809.json delete mode 100644 2020/CVE-2020-4941.json delete mode 100644 2020/CVE-2020-4944.json delete mode 100644 2020/CVE-2020-7524.json delete mode 100644 2020/CVE-2020-7565.json delete mode 100644 2020/CVE-2020-7566.json delete mode 100644 2020/CVE-2020-8561.json delete mode 100644 2020/CVE-2020-8955.json delete mode 100644 2020/CVE-2020-9281.json delete mode 100644 2020/CVE-2020-9759.json delete mode 100644 2020/CVE-2020-9760.json delete mode 100644 2021/CVE-2021-0002.json delete mode 100644 2021/CVE-2021-0006.json delete mode 100644 2021/CVE-2021-0007.json delete mode 100644 2021/CVE-2021-0008.json delete mode 100644 2021/CVE-2021-0009.json delete mode 100644 2021/CVE-2021-0012.json delete mode 100644 2021/CVE-2021-0061.json delete mode 100644 2021/CVE-2021-0062.json delete mode 100644 2021/CVE-2021-0114.json delete mode 100644 2021/CVE-2021-0129.json delete mode 100644 2021/CVE-2021-0422.json delete mode 100644 2021/CVE-2021-0423.json delete mode 100644 2021/CVE-2021-0424.json delete mode 100644 2021/CVE-2021-0425.json delete mode 100644 2021/CVE-2021-0610.json delete mode 100644 2021/CVE-2021-0611.json delete mode 100644 2021/CVE-2021-0612.json delete mode 100644 2021/CVE-2021-0660.json create mode 100644 2021/CVE-2021-10086.json create mode 100644 2021/CVE-2021-123456.json delete mode 100644 2021/CVE-2021-1419.json create mode 100644 2021/CVE-2021-1480.json delete mode 100644 2021/CVE-2021-1546.json delete mode 100644 2021/CVE-2021-1588.json delete mode 100644 2021/CVE-2021-1589.json delete mode 100644 2021/CVE-2021-1590.json delete mode 100644 2021/CVE-2021-1591.json delete mode 100644 2021/CVE-2021-1592.json delete mode 100644 2021/CVE-2021-1612.json delete mode 100644 2021/CVE-2021-1615.json delete mode 100644 2021/CVE-2021-1622.json delete mode 100644 2021/CVE-2021-1810.json delete mode 100644 2021/CVE-2021-1829.json delete mode 100644 2021/CVE-2021-1830.json delete mode 100644 2021/CVE-2021-1831.json delete mode 100644 2021/CVE-2021-1832.json delete mode 100644 2021/CVE-2021-1833.json delete mode 100644 2021/CVE-2021-1858.json delete mode 100644 2021/CVE-2021-1881.json delete mode 100644 2021/CVE-2021-1885.json delete mode 100644 2021/CVE-2021-1939.json delete mode 100644 2021/CVE-2021-1947.json delete mode 100644 2021/CVE-2021-1976.json delete mode 100644 2021/CVE-2021-20117.json delete mode 100644 2021/CVE-2021-20118.json delete mode 100644 2021/CVE-2021-20208.json delete mode 100644 2021/CVE-2021-20314.json delete mode 100644 2021/CVE-2021-20377.json delete mode 100644 2021/CVE-2021-20434.json delete mode 100644 2021/CVE-2021-20435.json delete mode 100644 2021/CVE-2021-20484.json delete mode 100644 2021/CVE-2021-20485.json delete mode 100644 2021/CVE-2021-20496.json delete mode 100644 2021/CVE-2021-20497.json delete mode 100644 2021/CVE-2021-20498.json delete mode 100644 2021/CVE-2021-20499.json delete mode 100644 2021/CVE-2021-20500.json delete mode 100644 2021/CVE-2021-20510.json delete mode 100644 2021/CVE-2021-20511.json delete mode 100644 2021/CVE-2021-20523.json delete mode 100644 2021/CVE-2021-20524.json delete mode 100644 2021/CVE-2021-20533.json delete mode 100644 2021/CVE-2021-20534.json delete mode 100644 2021/CVE-2021-20537.json delete mode 100644 2021/CVE-2021-20554.json delete mode 100644 2021/CVE-2021-20563.json delete mode 100644 2021/CVE-2021-20578.json delete mode 100644 2021/CVE-2021-20746.json delete mode 100644 2021/CVE-2021-20786.json delete mode 100644 2021/CVE-2021-20790.json delete mode 100644 2021/CVE-2021-20791.json delete mode 100644 2021/CVE-2021-20793.json delete mode 100644 2021/CVE-2021-20808.json delete mode 100644 2021/CVE-2021-20809.json delete mode 100644 2021/CVE-2021-20810.json delete mode 100644 2021/CVE-2021-20811.json delete mode 100644 2021/CVE-2021-20812.json delete mode 100644 2021/CVE-2021-20813.json delete mode 100644 2021/CVE-2021-20814.json delete mode 100644 2021/CVE-2021-20815.json delete mode 100644 2021/CVE-2021-20825.json delete mode 100644 2021/CVE-2021-20828.json delete mode 100644 2021/CVE-2021-20829.json delete mode 100644 2021/CVE-2021-21295.json delete mode 100644 2021/CVE-2021-21409.json delete mode 100644 2021/CVE-2021-21522.json delete mode 100644 2021/CVE-2021-21569.json delete mode 100644 2021/CVE-2021-21570.json delete mode 100644 2021/CVE-2021-21742.json delete mode 100644 2021/CVE-2021-21798.json delete mode 100644 2021/CVE-2021-21834.json delete mode 100644 2021/CVE-2021-21836.json delete mode 100644 2021/CVE-2021-21837.json delete mode 100644 2021/CVE-2021-21838.json delete mode 100644 2021/CVE-2021-21839.json delete mode 100644 2021/CVE-2021-21840.json delete mode 100644 2021/CVE-2021-21841.json delete mode 100644 2021/CVE-2021-21842.json delete mode 100644 2021/CVE-2021-21843.json delete mode 100644 2021/CVE-2021-21844.json delete mode 100644 2021/CVE-2021-21845.json delete mode 100644 2021/CVE-2021-21846.json delete mode 100644 2021/CVE-2021-21847.json delete mode 100644 2021/CVE-2021-21848.json delete mode 100644 2021/CVE-2021-21849.json delete mode 100644 2021/CVE-2021-21850.json delete mode 100644 2021/CVE-2021-21853.json delete mode 100644 2021/CVE-2021-21867.json delete mode 100644 2021/CVE-2021-21868.json delete mode 100644 2021/CVE-2021-21869.json delete mode 100644 2021/CVE-2021-21913.json delete mode 100644 2021/CVE-2021-21993.json delete mode 100644 2021/CVE-2021-22018.json delete mode 100644 2021/CVE-2021-22019.json delete mode 100644 2021/CVE-2021-22020.json delete mode 100644 2021/CVE-2021-22098.json create mode 100644 2021/CVE-2021-22146.json delete mode 100644 2021/CVE-2021-22699.json delete mode 100644 2021/CVE-2021-22868.json delete mode 100644 2021/CVE-2021-22869.json delete mode 100644 2021/CVE-2021-22922.json delete mode 100644 2021/CVE-2021-22924.json delete mode 100644 2021/CVE-2021-22925.json delete mode 100644 2021/CVE-2021-22926.json delete mode 100644 2021/CVE-2021-22939.json delete mode 100644 2021/CVE-2021-22948.json delete mode 100644 2021/CVE-2021-22949.json delete mode 100644 2021/CVE-2021-22950.json delete mode 100644 2021/CVE-2021-22952.json delete mode 100644 2021/CVE-2021-22953.json delete mode 100644 2021/CVE-2021-23026.json delete mode 100644 2021/CVE-2021-23027.json delete mode 100644 2021/CVE-2021-23030.json delete mode 100644 2021/CVE-2021-23031.json delete mode 100644 2021/CVE-2021-23054.json create mode 100644 2021/CVE-2021-23410.json delete mode 100644 2021/CVE-2021-23420.json delete mode 100644 2021/CVE-2021-23434.json delete mode 100644 2021/CVE-2021-23441.json delete mode 100644 2021/CVE-2021-23442.json delete mode 100644 2021/CVE-2021-23443.json delete mode 100644 2021/CVE-2021-23444.json create mode 100644 2021/CVE-2021-24155.json delete mode 100644 2021/CVE-2021-24176.json delete mode 100644 2021/CVE-2021-24274.json delete mode 100644 2021/CVE-2021-24275.json delete mode 100644 2021/CVE-2021-24276.json delete mode 100644 2021/CVE-2021-24286.json delete mode 100644 2021/CVE-2021-24287.json create mode 100644 2021/CVE-2021-24347.json delete mode 100644 2021/CVE-2021-24396.json delete mode 100644 2021/CVE-2021-24397.json delete mode 100644 2021/CVE-2021-24398.json delete mode 100644 2021/CVE-2021-24399.json delete mode 100644 2021/CVE-2021-24400.json delete mode 100644 2021/CVE-2021-24401.json delete mode 100644 2021/CVE-2021-24402.json delete mode 100644 2021/CVE-2021-24403.json delete mode 100644 2021/CVE-2021-24404.json delete mode 100644 2021/CVE-2021-24511.json delete mode 100644 2021/CVE-2021-24525.json delete mode 100644 2021/CVE-2021-24530.json delete mode 100644 2021/CVE-2021-24569.json delete mode 100644 2021/CVE-2021-24582.json delete mode 100644 2021/CVE-2021-24583.json delete mode 100644 2021/CVE-2021-24584.json delete mode 100644 2021/CVE-2021-24585.json delete mode 100644 2021/CVE-2021-24587.json delete mode 100644 2021/CVE-2021-24596.json delete mode 100644 2021/CVE-2021-24597.json delete mode 100644 2021/CVE-2021-24600.json delete mode 100644 2021/CVE-2021-24604.json delete mode 100644 2021/CVE-2021-24606.json delete mode 100644 2021/CVE-2021-24609.json delete mode 100644 2021/CVE-2021-24610.json delete mode 100644 2021/CVE-2021-24613.json delete mode 100644 2021/CVE-2021-24618.json delete mode 100644 2021/CVE-2021-24620.json delete mode 100644 2021/CVE-2021-24632.json delete mode 100644 2021/CVE-2021-24633.json delete mode 100644 2021/CVE-2021-24634.json delete mode 100644 2021/CVE-2021-24635.json delete mode 100644 2021/CVE-2021-24636.json delete mode 100644 2021/CVE-2021-24637.json delete mode 100644 2021/CVE-2021-24638.json delete mode 100644 2021/CVE-2021-24639.json delete mode 100644 2021/CVE-2021-2464.json delete mode 100644 2021/CVE-2021-24640.json delete mode 100644 2021/CVE-2021-24643.json delete mode 100644 2021/CVE-2021-24652.json delete mode 100644 2021/CVE-2021-24657.json delete mode 100644 2021/CVE-2021-24659.json delete mode 100644 2021/CVE-2021-24660.json delete mode 100644 2021/CVE-2021-24661.json delete mode 100644 2021/CVE-2021-24663.json delete mode 100644 2021/CVE-2021-24667.json delete mode 100644 2021/CVE-2021-24670.json delete mode 100644 2021/CVE-2021-25737.json delete mode 100644 2021/CVE-2021-25740.json delete mode 100644 2021/CVE-2021-25741.json create mode 100644 2021/CVE-2021-26690.json create mode 100644 2021/CVE-2021-26691.json delete mode 100644 2021/CVE-2021-26750.json delete mode 100644 2021/CVE-2021-26794.json delete mode 100644 2021/CVE-2021-27044.json delete mode 100644 2021/CVE-2021-27045.json delete mode 100644 2021/CVE-2021-27046.json delete mode 100644 2021/CVE-2021-27340.json delete mode 100644 2021/CVE-2021-27341.json delete mode 100644 2021/CVE-2021-27391.json delete mode 100644 2021/CVE-2021-27556.json delete mode 100644 2021/CVE-2021-27578.json delete mode 100644 2021/CVE-2021-27662.json delete mode 100644 2021/CVE-2021-27912.json delete mode 100644 2021/CVE-2021-27913.json delete mode 100644 2021/CVE-2021-28116.json delete mode 100644 2021/CVE-2021-28163.json delete mode 100644 2021/CVE-2021-28164.json delete mode 100644 2021/CVE-2021-28165.json delete mode 100644 2021/CVE-2021-28169.json create mode 100644 2021/CVE-2021-28378.json delete mode 100644 2021/CVE-2021-28547.json delete mode 100644 2021/CVE-2021-28550.json delete mode 100644 2021/CVE-2021-28553.json delete mode 100644 2021/CVE-2021-28559.json delete mode 100644 2021/CVE-2021-28560.json delete mode 100644 2021/CVE-2021-28561.json delete mode 100644 2021/CVE-2021-28564.json delete mode 100644 2021/CVE-2021-28565.json delete mode 100644 2021/CVE-2021-28674.json delete mode 100644 2021/CVE-2021-28694.json delete mode 100644 2021/CVE-2021-28695.json delete mode 100644 2021/CVE-2021-28696.json delete mode 100644 2021/CVE-2021-28697.json delete mode 100644 2021/CVE-2021-28698.json delete mode 100644 2021/CVE-2021-28699.json delete mode 100644 2021/CVE-2021-28700.json delete mode 100644 2021/CVE-2021-28701.json delete mode 100644 2021/CVE-2021-28901.json delete mode 100644 2021/CVE-2021-28960.json delete mode 100644 2021/CVE-2021-29425.json delete mode 100644 2021/CVE-2021-29484.json delete mode 100644 2021/CVE-2021-29699.json delete mode 100644 2021/CVE-2021-29742.json delete mode 100644 2021/CVE-2021-29750.json delete mode 100644 2021/CVE-2021-29752.json delete mode 100644 2021/CVE-2021-29763.json delete mode 100644 2021/CVE-2021-29773.json delete mode 100644 2021/CVE-2021-29795.json delete mode 100644 2021/CVE-2021-29800.json delete mode 100644 2021/CVE-2021-29806.json delete mode 100644 2021/CVE-2021-29807.json delete mode 100644 2021/CVE-2021-29808.json delete mode 100644 2021/CVE-2021-29809.json delete mode 100644 2021/CVE-2021-29810.json delete mode 100644 2021/CVE-2021-29811.json delete mode 100644 2021/CVE-2021-29812.json delete mode 100644 2021/CVE-2021-29813.json delete mode 100644 2021/CVE-2021-29814.json delete mode 100644 2021/CVE-2021-29815.json delete mode 100644 2021/CVE-2021-29816.json delete mode 100644 2021/CVE-2021-29817.json delete mode 100644 2021/CVE-2021-29818.json delete mode 100644 2021/CVE-2021-29819.json delete mode 100644 2021/CVE-2021-29820.json delete mode 100644 2021/CVE-2021-29821.json delete mode 100644 2021/CVE-2021-29825.json delete mode 100644 2021/CVE-2021-29831.json delete mode 100644 2021/CVE-2021-29832.json delete mode 100644 2021/CVE-2021-29833.json delete mode 100644 2021/CVE-2021-29834.json delete mode 100644 2021/CVE-2021-29842.json delete mode 100644 2021/CVE-2021-29856.json delete mode 100644 2021/CVE-2021-29894.json delete mode 100644 2021/CVE-2021-29904.json delete mode 100644 2021/CVE-2021-29905.json delete mode 100644 2021/CVE-2021-30086.json delete mode 100644 2021/CVE-2021-30123.json delete mode 100644 2021/CVE-2021-30137.json delete mode 100644 2021/CVE-2021-30261.json delete mode 100644 2021/CVE-2021-3045.json delete mode 100644 2021/CVE-2021-3046.json delete mode 100644 2021/CVE-2021-30468.json delete mode 100644 2021/CVE-2021-3047.json delete mode 100644 2021/CVE-2021-3048.json delete mode 100644 2021/CVE-2021-3050.json delete mode 100644 2021/CVE-2021-30542.json delete mode 100644 2021/CVE-2021-30543.json create mode 100644 2021/CVE-2021-30641.json delete mode 100644 2021/CVE-2021-30653.json delete mode 100644 2021/CVE-2021-30654.json delete mode 100644 2021/CVE-2021-30671.json delete mode 100644 2021/CVE-2021-30682.json delete mode 100644 2021/CVE-2021-30684.json delete mode 100644 2021/CVE-2021-30686.json delete mode 100644 2021/CVE-2021-30687.json delete mode 100644 2021/CVE-2021-30688.json delete mode 100644 2021/CVE-2021-30689.json delete mode 100644 2021/CVE-2021-30690.json delete mode 100644 2021/CVE-2021-30691.json delete mode 100644 2021/CVE-2021-30692.json delete mode 100644 2021/CVE-2021-30693.json delete mode 100644 2021/CVE-2021-30694.json delete mode 100644 2021/CVE-2021-30695.json delete mode 100644 2021/CVE-2021-30696.json delete mode 100644 2021/CVE-2021-30697.json delete mode 100644 2021/CVE-2021-30698.json delete mode 100644 2021/CVE-2021-30699.json delete mode 100644 2021/CVE-2021-30700.json delete mode 100644 2021/CVE-2021-30701.json delete mode 100644 2021/CVE-2021-30703.json delete mode 100644 2021/CVE-2021-30704.json delete mode 100644 2021/CVE-2021-30705.json delete mode 100644 2021/CVE-2021-30713.json delete mode 100644 2021/CVE-2021-30768.json delete mode 100644 2021/CVE-2021-30773.json delete mode 100644 2021/CVE-2021-30776.json delete mode 100644 2021/CVE-2021-30777.json delete mode 100644 2021/CVE-2021-30779.json delete mode 100644 2021/CVE-2021-30780.json delete mode 100644 2021/CVE-2021-30781.json delete mode 100644 2021/CVE-2021-30783.json delete mode 100644 2021/CVE-2021-30858.json delete mode 100644 2021/CVE-2021-31535.json delete mode 100644 2021/CVE-2021-31604.json delete mode 100644 2021/CVE-2021-31605.json delete mode 100644 2021/CVE-2021-31606.json create mode 100644 2021/CVE-2021-31630.json delete mode 100644 2021/CVE-2021-31721.json delete mode 100644 2021/CVE-2021-31799.json delete mode 100644 2021/CVE-2021-31810.json delete mode 100644 2021/CVE-2021-31819.json delete mode 100644 2021/CVE-2021-31836.json delete mode 100644 2021/CVE-2021-31841.json delete mode 100644 2021/CVE-2021-31842.json delete mode 100644 2021/CVE-2021-31843.json delete mode 100644 2021/CVE-2021-31844.json delete mode 100644 2021/CVE-2021-31845.json delete mode 100644 2021/CVE-2021-31847.json delete mode 100644 2021/CVE-2021-31878.json delete mode 100644 2021/CVE-2021-31891.json delete mode 100644 2021/CVE-2021-31923.json delete mode 100644 2021/CVE-2021-31989.json delete mode 100644 2021/CVE-2021-32265.json delete mode 100644 2021/CVE-2021-32268.json delete mode 100644 2021/CVE-2021-32269.json delete mode 100644 2021/CVE-2021-32270.json delete mode 100644 2021/CVE-2021-32271.json delete mode 100644 2021/CVE-2021-32272.json delete mode 100644 2021/CVE-2021-32273.json delete mode 100644 2021/CVE-2021-32274.json delete mode 100644 2021/CVE-2021-32275.json delete mode 100644 2021/CVE-2021-32276.json delete mode 100644 2021/CVE-2021-32277.json delete mode 100644 2021/CVE-2021-32278.json delete mode 100644 2021/CVE-2021-32280.json delete mode 100644 2021/CVE-2021-32281.json delete mode 100644 2021/CVE-2021-32282.json delete mode 100644 2021/CVE-2021-32283.json delete mode 100644 2021/CVE-2021-32284.json delete mode 100644 2021/CVE-2021-32285.json delete mode 100644 2021/CVE-2021-32286.json delete mode 100644 2021/CVE-2021-32287.json delete mode 100644 2021/CVE-2021-32288.json delete mode 100644 2021/CVE-2021-32289.json delete mode 100644 2021/CVE-2021-32294.json delete mode 100644 2021/CVE-2021-32297.json delete mode 100644 2021/CVE-2021-32298.json delete mode 100644 2021/CVE-2021-32299.json delete mode 100644 2021/CVE-2021-32466.json delete mode 100644 2021/CVE-2021-32558.json delete mode 100644 2021/CVE-2021-32610.json delete mode 100644 2021/CVE-2021-32777.json delete mode 100644 2021/CVE-2021-32778.json delete mode 100644 2021/CVE-2021-32808.json delete mode 100644 2021/CVE-2021-32809.json create mode 100644 2021/CVE-2021-3281.json delete mode 100644 2021/CVE-2021-32838.json delete mode 100644 2021/CVE-2021-32839.json delete mode 100644 2021/CVE-2021-32931.json delete mode 100644 2021/CVE-2021-32955.json delete mode 100644 2021/CVE-2021-32959.json delete mode 100644 2021/CVE-2021-32963.json delete mode 100644 2021/CVE-2021-32967.json delete mode 100644 2021/CVE-2021-32971.json delete mode 100644 2021/CVE-2021-32979.json delete mode 100644 2021/CVE-2021-32983.json delete mode 100644 2021/CVE-2021-32987.json delete mode 100644 2021/CVE-2021-32991.json delete mode 100644 2021/CVE-2021-32995.json delete mode 100644 2021/CVE-2021-32999.json delete mode 100644 2021/CVE-2021-33003.json delete mode 100644 2021/CVE-2021-33007.json delete mode 100644 2021/CVE-2021-33015.json delete mode 100644 2021/CVE-2021-33019.json delete mode 100644 2021/CVE-2021-33044.json delete mode 100644 2021/CVE-2021-33045.json delete mode 100644 2021/CVE-2021-33193.json delete mode 100644 2021/CVE-2021-33594.json delete mode 100644 2021/CVE-2021-33595.json delete mode 100644 2021/CVE-2021-33690.json delete mode 100644 2021/CVE-2021-33691.json delete mode 100644 2021/CVE-2021-33692.json delete mode 100644 2021/CVE-2021-33693.json delete mode 100644 2021/CVE-2021-33694.json delete mode 100644 2021/CVE-2021-33695.json delete mode 100644 2021/CVE-2021-33696.json delete mode 100644 2021/CVE-2021-33697.json delete mode 100644 2021/CVE-2021-33698.json delete mode 100644 2021/CVE-2021-33700.json delete mode 100644 2021/CVE-2021-33701.json delete mode 100644 2021/CVE-2021-33704.json delete mode 100644 2021/CVE-2021-33705.json delete mode 100644 2021/CVE-2021-33719.json delete mode 100644 2021/CVE-2021-33720.json delete mode 100644 2021/CVE-2021-33737.json delete mode 100644 2021/CVE-2021-33829.json delete mode 100644 2021/CVE-2021-33904.json create mode 100644 2021/CVE-2021-34045.json delete mode 100644 2021/CVE-2021-34345.json delete mode 100644 2021/CVE-2021-34352.json delete mode 100644 2021/CVE-2021-34354.json delete mode 100644 2021/CVE-2021-34355.json delete mode 100644 2021/CVE-2021-34356.json delete mode 100644 2021/CVE-2021-34369.json delete mode 100644 2021/CVE-2021-34370.json create mode 100644 2021/CVE-2021-3438.json delete mode 100644 2021/CVE-2021-34428.json delete mode 100644 2021/CVE-2021-34429.json create mode 100644 2021/CVE-2021-34470.json create mode 100644 2021/CVE-2021-34496.json rename 2021/{CVE-2021-34423.json => CVE-2021-34523.json} (83%) create mode 100644 2021/CVE-2021-34558.json delete mode 100644 2021/CVE-2021-34570.json delete mode 100644 2021/CVE-2021-34571.json delete mode 100644 2021/CVE-2021-34572.json delete mode 100644 2021/CVE-2021-34573.json delete mode 100644 2021/CVE-2021-34576.json delete mode 100644 2021/CVE-2021-34636.json delete mode 100644 2021/CVE-2021-34640.json delete mode 100644 2021/CVE-2021-34647.json delete mode 100644 2021/CVE-2021-34648.json delete mode 100644 2021/CVE-2021-34650.json delete mode 100644 2021/CVE-2021-34723.json delete mode 100644 2021/CVE-2021-34798.json delete mode 100644 2021/CVE-2021-35027.json delete mode 100644 2021/CVE-2021-35028.json create mode 100644 2021/CVE-2021-3516.json delete mode 100644 2021/CVE-2021-35197.json delete mode 100644 2021/CVE-2021-35198.json delete mode 100644 2021/CVE-2021-35199.json delete mode 100644 2021/CVE-2021-35200.json delete mode 100644 2021/CVE-2021-35201.json delete mode 100644 2021/CVE-2021-35202.json delete mode 100644 2021/CVE-2021-35203.json delete mode 100644 2021/CVE-2021-35204.json delete mode 100644 2021/CVE-2021-35205.json delete mode 100644 2021/CVE-2021-3544.json create mode 100644 2021/CVE-2021-35448.json delete mode 100644 2021/CVE-2021-3545.json delete mode 100644 2021/CVE-2021-3546.json delete mode 100644 2021/CVE-2021-35478.json delete mode 100644 2021/CVE-2021-35479.json delete mode 100644 2021/CVE-2021-3561.json delete mode 100644 2021/CVE-2021-35940.json delete mode 100644 2021/CVE-2021-35943.json delete mode 100644 2021/CVE-2021-35944.json delete mode 100644 2021/CVE-2021-35945.json create mode 100644 2021/CVE-2021-35956.json delete mode 100644 2021/CVE-2021-36004.json delete mode 100644 2021/CVE-2021-36134.json delete mode 100644 2021/CVE-2021-36159.json delete mode 100644 2021/CVE-2021-36160.json delete mode 100644 2021/CVE-2021-36218.json delete mode 100644 2021/CVE-2021-36219.json create mode 100644 2021/CVE-2021-3625.json delete mode 100644 2021/CVE-2021-3626.json delete mode 100644 2021/CVE-2021-3628.json delete mode 100644 2021/CVE-2021-36283.json delete mode 100644 2021/CVE-2021-36284.json delete mode 100644 2021/CVE-2021-36285.json delete mode 100644 2021/CVE-2021-36286.json delete mode 100644 2021/CVE-2021-3634.json delete mode 100644 2021/CVE-2021-36359.json delete mode 100644 2021/CVE-2021-36363.json delete mode 100644 2021/CVE-2021-36364.json delete mode 100644 2021/CVE-2021-36365.json delete mode 100644 2021/CVE-2021-36366.json delete mode 100644 2021/CVE-2021-36621.json delete mode 100644 2021/CVE-2021-3673.json delete mode 100644 2021/CVE-2021-36745.json create mode 100644 2021/CVE-2021-36746.json create mode 100644 2021/CVE-2021-36747.json delete mode 100644 2021/CVE-2021-36749.json delete mode 100644 2021/CVE-2021-36754.json create mode 100644 2021/CVE-2021-3679.json create mode 100644 2021/CVE-2021-36799.json delete mode 100644 2021/CVE-2021-3682.json delete mode 100644 2021/CVE-2021-36823.json delete mode 100644 2021/CVE-2021-36841.json delete mode 100644 2021/CVE-2021-36870.json delete mode 100644 2021/CVE-2021-36871.json delete mode 100644 2021/CVE-2021-36872.json delete mode 100644 2021/CVE-2021-36873.json delete mode 100644 2021/CVE-2021-36874.json delete mode 100644 2021/CVE-2021-36875.json delete mode 100644 2021/CVE-2021-36876.json delete mode 100644 2021/CVE-2021-36877.json delete mode 100644 2021/CVE-2021-36878.json delete mode 100644 2021/CVE-2021-36879.json delete mode 100644 2021/CVE-2021-36880.json delete mode 100644 2021/CVE-2021-36928.json delete mode 100644 2021/CVE-2021-36983.json delete mode 100644 2021/CVE-2021-3712.json delete mode 100644 2021/CVE-2021-3713.json create mode 100644 2021/CVE-2021-37152.json delete mode 100644 2021/CVE-2021-37202.json delete mode 100644 2021/CVE-2021-37203.json delete mode 100644 2021/CVE-2021-37206.json delete mode 100644 2021/CVE-2021-37267.json delete mode 100644 2021/CVE-2021-37271.json delete mode 100644 2021/CVE-2021-37414.json delete mode 100644 2021/CVE-2021-37419.json delete mode 100644 2021/CVE-2021-37420.json delete mode 100644 2021/CVE-2021-37422.json delete mode 100644 2021/CVE-2021-37423.json delete mode 100644 2021/CVE-2021-37424.json delete mode 100644 2021/CVE-2021-3747.json delete mode 100644 2021/CVE-2021-37539.json delete mode 100644 2021/CVE-2021-37576.json delete mode 100644 2021/CVE-2021-37605.json delete mode 100644 2021/CVE-2021-37608.json delete mode 100644 2021/CVE-2021-37694.json delete mode 100644 2021/CVE-2021-37695.json delete mode 100644 2021/CVE-2021-3770.json delete mode 100644 2021/CVE-2021-37741.json delete mode 100644 2021/CVE-2021-37749.json delete mode 100644 2021/CVE-2021-37750.json delete mode 100644 2021/CVE-2021-37761.json delete mode 100644 2021/CVE-2021-3778.json create mode 100644 2021/CVE-2021-37833.json delete mode 100644 2021/CVE-2021-37909.json delete mode 100644 2021/CVE-2021-37912.json delete mode 100644 2021/CVE-2021-37913.json delete mode 100644 2021/CVE-2021-37925.json delete mode 100644 2021/CVE-2021-37927.json delete mode 100644 2021/CVE-2021-3794.json delete mode 100644 2021/CVE-2021-3795.json delete mode 100644 2021/CVE-2021-3796.json delete mode 100644 2021/CVE-2021-3797.json delete mode 100644 2021/CVE-2021-3799.json delete mode 100644 2021/CVE-2021-3801.json delete mode 100644 2021/CVE-2021-3803.json delete mode 100644 2021/CVE-2021-3804.json delete mode 100644 2021/CVE-2021-3805.json delete mode 100644 2021/CVE-2021-3806.json delete mode 100644 2021/CVE-2021-3807.json delete mode 100644 2021/CVE-2021-38085.json delete mode 100644 2021/CVE-2021-3810.json delete mode 100644 2021/CVE-2021-3811.json delete mode 100644 2021/CVE-2021-38112.json delete mode 100644 2021/CVE-2021-3812.json delete mode 100644 2021/CVE-2021-38124.json create mode 100644 2021/CVE-2021-38149.json delete mode 100644 2021/CVE-2021-38153.json delete mode 100644 2021/CVE-2021-38156.json delete mode 100644 2021/CVE-2021-38173.json delete mode 100644 2021/CVE-2021-38176.json delete mode 100644 2021/CVE-2021-3818.json delete mode 100644 2021/CVE-2021-3819.json delete mode 100644 2021/CVE-2021-3820.json delete mode 100644 2021/CVE-2021-3822.json delete mode 100644 2021/CVE-2021-3824.json delete mode 100644 2021/CVE-2021-3828.json delete mode 100644 2021/CVE-2021-3830.json delete mode 100644 2021/CVE-2021-38300.json delete mode 100644 2021/CVE-2021-38303.json delete mode 100644 2021/CVE-2021-38304.json delete mode 100644 2021/CVE-2021-38385.json delete mode 100644 2021/CVE-2021-38402.json delete mode 100644 2021/CVE-2021-38404.json delete mode 100644 2021/CVE-2021-38406.json delete mode 100644 2021/CVE-2021-38514.json delete mode 100644 2021/CVE-2021-38516.json delete mode 100644 2021/CVE-2021-38527.json delete mode 100644 2021/CVE-2021-38534.json delete mode 100644 2021/CVE-2021-38604.json delete mode 100644 2021/CVE-2021-38635.json delete mode 100644 2021/CVE-2021-38669.json delete mode 100644 2021/CVE-2021-38675.json delete mode 100644 2021/CVE-2021-38714.json delete mode 100644 2021/CVE-2021-38863.json delete mode 100644 2021/CVE-2021-38864.json delete mode 100644 2021/CVE-2021-38870.json delete mode 100644 2021/CVE-2021-38877.json delete mode 100644 2021/CVE-2021-38899.json delete mode 100644 2021/CVE-2021-39111.json delete mode 100644 2021/CVE-2021-39113.json delete mode 100644 2021/CVE-2021-39117.json delete mode 100644 2021/CVE-2021-39138.json delete mode 100644 2021/CVE-2021-39139.json delete mode 100644 2021/CVE-2021-39140.json delete mode 100644 2021/CVE-2021-39144.json delete mode 100644 2021/CVE-2021-39145.json delete mode 100644 2021/CVE-2021-39146.json delete mode 100644 2021/CVE-2021-39147.json delete mode 100644 2021/CVE-2021-39148.json delete mode 100644 2021/CVE-2021-39149.json delete mode 100644 2021/CVE-2021-39150.json delete mode 100644 2021/CVE-2021-39151.json delete mode 100644 2021/CVE-2021-39152.json delete mode 100644 2021/CVE-2021-39153.json delete mode 100644 2021/CVE-2021-39154.json delete mode 100644 2021/CVE-2021-39159.json delete mode 100644 2021/CVE-2021-39189.json delete mode 100644 2021/CVE-2021-39201.json delete mode 100644 2021/CVE-2021-39204.json delete mode 100644 2021/CVE-2021-39205.json delete mode 100644 2021/CVE-2021-39206.json delete mode 100644 2021/CVE-2021-39208.json delete mode 100644 2021/CVE-2021-39209.json delete mode 100644 2021/CVE-2021-39210.json delete mode 100644 2021/CVE-2021-39211.json delete mode 100644 2021/CVE-2021-39213.json delete mode 100644 2021/CVE-2021-39214.json delete mode 100644 2021/CVE-2021-39215.json delete mode 100644 2021/CVE-2021-39216.json delete mode 100644 2021/CVE-2021-39218.json delete mode 100644 2021/CVE-2021-39219.json delete mode 100644 2021/CVE-2021-39227.json delete mode 100644 2021/CVE-2021-39228.json delete mode 100644 2021/CVE-2021-39229.json delete mode 100644 2021/CVE-2021-39230.json delete mode 100644 2021/CVE-2021-39239.json delete mode 100644 2021/CVE-2021-39246.json delete mode 100644 2021/CVE-2021-39271.json delete mode 100644 2021/CVE-2021-39275.json delete mode 100644 2021/CVE-2021-39307.json delete mode 100644 2021/CVE-2021-39325.json delete mode 100644 2021/CVE-2021-39327.json delete mode 100644 2021/CVE-2021-39339.json delete mode 100644 2021/CVE-2021-39371.json delete mode 100644 2021/CVE-2021-39375.json delete mode 100644 2021/CVE-2021-39392.json delete mode 100644 2021/CVE-2021-39402.json delete mode 100644 2021/CVE-2021-39404.json delete mode 100644 2021/CVE-2021-39514.json delete mode 100644 2021/CVE-2021-39531.json delete mode 100644 2021/CVE-2021-39532.json delete mode 100644 2021/CVE-2021-39533.json delete mode 100644 2021/CVE-2021-39534.json delete mode 100644 2021/CVE-2021-39535.json delete mode 100644 2021/CVE-2021-39536.json delete mode 100644 2021/CVE-2021-39537.json delete mode 100644 2021/CVE-2021-39818.json delete mode 100644 2021/CVE-2021-39819.json delete mode 100644 2021/CVE-2021-39821.json delete mode 100644 2021/CVE-2021-39823.json delete mode 100644 2021/CVE-2021-39824.json delete mode 100644 2021/CVE-2021-39825.json delete mode 100644 2021/CVE-2021-39826.json delete mode 100644 2021/CVE-2021-39827.json delete mode 100644 2021/CVE-2021-39828.json delete mode 100644 2021/CVE-2021-39862.json delete mode 100644 2021/CVE-2021-39865.json delete mode 100644 2021/CVE-2021-40066.json delete mode 100644 2021/CVE-2021-40067.json delete mode 100644 2021/CVE-2021-40097.json delete mode 100644 2021/CVE-2021-40098.json delete mode 100644 2021/CVE-2021-40099.json delete mode 100644 2021/CVE-2021-40100.json delete mode 100644 2021/CVE-2021-40102.json delete mode 100644 2021/CVE-2021-40103.json delete mode 100644 2021/CVE-2021-40104.json delete mode 100644 2021/CVE-2021-40105.json delete mode 100644 2021/CVE-2021-40106.json delete mode 100644 2021/CVE-2021-40108.json delete mode 100644 2021/CVE-2021-40109.json delete mode 100644 2021/CVE-2021-40145.json delete mode 100644 2021/CVE-2021-40153.json delete mode 100644 2021/CVE-2021-40155.json delete mode 100644 2021/CVE-2021-40156.json delete mode 100644 2021/CVE-2021-40157.json delete mode 100644 2021/CVE-2021-40238.json delete mode 100644 2021/CVE-2021-40309.json delete mode 100644 2021/CVE-2021-40310.json delete mode 100644 2021/CVE-2021-40349.json delete mode 100644 2021/CVE-2021-40354.json delete mode 100644 2021/CVE-2021-40355.json delete mode 100644 2021/CVE-2021-40356.json delete mode 100644 2021/CVE-2021-40357.json delete mode 100644 2021/CVE-2021-40438.json delete mode 100644 2021/CVE-2021-40490.json delete mode 100644 2021/CVE-2021-40516.json delete mode 100644 2021/CVE-2021-40530.json delete mode 100644 2021/CVE-2021-40639.json delete mode 100644 2021/CVE-2021-40654.json delete mode 100644 2021/CVE-2021-40655.json delete mode 100644 2021/CVE-2021-40670.json delete mode 100644 2021/CVE-2021-40674.json delete mode 100644 2021/CVE-2021-40690.json delete mode 100644 2021/CVE-2021-40697.json delete mode 100644 2021/CVE-2021-40700.json delete mode 100644 2021/CVE-2021-40701.json delete mode 100644 2021/CVE-2021-40702.json delete mode 100644 2021/CVE-2021-40703.json delete mode 100644 2021/CVE-2021-40708.json delete mode 100644 2021/CVE-2021-40709.json delete mode 100644 2021/CVE-2021-40710.json delete mode 100644 2021/CVE-2021-40711.json delete mode 100644 2021/CVE-2021-40712.json delete mode 100644 2021/CVE-2021-40713.json delete mode 100644 2021/CVE-2021-40714.json delete mode 100644 2021/CVE-2021-40715.json delete mode 100644 2021/CVE-2021-40825.json delete mode 100644 2021/CVE-2021-40862.json delete mode 100644 2021/CVE-2021-40868.json delete mode 100644 2021/CVE-2021-40881.json delete mode 100644 2021/CVE-2021-40921.json delete mode 100644 2021/CVE-2021-40922.json delete mode 100644 2021/CVE-2021-40923.json delete mode 100644 2021/CVE-2021-40924.json delete mode 100644 2021/CVE-2021-40925.json delete mode 100644 2021/CVE-2021-40926.json delete mode 100644 2021/CVE-2021-40927.json delete mode 100644 2021/CVE-2021-40928.json delete mode 100644 2021/CVE-2021-40964.json delete mode 100644 2021/CVE-2021-40965.json delete mode 100644 2021/CVE-2021-40966.json delete mode 100644 2021/CVE-2021-40968.json delete mode 100644 2021/CVE-2021-40969.json delete mode 100644 2021/CVE-2021-40970.json delete mode 100644 2021/CVE-2021-40971.json delete mode 100644 2021/CVE-2021-40972.json delete mode 100644 2021/CVE-2021-40973.json delete mode 100644 2021/CVE-2021-40975.json delete mode 100644 2021/CVE-2021-40981.json delete mode 100644 2021/CVE-2021-41061.json delete mode 100644 2021/CVE-2021-41073.json delete mode 100644 2021/CVE-2021-41077.json delete mode 100644 2021/CVE-2021-41079.json delete mode 100644 2021/CVE-2021-41082.json delete mode 100644 2021/CVE-2021-41083.json delete mode 100644 2021/CVE-2021-41086.json delete mode 100644 2021/CVE-2021-41088.json delete mode 100644 2021/CVE-2021-41303.json delete mode 100644 2021/CVE-2021-41314.json delete mode 100644 2021/CVE-2021-41315.json delete mode 100644 2021/CVE-2021-41316.json delete mode 100644 2021/CVE-2021-41317.json delete mode 100644 2021/CVE-2021-41326.json delete mode 100644 2021/CVE-2021-41380.json delete mode 100644 2021/CVE-2021-41381.json delete mode 100644 2021/CVE-2021-41382.json delete mode 100644 2021/CVE-2021-41383.json delete mode 100644 2021/CVE-2021-41387.json delete mode 100644 2021/CVE-2021-41390.json delete mode 100644 2021/CVE-2021-41391.json delete mode 100644 2021/CVE-2021-41392.json delete mode 100644 2021/CVE-2021-41393.json delete mode 100644 2021/CVE-2021-41394.json delete mode 100644 2021/CVE-2021-41395.json delete mode 100644 2021/CVE-2021-41428.json delete mode 100644 2021/CVE-2021-41461.json delete mode 100644 2021/CVE-2021-41462.json delete mode 100644 2021/CVE-2021-41463.json delete mode 100644 2021/CVE-2021-41464.json delete mode 100644 2021/CVE-2021-41465.json delete mode 100644 2021/CVE-2021-41467.json delete mode 100644 2021/CVE-2021-41503.json delete mode 100644 2021/CVE-2021-41504.json delete mode 100644 2021/CVE-2021-41525.json delete mode 100644 2021/CVE-2021-41533.json delete mode 100644 2021/CVE-2021-41534.json delete mode 100644 2021/CVE-2021-41535.json delete mode 100644 2021/CVE-2021-41536.json delete mode 100644 2021/CVE-2021-41537.json delete mode 100644 2021/CVE-2021-41538.json delete mode 100644 2021/CVE-2021-41539.json delete mode 100644 2021/CVE-2021-41540.json delete mode 100644 2021/CVE-2021-41558.json delete mode 100644 2021/CVE-2021-41581.json delete mode 100644 2021/CVE-2021-41584.json delete mode 100644 2021/CVE-2021-41586.json delete mode 100644 2021/CVE-2021-41587.json delete mode 100644 2021/CVE-2021-41588.json delete mode 100644 2021/CVE-2021-41617.json delete mode 100644 2021/CVE-2021-41720.json delete mode 100644 2021/CVE-2021-41764.json diff --git a/2006/CVE-2006-4468.json b/2006/CVE-2006-4468.json deleted file mode 100644 index 047b806cee..0000000000 --- a/2006/CVE-2006-4468.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412621001, - "name": "CVE-2006-4468", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2006-4468", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2006-4468", - "description": "PoC for exploiting CVE-2006-4468 : Multiple unspecified vulnerabilities in Joomla! before 1.0.11, related to unvalidated input, allow attackers to have an unknown impact via unspecified vectors involving the (1) mosMail, (2) JosIsValidEmail, and (3) josSpoofValue functions; (4) the lack of inclusion of globals.php in administrator\/index.php; (5) the Admin User Manager; and (6) the poll module.", - "fork": false, - "created_at": "2021-10-01T21:25:41Z", - "updated_at": "2021-10-05T10:45:32Z", - "pushed_at": "2021-10-05T10:45:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2006/CVE-2006-4469.json b/2006/CVE-2006-4469.json deleted file mode 100644 index aff00b3f20..0000000000 --- a/2006/CVE-2006-4469.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412620965, - "name": "CVE-2006-4469", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2006-4469", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2006-4469", - "description": "PoC for exploiting CVE-2006-4469 : Unspecified vulnerability in PEAR.php in Joomla! before 1.0.11 allows remote attackers to perform \"remote execution,\" related to \"Injection Flaws.\"", - "fork": false, - "created_at": "2021-10-01T21:25:26Z", - "updated_at": "2021-10-05T10:45:23Z", - "pushed_at": "2021-10-05T10:45:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2006/CVE-2006-4470.json b/2006/CVE-2006-4470.json deleted file mode 100644 index ba79ed3add..0000000000 --- a/2006/CVE-2006-4470.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412620971, - "name": "CVE-2006-4470", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2006-4470", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2006-4470", - "description": "PoC for exploiting CVE-2006-4470 : Joomla! before 1.0.11 omits some checks for whether _VALID_MOS is defined, which allows attackers to have an unknown impact, possibly resulting in PHP remote file inclusion.", - "fork": false, - "created_at": "2021-10-01T21:25:30Z", - "updated_at": "2021-10-05T10:45:26Z", - "pushed_at": "2021-10-05T10:45:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2006/CVE-2006-4471.json b/2006/CVE-2006-4471.json deleted file mode 100644 index e4a38b355a..0000000000 --- a/2006/CVE-2006-4471.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413772943, - "name": "CVE-2006-4471", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2006-4471", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2006-4471", - "description": "PoC for exploiting CVE-2006-4471 : The Admin Upload Image functionality in Joomla! before 1.0.11 allows remote authenticated users to upload files outside of the \/images\/stories\/ directory via unspecified vectors.", - "fork": false, - "created_at": "2021-10-05T10:36:17Z", - "updated_at": "2021-10-05T10:36:22Z", - "pushed_at": "2021-10-05T10:36:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2006/CVE-2006-4472.json b/2006/CVE-2006-4472.json deleted file mode 100644 index 97a6e71e9f..0000000000 --- a/2006/CVE-2006-4472.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412620946, - "name": "CVE-2006-4472", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2006-4472", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2006-4472", - "description": "PoC for exploiting CVE-2006-4472 : Multiple unspecified vulnerabilities in Joomla! before 1.0.11 allow attackers to bypass user authentication via unknown vectors involving the (1) do_pdf command and the (2) emailform com_content task.", - "fork": false, - "created_at": "2021-10-01T21:25:22Z", - "updated_at": "2021-10-05T10:45:20Z", - "pushed_at": "2021-10-05T10:45:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2007/CVE-2007-4188.json b/2007/CVE-2007-4188.json deleted file mode 100644 index 7642ef7639..0000000000 --- a/2007/CVE-2007-4188.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412620989, - "name": "CVE-2007-4188", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2007-4188", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2007-4188", - "description": "PoC for exploiting CVE-2007-4188 : Session fixation vulnerability in Joomla! before 1.0.13 (aka Sunglow) allows remote attackers to hijack administrative web sessions via unspecified vectors.", - "fork": false, - "created_at": "2021-10-01T21:25:37Z", - "updated_at": "2021-10-05T10:45:29Z", - "pushed_at": "2021-10-05T10:45:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2007/CVE-2007-4189.json b/2007/CVE-2007-4189.json deleted file mode 100644 index 3ce9dffefc..0000000000 --- a/2007/CVE-2007-4189.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412621036, - "name": "CVE-2007-4189", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2007-4189", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2007-4189", - "description": "PoC for exploiting CVE-2007-4189 : Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.0.13 (aka Sunglow) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors in the (1) com_search, (2) com_content, and (3) mod_login components. NOTE: some of these details are obtained from third party information.", - "fork": false, - "created_at": "2021-10-01T21:25:52Z", - "updated_at": "2021-10-05T10:45:42Z", - "pushed_at": "2021-10-05T10:45:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2007/CVE-2007-4190.json b/2007/CVE-2007-4190.json deleted file mode 100644 index ff98ec36c5..0000000000 --- a/2007/CVE-2007-4190.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412621051, - "name": "CVE-2007-4190", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2007-4190", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2007-4190", - "description": "PoC for exploiting CVE-2007-4190 : CRLF injection vulnerability in Joomla! before 1.0.13 (aka Sunglow) allows remote attackers to inject arbitrary HTTP headers and probably conduct HTTP response splitting attacks via CRLF sequences in the url parameter. NOTE: this can be leveraged for cross-site scripting (XSS) attacks. NOTE: some of these details are obtained from third party information.", - "fork": false, - "created_at": "2021-10-01T21:25:56Z", - "updated_at": "2021-10-05T10:45:46Z", - "pushed_at": "2021-10-05T10:45:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2007/CVE-2007-5577.json b/2007/CVE-2007-5577.json deleted file mode 100644 index cce62fd92b..0000000000 --- a/2007/CVE-2007-5577.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412621024, - "name": "CVE-2007-5577", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2007-5577", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2007-5577", - "description": "PoC for exploiting CVE-2007-5577 : Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.0.13 (aka Sunglow) allow remote attackers to inject arbitrary web script or HTML via the (1) Title or (2) Section Name form fields in the Section Manager component, or (3) multiple unspecified fields in New Menu Item.", - "fork": false, - "created_at": "2021-10-01T21:25:49Z", - "updated_at": "2021-10-05T10:45:38Z", - "pushed_at": "2021-10-05T10:45:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2008/CVE-2008-4796.json b/2008/CVE-2008-4796.json deleted file mode 100644 index 4eb1953713..0000000000 --- a/2008/CVE-2008-4796.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413778059, - "name": "CVE-2008-4796", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2008-4796", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2008-4796", - "description": "PoC for exploiting CVE-2008-4796 : The _httpsrequest function (Snoopy\/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.", - "fork": false, - "created_at": "2021-10-05T10:53:26Z", - "updated_at": "2021-10-05T10:53:32Z", - "pushed_at": "2021-10-05T10:53:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2010/CVE-2010-4756.json b/2010/CVE-2010-4756.json deleted file mode 100644 index 77124fa967..0000000000 --- a/2010/CVE-2010-4756.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 402134582, - "name": "CVE-2010-4756", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2010-4756", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2010-4756", - "description": "PoC for exploiting CVE-2010-4756 : The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.", - "fork": false, - "created_at": "2021-09-01T16:45:48Z", - "updated_at": "2021-09-01T16:45:53Z", - "pushed_at": "2021-09-01T16:45:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2012/CVE-2012-0881.json b/2012/CVE-2012-0881.json deleted file mode 100644 index 1bf1b1e6ec..0000000000 --- a/2012/CVE-2012-0881.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413781951, - "name": "CVE-2012-0881", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2012-0881", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2012-0881", - "description": "PoC for exploiting CVE-2012-0881 : Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.", - "fork": false, - "created_at": "2021-10-05T11:05:16Z", - "updated_at": "2021-10-05T11:05:21Z", - "pushed_at": "2021-10-05T11:05:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2013/CVE-2013-0340.json b/2013/CVE-2013-0340.json deleted file mode 100644 index 81ec01deab..0000000000 --- a/2013/CVE-2013-0340.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 408768920, - "name": "CVE-2013-0340", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2013-0340", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2013-0340", - "description": "PoC for exploiting CVE-2013-0340 : expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.", - "fork": false, - "created_at": "2021-09-21T10:00:32Z", - "updated_at": "2021-09-21T10:00:32Z", - "pushed_at": "2021-09-21T10:00:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2013/CVE-2013-1914.json b/2013/CVE-2013-1914.json deleted file mode 100644 index 250f1c49e8..0000000000 --- a/2013/CVE-2013-1914.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 402134453, - "name": "CVE-2013-1914", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2013-1914", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2013-1914", - "description": "PoC for exploiting CVE-2013-1914 : Stack-based buffer overflow in the getaddrinfo function in sysdeps\/posix\/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.", - "fork": false, - "created_at": "2021-09-01T16:45:26Z", - "updated_at": "2021-09-01T16:45:31Z", - "pushed_at": "2021-09-01T16:45:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2013/CVE-2013-2763.json b/2013/CVE-2013-2763.json deleted file mode 100644 index 8e33befd3b..0000000000 --- a/2013/CVE-2013-2763.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132839, - "name": "CVE-2013-2763", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2013-2763", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2013-2763", - "description": "PoC for exploiting CVE-2013-2763 : ** DISPUTED ** The Schneider Electric M340 PLC modules allow remote attackers to cause a denial of service (resource consumption) via unspecified vectors. NOTE: the vendor reportedly disputes this issue because it \"could not be duplicated\" and \"an attacker could not remotely exploit this observed behavior to deny PLC control functions.\"", - "fork": false, - "created_at": "2021-08-20T02:32:25Z", - "updated_at": "2021-08-20T02:37:21Z", - "pushed_at": "2021-08-20T02:37:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2013/CVE-2013-6276.json b/2013/CVE-2013-6276.json deleted file mode 100644 index d492e58744..0000000000 --- a/2013/CVE-2013-6276.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132271, - "name": "CVE-2013-6276", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2013-6276", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2013-6276", - "description": "PoC for exploiting CVE-2013-6276 : ** UNSUPPORTED WHEN ASSIGNED ** QNAP F_VioCard 2312 and F_VioGate 2308 have hardcoded entries in authorized_keys files. NOTE: 1. All active models are not affected. The last affected model was EOL since 2010. 2. The legacy authorization mechanism is no longer adopted in all active models.", - "fork": false, - "created_at": "2021-08-20T02:29:44Z", - "updated_at": "2021-08-20T02:35:27Z", - "pushed_at": "2021-08-20T02:35:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2013/CVE-2013-7423.json b/2013/CVE-2013-7423.json deleted file mode 100644 index 92f85e28dd..0000000000 --- a/2013/CVE-2013-7423.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 402134383, - "name": "CVE-2013-7423", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2013-7423", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2013-7423", - "description": "PoC for exploiting CVE-2013-7423 : The send_dg function in resolv\/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.", - "fork": false, - "created_at": "2021-09-01T16:45:14Z", - "updated_at": "2021-09-01T16:45:19Z", - "pushed_at": "2021-09-01T16:45:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index d43c8fcb44..5f0b816504 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -13,15 +13,15 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2021-09-23T12:27:47Z", + "updated_at": "2021-10-06T09:10:34Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2255, - "watchers_count": 2255, + "stargazers_count": 2256, + "watchers_count": 2256, "forks_count": 480, "allow_forking": true, "visibility": "public", "forks": 480, - "watchers": 2255, + "watchers": 2256, "score": 0 }, { diff --git a/2014/CVE-2014-3704.json b/2014/CVE-2014-3704.json index b8450e7eb1..b88d8dc74f 100644 --- a/2014/CVE-2014-3704.json +++ b/2014/CVE-2014-3704.json @@ -23,30 +23,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 413781076, - "name": "CVE-2014-3704", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2014-3704", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2014-3704", - "description": "PoC for exploiting CVE-2014-3704 : The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing crafted keys.", - "fork": false, - "created_at": "2021-10-05T11:02:27Z", - "updated_at": "2021-10-05T11:02:32Z", - "pushed_at": "2021-10-05T11:02:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4611.json b/2014/CVE-2014-4611.json deleted file mode 100644 index 87a67f1d06..0000000000 --- a/2014/CVE-2014-4611.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413784251, - "name": "CVE-2014-4611", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2014-4611", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2014-4611", - "description": "PoC for exploiting CVE-2014-4611 : Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib\/lz4\/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation, a different vulnerability than CVE-2014-4715.", - "fork": false, - "created_at": "2021-10-05T11:12:15Z", - "updated_at": "2021-10-05T11:12:20Z", - "pushed_at": "2021-10-05T11:12:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2015/CVE-2015-0235.json b/2015/CVE-2015-0235.json index ba0b064e6a..54cdeea267 100644 --- a/2015/CVE-2015-0235.json +++ b/2015/CVE-2015-0235.json @@ -448,30 +448,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 402134472, - "name": "CVE-2015-0235", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2015-0235", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2015-0235", - "description": "PoC for exploiting CVE-2015-0235 : Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"", - "fork": false, - "created_at": "2021-09-01T16:45:30Z", - "updated_at": "2021-09-01T16:45:35Z", - "pushed_at": "2021-09-01T16:45:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2015/CVE-2015-7547.json b/2015/CVE-2015-7547.json index 00fbc9ec26..a5e232aca3 100644 --- a/2015/CVE-2015-7547.json +++ b/2015/CVE-2015-7547.json @@ -298,30 +298,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 402134408, - "name": "CVE-2015-7547", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2015-7547", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2015-7547", - "description": "PoC for exploiting CVE-2015-7547 : Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing \"dual A\/AAAA DNS queries\" and the libnss_dns.so.2 NSS module.", - "fork": false, - "created_at": "2021-09-01T16:45:18Z", - "updated_at": "2021-09-01T16:45:23Z", - "pushed_at": "2021-09-01T16:45:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-10033.json b/2016/CVE-2016-10033.json index 6381f10c3c..0972554ff5 100644 --- a/2016/CVE-2016-10033.json +++ b/2016/CVE-2016-10033.json @@ -298,30 +298,5 @@ "forks": 0, "watchers": 1, "score": 0 - }, - { - "id": 413777891, - "name": "CVE-2016-10033", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-10033", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-10033", - "description": "PoC for exploiting CVE-2016-10033 : The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \\\" (backslash double quote) in a crafted Sender property.", - "fork": false, - "created_at": "2021-10-05T10:52:57Z", - "updated_at": "2021-10-05T10:53:02Z", - "pushed_at": "2021-10-05T10:53:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-10045.json b/2016/CVE-2016-10045.json deleted file mode 100644 index ea477658ef..0000000000 --- a/2016/CVE-2016-10045.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413777911, - "name": "CVE-2016-10045", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-10045", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-10045", - "description": "PoC for exploiting CVE-2016-10045 : The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.", - "fork": false, - "created_at": "2021-10-05T10:53:01Z", - "updated_at": "2021-10-05T10:53:07Z", - "pushed_at": "2021-10-05T10:53:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-1234.json b/2016/CVE-2016-1234.json deleted file mode 100644 index f85732534f..0000000000 --- a/2016/CVE-2016-1234.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 402134429, - "name": "CVE-2016-1234", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-1234", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-1234", - "description": "PoC for exploiting CVE-2016-1234 : Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", - "fork": false, - "created_at": "2021-09-01T16:45:22Z", - "updated_at": "2021-09-01T16:45:27Z", - "pushed_at": "2021-09-01T16:45:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-20012.json b/2016/CVE-2016-20012.json deleted file mode 100644 index a8f7545bf6..0000000000 --- a/2016/CVE-2016-20012.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413777434, - "name": "CVE-2016-20012", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-20012", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-20012", - "description": "PoC for exploiting CVE-2016-20012 : OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session.", - "fork": false, - "created_at": "2021-10-05T10:51:32Z", - "updated_at": "2021-10-05T10:51:37Z", - "pushed_at": "2021-10-05T10:51:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-2568.json b/2016/CVE-2016-2568.json deleted file mode 100644 index 42370ced46..0000000000 --- a/2016/CVE-2016-2568.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413781433, - "name": "CVE-2016-2568", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-2568", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-2568", - "description": "PoC for exploiting CVE-2016-2568 : pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.", - "fork": false, - "created_at": "2021-10-05T11:03:34Z", - "updated_at": "2021-10-05T11:03:40Z", - "pushed_at": "2021-10-05T11:03:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-3720.json b/2016/CVE-2016-3720.json deleted file mode 100644 index 5a07113561..0000000000 --- a/2016/CVE-2016-3720.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 404132322, - "name": "CVE-2019-10172", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10172", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10172", - "description": "PoC for exploiting CVE-2019-10172 : A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.", - "fork": false, - "created_at": "2021-09-07T21:51:57Z", - "updated_at": "2021-09-09T02:36:07Z", - "pushed_at": "2021-09-09T02:36:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-4529.json b/2016/CVE-2016-4529.json deleted file mode 100644 index 8966ae2669..0000000000 --- a/2016/CVE-2016-4529.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132822, - "name": "CVE-2016-4529", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-4529", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-4529", - "description": "PoC for exploiting CVE-2016-4529 : An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171\/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.", - "fork": false, - "created_at": "2021-08-20T02:32:21Z", - "updated_at": "2021-08-20T02:37:18Z", - "pushed_at": "2021-08-20T02:37:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 57e2c4ef05..f8dfa6d05c 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -192,10 +192,10 @@ "pushed_at": "2017-02-27T18:56:12Z", "stargazers_count": 384, "watchers_count": 384, - "forks_count": 136, + "forks_count": 135, "allow_forking": true, "visibility": "public", - "forks": 136, + "forks": 135, "watchers": 384, "score": 0 }, diff --git a/2016/CVE-2016-5385.json b/2016/CVE-2016-5385.json deleted file mode 100644 index 9e3f728174..0000000000 --- a/2016/CVE-2016-5385.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413780314, - "name": "CVE-2016-5385", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-5385", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-5385", - "description": "PoC for exploiting CVE-2016-5385 : PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an \"httpoxy\" issue.", - "fork": false, - "created_at": "2021-10-05T11:00:29Z", - "updated_at": "2021-10-05T11:00:34Z", - "pushed_at": "2021-10-05T11:00:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-6555.json b/2016/CVE-2016-6555.json deleted file mode 100644 index 8894e23b99..0000000000 --- a/2016/CVE-2016-6555.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412620685, - "name": "CVE-2016-6555", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-6555", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-6555", - "description": "PoC for exploiting CVE-2016-6555 : OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in version 18.0.2, released on September 20, 2016.", - "fork": false, - "created_at": "2021-10-01T21:24:13Z", - "updated_at": "2021-10-05T10:44:23Z", - "pushed_at": "2021-10-05T10:44:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-6556.json b/2016/CVE-2016-6556.json deleted file mode 100644 index fb7f2ff908..0000000000 --- a/2016/CVE-2016-6556.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412620703, - "name": "CVE-2016-6556", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2016-6556", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2016-6556", - "description": "PoC for exploiting CVE-2016-6556 : OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This issue was fixed in version 18.0.2, released on September 20, 2016.", - "fork": false, - "created_at": "2021-10-01T21:24:18Z", - "updated_at": "2021-10-05T10:44:26Z", - "pushed_at": "2021-10-05T10:44:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2016/CVE-2016-7190.json b/2016/CVE-2016-7190.json index 06a8836ddd..c922c4d65a 100644 --- a/2016/CVE-2016-7190.json +++ b/2016/CVE-2016-7190.json @@ -13,15 +13,15 @@ "description": "ChakraCore exploitation techniques", "fork": false, "created_at": "2018-02-13T20:35:04Z", - "updated_at": "2019-09-12T20:50:20Z", + "updated_at": "2021-10-06T10:28:33Z", "pushed_at": "2018-02-14T09:55:35Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 0, "allow_forking": true, "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-11189.json b/2017/CVE-2017-11189.json deleted file mode 100644 index affd5fb6f2..0000000000 --- a/2017/CVE-2017-11189.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413778907, - "name": "CVE-2017-11189", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2017-11189", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2017-11189", - "description": "PoC for exploiting CVE-2017-11189 : unrarlib.c in unrar-free 0.0.1 might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash), which could be relevant if unrarlib is used as library code for a long-running application. NOTE: one of the several test cases in the references may be the same as what was separately reported as CVE-2017-14121.", - "fork": false, - "created_at": "2021-10-05T10:55:53Z", - "updated_at": "2021-10-05T10:55:58Z", - "pushed_at": "2021-10-05T10:55:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-12613.json b/2017/CVE-2017-12613.json deleted file mode 100644 index 3629dba2bb..0000000000 --- a/2017/CVE-2017-12613.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 402244198, - "name": "CVE-2021-35940", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2021-35940", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2021-35940", - "description": "PoC for exploiting CVE-2021-35940 : An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue.", - "fork": false, - "created_at": "2021-09-02T00:47:46Z", - "updated_at": "2021-09-02T09:50:32Z", - "pushed_at": "2021-09-02T09:50:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index e465710434..cdfea9f114 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -17,10 +17,10 @@ "pushed_at": "2017-10-11T07:43:50Z", "stargazers_count": 362, "watchers_count": 362, - "forks_count": 135, + "forks_count": 136, "allow_forking": true, "visibility": "public", - "forks": 135, + "forks": 136, "watchers": 362, "score": 0 }, diff --git a/2017/CVE-2017-12678.json b/2017/CVE-2017-12678.json deleted file mode 100644 index c92ea665fc..0000000000 --- a/2017/CVE-2017-12678.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413777197, - "name": "CVE-2017-12678", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2017-12678", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2017-12678", - "description": "PoC for exploiting CVE-2017-12678 : In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file.", - "fork": false, - "created_at": "2021-10-05T10:50:46Z", - "updated_at": "2021-10-05T10:50:51Z", - "pushed_at": "2021-10-05T10:50:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-14121.json b/2017/CVE-2017-14121.json deleted file mode 100644 index 9d85644abe..0000000000 --- a/2017/CVE-2017-14121.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413778887, - "name": "CVE-2017-14121", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2017-14121", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2017-14121", - "description": "PoC for exploiting CVE-2017-14121 : The DecodeNumber function in unrarlib.c in unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a NULL pointer dereference flaw triggered by a crafted RAR archive. NOTE: this may be the same as one of the several test cases in the CVE-2017-11189 references.", - "fork": false, - "created_at": "2021-10-05T10:55:49Z", - "updated_at": "2021-10-05T10:55:54Z", - "pushed_at": "2021-10-05T10:55:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index facf5cb5fa..f594ccf10c 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -1017,10 +1017,10 @@ "pushed_at": "2017-09-28T21:10:29Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 3, + "forks_count": 2, "allow_forking": true, "visibility": "public", - "forks": 3, + "forks": 2, "watchers": 0, "score": 0 }, diff --git a/2017/CVE-2017-6026.json b/2017/CVE-2017-6026.json deleted file mode 100644 index c10bfd01b0..0000000000 --- a/2017/CVE-2017-6026.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132815, - "name": "CVE-2017-6026", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2017-6026", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2017-6026", - "description": "PoC for exploiting CVE-2017-6026 : A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The session numbers generated by the web application are lacking randomization and are shared between several users. This may allow a current session to be compromised.", - "fork": false, - "created_at": "2021-08-20T02:32:17Z", - "updated_at": "2021-08-20T02:37:15Z", - "pushed_at": "2021-08-20T02:37:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-6028.json b/2017/CVE-2017-6028.json deleted file mode 100644 index cece7e5bab..0000000000 --- a/2017/CVE-2017-6028.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132735, - "name": "CVE-2017-6028", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2017-6028", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2017-6028", - "description": "PoC for exploiting CVE-2017-6028 : An Insufficiently Protected Credentials issue was discovered in Schneider Electric Modicon PLCs Modicon M241, all firmware versions, and Modicon M251, all firmware versions. Log-in credentials are sent over the network with Base64 encoding leaving them susceptible to sniffing. Sniffed credentials could then be used to log into the web application.", - "fork": false, - "created_at": "2021-08-20T02:31:57Z", - "updated_at": "2021-08-20T02:37:01Z", - "pushed_at": "2021-08-20T02:36:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2017/CVE-2017-6030.json b/2017/CVE-2017-6030.json deleted file mode 100644 index 228d94c01a..0000000000 --- a/2017/CVE-2017-6030.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132803, - "name": "CVE-2017-6030", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2017-6030", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2017-6030", - "description": "PoC for exploiting CVE-2017-6030 : A Predictable Value Range from Previous Values issue was discovered in Schneider Electric Modicon PLCs Modicon M221, firmware versions prior to Version 1.5.0.0, Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The affected products generate insufficiently random TCP initial sequence numbers that may allow an attacker to predict the numbers from previous values. This may allow an attacker to spoof or disrupt TCP connections.", - "fork": false, - "created_at": "2021-08-20T02:32:13Z", - "updated_at": "2021-08-20T02:37:12Z", - "pushed_at": "2021-08-20T02:37:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-10023.json b/2018/CVE-2018-10023.json deleted file mode 100644 index a306cd2412..0000000000 --- a/2018/CVE-2018-10023.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412620933, - "name": "CVE-2018-10023", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-10023", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-10023", - "description": "PoC for exploiting CVE-2018-10023 : Catfish CMS V4.7.21 allows XSS via the pinglun parameter to cat\/index\/index\/pinglun (aka an authenticated comment).", - "fork": false, - "created_at": "2021-10-01T21:25:18Z", - "updated_at": "2021-10-05T10:45:17Z", - "pushed_at": "2021-10-05T10:45:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-11439.json b/2018/CVE-2018-11439.json deleted file mode 100644 index 3be691f390..0000000000 --- a/2018/CVE-2018-11439.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413777174, - "name": "CVE-2018-11439", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-11439", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-11439", - "description": "PoC for exploiting CVE-2018-11439 : The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.", - "fork": false, - "created_at": "2021-10-05T10:50:42Z", - "updated_at": "2021-10-05T10:50:47Z", - "pushed_at": "2021-10-05T10:50:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-14773.json b/2018/CVE-2018-14773.json deleted file mode 100644 index b6b23fba29..0000000000 --- a/2018/CVE-2018-14773.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413780299, - "name": "CVE-2018-14773", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-14773", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-14773", - "description": "PoC for exploiting CVE-2018-14773 : An issue was discovered in Http Foundation in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. It arises from support for a (legacy) IIS header that lets users override the path in the request URL via the X-Original-URL or X-Rewrite-URL HTTP request header. These headers are designed for IIS support, but it's not verified that the server is in fact running IIS, which means anybody who can send these requests to an application can trigger this. This affects \\Symfony\\Component\\HttpFoundation\\Request::prepareRequestUri() where X-Original-URL and X_REWRITE_URL are both used. The fix drops support for these methods so that they cannot be used as attack vectors such as web cache poisoning.", - "fork": false, - "created_at": "2021-10-05T11:00:25Z", - "updated_at": "2021-10-05T11:00:30Z", - "pushed_at": "2021-10-05T11:00:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16177.json b/2018/CVE-2018-16177.json deleted file mode 100644 index 75e81d3bcd..0000000000 --- a/2018/CVE-2018-16177.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413781414, - "name": "CVE-2018-16177", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-16177", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-16177", - "description": "PoC for exploiting CVE-2018-16177 : Untrusted search path vulnerability in The installer of Windows 10 Fall Creators Update Modify module for Security Measures tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.", - "fork": false, - "created_at": "2021-10-05T11:03:31Z", - "updated_at": "2021-10-05T11:03:36Z", - "pushed_at": "2021-10-05T11:03:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-16871.json b/2018/CVE-2018-16871.json deleted file mode 100644 index c85d9ce18d..0000000000 --- a/2018/CVE-2018-16871.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413768379, - "name": "CVE-2018-16871", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-16871", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-16871", - "description": "PoC for exploiting CVE-2018-16871 : A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", - "fork": false, - "created_at": "2021-10-05T10:20:48Z", - "updated_at": "2021-10-05T10:31:14Z", - "pushed_at": "2021-10-05T10:31:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-20217.json b/2018/CVE-2018-20217.json deleted file mode 100644 index 84cd189d0d..0000000000 --- a/2018/CVE-2018-20217.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413777236, - "name": "CVE-2018-20217", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-20217", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-20217", - "description": "PoC for exploiting CVE-2018-20217 : A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.", - "fork": false, - "created_at": "2021-10-05T10:50:55Z", - "updated_at": "2021-10-05T10:51:00Z", - "pushed_at": "2021-10-05T10:50:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-5729.json b/2018/CVE-2018-5729.json deleted file mode 100644 index b40563da76..0000000000 --- a/2018/CVE-2018-5729.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413777270, - "name": "CVE-2018-5729", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-5729", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-5729", - "description": "PoC for exploiting CVE-2018-5729 : MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.", - "fork": false, - "created_at": "2021-10-05T10:51:03Z", - "updated_at": "2021-10-05T10:51:08Z", - "pushed_at": "2021-10-05T10:51:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-5730.json b/2018/CVE-2018-5730.json deleted file mode 100644 index 331e5d9df8..0000000000 --- a/2018/CVE-2018-5730.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413777254, - "name": "CVE-2018-5730", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-5730", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-5730", - "description": "PoC for exploiting CVE-2018-5730 : MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a \"linkdn\" and \"containerdn\" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.", - "fork": false, - "created_at": "2021-10-05T10:50:59Z", - "updated_at": "2021-10-05T10:51:04Z", - "pushed_at": "2021-10-05T10:51:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json index 81463721cf..eafc012199 100644 --- a/2018/CVE-2018-6242.json +++ b/2018/CVE-2018-6242.json @@ -13,15 +13,15 @@ "description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)", "fork": false, "created_at": "2018-04-28T11:50:00Z", - "updated_at": "2021-09-29T03:04:51Z", + "updated_at": "2021-10-06T12:12:38Z", "pushed_at": "2018-08-30T05:37:03Z", - "stargazers_count": 428, - "watchers_count": 428, + "stargazers_count": 429, + "watchers_count": 429, "forks_count": 53, "allow_forking": true, "visibility": "public", "forks": 53, - "watchers": 428, + "watchers": 429, "score": 0 }, { diff --git a/2018/CVE-2018-7789.json b/2018/CVE-2018-7789.json deleted file mode 100644 index befda50864..0000000000 --- a/2018/CVE-2018-7789.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132773, - "name": "CVE-2018-7789", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-7789", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-7789", - "description": "PoC for exploiting CVE-2018-7789 : An Improper Check for Unusual or Exceptional Conditions vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to remotely reboot Modicon M221 using crafted programing protocol frames.", - "fork": false, - "created_at": "2021-08-20T02:32:05Z", - "updated_at": "2021-08-20T02:37:07Z", - "pushed_at": "2021-08-20T02:37:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-7790.json b/2018/CVE-2018-7790.json deleted file mode 100644 index 0c6f83118b..0000000000 --- a/2018/CVE-2018-7790.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132787, - "name": "CVE-2018-7790", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-7790", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-7790", - "description": "PoC for exploiting CVE-2018-7790 : An Information Management Error vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to replay authentication sequences. If an attacker exploits this vulnerability and connects to a Modicon M221, the attacker can upload the original program from the PLC.", - "fork": false, - "created_at": "2021-08-20T02:32:09Z", - "updated_at": "2021-08-20T02:37:10Z", - "pushed_at": "2021-08-20T02:37:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-7821.json b/2018/CVE-2018-7821.json deleted file mode 100644 index 8de866e0f0..0000000000 --- a/2018/CVE-2018-7821.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132692, - "name": "CVE-2018-7821", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-7821", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-7821", - "description": "PoC for exploiting CVE-2018-7821 : An Environment (CWE-2) vulnerability exists in SoMachine Basic, all versions, and Modicon M221(all references, all versions prior to firmware V1.10.0.0) which could cause cycle time impact when flooding the M221 ethernet interface while the Ethernet\/IP adapter is activated.", - "fork": false, - "created_at": "2021-08-20T02:31:46Z", - "updated_at": "2021-08-20T02:36:53Z", - "pushed_at": "2021-08-20T02:36:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-7842.json b/2018/CVE-2018-7842.json deleted file mode 100644 index dfab188fd6..0000000000 --- a/2018/CVE-2018-7842.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132751, - "name": "CVE-2018-7842", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-7842", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-7842", - "description": "PoC for exploiting CVE-2018-7842 : A CWE-290: Authentication Bypass by Spoofing vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause an elevation of privilege by conducting a brute force attack on Modbus parameters sent to the controller.", - "fork": false, - "created_at": "2021-08-20T02:32:01Z", - "updated_at": "2021-08-20T02:37:04Z", - "pushed_at": "2021-08-20T02:37:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2018/CVE-2018-8256.json b/2018/CVE-2018-8256.json deleted file mode 100644 index 1c1bab31b3..0000000000 --- a/2018/CVE-2018-8256.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413777938, - "name": "CVE-2018-8256", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2018-8256", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2018-8256", - "description": "PoC for exploiting CVE-2018-8256 : A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka \"Microsoft PowerShell Remote Code Execution Vulnerability.\" This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2, Windows Server 2019, Windows 7, Windows Server 2012 R2, PowerShell Core 6.1, Windows 10 Servers, Windows 10, Windows 8.1.", - "fork": false, - "created_at": "2021-10-05T10:53:06Z", - "updated_at": "2021-10-05T10:53:11Z", - "pushed_at": "2021-10-05T10:53:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-0205.json b/2019/CVE-2019-0205.json deleted file mode 100644 index cc74868288..0000000000 --- a/2019/CVE-2019-0205.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413768005, - "name": "CVE-2019-0205", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-0205", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-0205", - "description": "PoC for exploiting CVE-2019-0205 : In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.", - "fork": false, - "created_at": "2021-10-05T10:19:24Z", - "updated_at": "2021-10-05T10:30:08Z", - "pushed_at": "2021-10-05T10:30:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-0227.json b/2019/CVE-2019-0227.json index 64b3f92814..0b56ef57f2 100644 --- a/2019/CVE-2019-0227.json +++ b/2019/CVE-2019-0227.json @@ -23,30 +23,5 @@ "forks": 3, "watchers": 1, "score": 0 - }, - { - "id": 413781478, - "name": "CVE-2019-0227", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-0227", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-0227", - "description": "PoC for exploiting CVE-2019-0227 : A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.", - "fork": false, - "created_at": "2021-10-05T11:03:43Z", - "updated_at": "2021-10-05T11:03:48Z", - "pushed_at": "2021-10-05T11:03:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-10095.json b/2019/CVE-2019-10095.json deleted file mode 100644 index faf87a875a..0000000000 --- a/2019/CVE-2019-10095.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413784142, - "name": "CVE-2019-10095", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10095", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10095", - "description": "PoC for exploiting CVE-2019-10095 : bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.", - "fork": false, - "created_at": "2021-10-05T11:11:55Z", - "updated_at": "2021-10-05T11:12:00Z", - "pushed_at": "2021-10-05T11:11:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10156.json b/2019/CVE-2019-10156.json deleted file mode 100644 index 6a9bad3668..0000000000 --- a/2019/CVE-2019-10156.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 393781839, - "name": "CVE-2019-10156", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10156", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10156", - "description": "PoC for exploiting CVE-2019-10156 : A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.", - "fork": false, - "created_at": "2021-08-07T20:07:06Z", - "updated_at": "2021-08-07T20:07:10Z", - "pushed_at": "2021-08-07T20:07:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10172.json b/2019/CVE-2019-10172.json index 973b8d8311..39bebd0935 100644 --- a/2019/CVE-2019-10172.json +++ b/2019/CVE-2019-10172.json @@ -23,30 +23,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 404132322, - "name": "CVE-2019-10172", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10172", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10172", - "description": "PoC for exploiting CVE-2019-10172 : A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.", - "fork": false, - "created_at": "2021-09-07T21:51:57Z", - "updated_at": "2021-09-09T02:36:07Z", - "pushed_at": "2021-09-09T02:36:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-10181.json b/2019/CVE-2019-10181.json deleted file mode 100644 index 8b07e8d181..0000000000 --- a/2019/CVE-2019-10181.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 389094980, - "name": "CVE-2019-10181", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10181", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10181", - "description": "PoC for exploiting CVE-2019-10181 : It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.", - "fork": false, - "created_at": "2021-07-24T12:33:56Z", - "updated_at": "2021-07-24T12:34:02Z", - "pushed_at": "2021-07-24T12:34:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10206.json b/2019/CVE-2019-10206.json deleted file mode 100644 index 211110d62e..0000000000 --- a/2019/CVE-2019-10206.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 393781825, - "name": "CVE-2019-10206", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10206", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10206", - "description": "PoC for exploiting CVE-2019-10206 : ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.", - "fork": false, - "created_at": "2021-08-07T20:07:01Z", - "updated_at": "2021-08-07T20:07:08Z", - "pushed_at": "2021-08-07T20:07:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10910.json b/2019/CVE-2019-10910.json deleted file mode 100644 index 0422090def..0000000000 --- a/2019/CVE-2019-10910.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413780270, - "name": "CVE-2019-10910", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10910", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10910", - "description": "PoC for exploiting CVE-2019-10910 : In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony\/dependency-injection.", - "fork": false, - "created_at": "2021-10-05T11:00:17Z", - "updated_at": "2021-10-05T11:00:22Z", - "pushed_at": "2021-10-05T11:00:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10911.json b/2019/CVE-2019-10911.json deleted file mode 100644 index c019bbf927..0000000000 --- a/2019/CVE-2019-10911.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413780247, - "name": "CVE-2019-10911", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10911", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10911", - "description": "PoC for exploiting CVE-2019-10911 : In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony\/security.", - "fork": false, - "created_at": "2021-10-05T11:00:13Z", - "updated_at": "2021-10-05T11:00:18Z", - "pushed_at": "2021-10-05T11:00:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-10953.json b/2019/CVE-2019-10953.json deleted file mode 100644 index f8551d7562..0000000000 --- a/2019/CVE-2019-10953.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 398132847, - "name": "CVE-2019-10953", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-10953", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-10953", - "description": "PoC for exploiting CVE-2019-10953 : ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets.", - "fork": false, - "created_at": "2021-08-20T02:32:29Z", - "updated_at": "2021-08-20T02:37:23Z", - "pushed_at": "2021-08-20T02:37:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json index e1a228ca77..402a17b637 100644 --- a/2019/CVE-2019-11358.json +++ b/2019/CVE-2019-11358.json @@ -98,30 +98,5 @@ "forks": 6, "watchers": 8, "score": 0 - }, - { - "id": 412620887, - "name": "CVE-2019-11358", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-11358", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-11358", - "description": "PoC for exploiting CVE-2019-11358 : jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.", - "fork": false, - "created_at": "2021-10-01T21:25:07Z", - "updated_at": "2021-10-05T10:45:07Z", - "pushed_at": "2021-10-05T10:45:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-11595.json b/2019/CVE-2019-11595.json deleted file mode 100644 index 64ef1449fb..0000000000 --- a/2019/CVE-2019-11595.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413785534, - "name": "CVE-2019-11595", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-11595", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-11595", - "description": "PoC for exploiting CVE-2019-11595 : In uBlock before 0.9.5.15, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect.", - "fork": false, - "created_at": "2021-10-05T11:16:23Z", - "updated_at": "2021-10-05T11:16:28Z", - "pushed_at": "2021-10-05T11:16:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11708.json b/2019/CVE-2019-11708.json index 5d6f1419c3..3d3b0fef54 100644 --- a/2019/CVE-2019-11708.json +++ b/2019/CVE-2019-11708.json @@ -13,15 +13,15 @@ "description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.", "fork": false, "created_at": "2019-09-29T07:08:52Z", - "updated_at": "2021-09-30T14:15:09Z", + "updated_at": "2021-10-06T12:11:03Z", "pushed_at": "2020-06-13T17:40:14Z", - "stargazers_count": 594, - "watchers_count": 594, + "stargazers_count": 595, + "watchers_count": 595, "forks_count": 83, "allow_forking": true, "visibility": "public", "forks": 83, - "watchers": 594, + "watchers": 595, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-11831.json b/2019/CVE-2019-11831.json deleted file mode 100644 index ab2aa4c3be..0000000000 --- a/2019/CVE-2019-11831.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 412620870, - "name": "CVE-2019-11831", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-11831", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-11831", - "description": "PoC for exploiting CVE-2019-11831 : The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:\/\/\/path\/bad.phar\/..\/good.phar URL.", - "fork": false, - "created_at": "2021-10-01T21:25:03Z", - "updated_at": "2021-10-05T10:45:03Z", - "pushed_at": "2021-10-05T10:45:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12823.json b/2019/CVE-2019-12823.json deleted file mode 100644 index 63a747e607..0000000000 --- a/2019/CVE-2019-12823.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 413781332, - "name": "CVE-2019-12823", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-12823", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-12823", - "description": "PoC for exploiting CVE-2019-12823 : Craft CMS before 3.1.31 does not properly filter XML feeds and thus allowing XSS.", - "fork": false, - "created_at": "2021-10-05T11:03:19Z", - "updated_at": "2021-10-05T11:03:24Z", - "pushed_at": "2021-10-05T11:03:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14846.json b/2019/CVE-2019-14846.json deleted file mode 100644 index 6a340350cd..0000000000 --- a/2019/CVE-2019-14846.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 393781627, - "name": "CVE-2019-14846", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-14846", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-14846", - "description": "PoC for exploiting CVE-2019-14846 : In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.", - "fork": false, - "created_at": "2021-08-07T20:06:10Z", - "updated_at": "2021-08-07T20:06:15Z", - "pushed_at": "2021-08-07T20:06:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14864.json b/2019/CVE-2019-14864.json deleted file mode 100644 index 45bd6d0074..0000000000 --- a/2019/CVE-2019-14864.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 393781712, - "name": "CVE-2019-14864", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-14864", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-14864", - "description": "PoC for exploiting CVE-2019-14864 : Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.", - "fork": false, - "created_at": "2021-08-07T20:06:33Z", - "updated_at": "2021-08-07T20:06:38Z", - "pushed_at": "2021-08-07T20:06:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14904.json b/2019/CVE-2019-14904.json deleted file mode 100644 index 4cc2bba513..0000000000 --- a/2019/CVE-2019-14904.json +++ /dev/null @@ -1,27 +0,0 @@ -[ - { - "id": 393781777, - "name": "CVE-2019-14904", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-14904", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-14904", - "description": "PoC for exploiting CVE-2019-14904 : A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.", - "fork": false, - "created_at": "2021-08-07T20:06:49Z", - "updated_at": "2021-08-07T20:06:54Z", - "pushed_at": "2021-08-07T20:06:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17495.json b/2019/CVE-2019-17495.json index 400f5c8eca..7ee9440ab5 100644 --- a/2019/CVE-2019-17495.json +++ b/2019/CVE-2019-17495.json @@ -23,30 +23,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 408768952, - "name": "CVE-2019-17495", - "full_name": "AKIA27TACKEDYE76PUGU\/CVE-2019-17495", - "owner": { - "login": "AKIA27TACKEDYE76PUGU", - "id": 86665563, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4", - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU" - }, - "html_url": "https:\/\/github.com\/AKIA27TACKEDYE76PUGU\/CVE-2019-17495", - "description": "PoC for exploiting CVE-2019-17495 : A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that