diff --git a/2010/CVE-2010-26084.json b/2010/CVE-2010-26084.json new file mode 100644 index 0000000000..fc035e7dd8 --- /dev/null +++ b/2010/CVE-2010-26084.json @@ -0,0 +1,25 @@ +[ + { + "id": 403962659, + "name": "cve-2021-26084-confluence", + "full_name": "GlennPegden2\/cve-2021-26084-confluence", + "owner": { + "login": "GlennPegden2", + "id": 34956796, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34956796?v=4", + "html_url": "https:\/\/github.com\/GlennPegden2" + }, + "html_url": "https:\/\/github.com\/GlennPegden2\/cve-2021-26084-confluence", + "description": "A quick and dirty PoC of cve-2010-26084 as none of the existing ones worked for me.", + "fork": false, + "created_at": "2021-09-07T12:04:09Z", + "updated_at": "2021-09-07T13:47:39Z", + "pushed_at": "2021-09-07T12:39:53Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 77ccb93df9..d628f2e914 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -1240,5 +1240,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 396322717, + "name": "bleeding-heart", + "full_name": "pierceoneill\/bleeding-heart", + "owner": { + "login": "pierceoneill", + "id": 37594104, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4", + "html_url": "https:\/\/github.com\/pierceoneill" + }, + "html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart", + "description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.", + "fork": false, + "created_at": "2021-08-15T11:05:23Z", + "updated_at": "2021-08-15T11:13:05Z", + "pushed_at": "2021-08-15T11:13:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-0792.json b/2016/CVE-2016-0792.json index cb34da4280..eaf884b37d 100644 --- a/2016/CVE-2016-0792.json +++ b/2016/CVE-2016-0792.json @@ -44,5 +44,28 @@ "forks": 12, "watchers": 8, "score": 0 + }, + { + "id": 403984253, + "name": "CVE-2016-0792", + "full_name": "Aviksaikat\/CVE-2016-0792", + "owner": { + "login": "Aviksaikat", + "id": 31238298, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4", + "html_url": "https:\/\/github.com\/Aviksaikat" + }, + "html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2016-0792", + "description": "Modified Verion of CVE-2016-0792", + "fork": false, + "created_at": "2021-09-07T13:14:16Z", + "updated_at": "2021-09-07T13:57:10Z", + "pushed_at": "2021-09-07T13:57:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-2098.json b/2016/CVE-2016-2098.json index 0a03a86deb..c64b5efc94 100644 --- a/2016/CVE-2016-2098.json +++ b/2016/CVE-2016-2098.json @@ -197,13 +197,13 @@ "description": "Remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data.", "fork": false, "created_at": "2021-08-31T15:25:41Z", - "updated_at": "2021-09-02T16:20:08Z", + "updated_at": "2021-09-07T13:17:25Z", "pushed_at": "2021-08-31T16:06:51Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-6366.json b/2016/CVE-2016-6366.json index b401dc5c8b..7c374e503a 100644 --- a/2016/CVE-2016-6366.json +++ b/2016/CVE-2016-6366.json @@ -13,13 +13,13 @@ "description": "Public repository for improvements to the EXTRABACON exploit", "fork": false, "created_at": "2016-09-20T23:19:02Z", - "updated_at": "2020-12-10T02:09:41Z", + "updated_at": "2021-09-07T10:07:47Z", "pushed_at": "2016-11-02T03:11:27Z", - "stargazers_count": 152, - "watchers_count": 152, + "stargazers_count": 151, + "watchers_count": 151, "forks_count": 78, "forks": 78, - "watchers": 152, + "watchers": 151, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index 2c38125ec2..2564dde61a 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -1213,8 +1213,8 @@ "pushed_at": "2021-04-29T19:36:35Z", "stargazers_count": 8, "watchers_count": 8, - "forks_count": 152, - "forks": 152, + "forks_count": 153, + "forks": 153, "watchers": 8, "score": 0 }, diff --git a/2019/CVE-2019-16097.json b/2019/CVE-2019-16097.json index ba18707320..2d8eb6a810 100644 --- a/2019/CVE-2019-16097.json +++ b/2019/CVE-2019-16097.json @@ -17,8 +17,8 @@ "pushed_at": "2019-09-19T15:27:48Z", "stargazers_count": 20, "watchers_count": 20, - "forks_count": 10, - "forks": 10, + "forks_count": 9, + "forks": 9, "watchers": 20, "score": 0 }, diff --git a/2019/CVE-2019-5420.json b/2019/CVE-2019-5420.json index 0710ffcb9c..914cebf64c 100644 --- a/2019/CVE-2019-5420.json +++ b/2019/CVE-2019-5420.json @@ -128,13 +128,13 @@ "description": "A vulnerability can allow an attacker to guess the automatically generated development mode secret token.", "fork": false, "created_at": "2021-09-06T12:28:05Z", - "updated_at": "2021-09-06T12:29:02Z", - "pushed_at": "2021-09-06T12:28:59Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2021-09-07T13:11:05Z", + "pushed_at": "2021-09-07T13:11:02Z", + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-6447.json b/2019/CVE-2019-6447.json index e58fba1eb3..8d1addc509 100644 --- a/2019/CVE-2019-6447.json +++ b/2019/CVE-2019-6447.json @@ -13,13 +13,13 @@ "description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447", "fork": false, "created_at": "2019-01-09T22:30:42Z", - "updated_at": "2021-09-02T11:28:46Z", + "updated_at": "2021-09-07T10:07:05Z", "pushed_at": "2021-09-01T08:56:40Z", - "stargazers_count": 634, - "watchers_count": 634, + "stargazers_count": 633, + "watchers_count": 633, "forks_count": 136, "forks": 136, - "watchers": 634, + "watchers": 633, "score": 0 }, { diff --git a/2019/CVE-2019-8561.json b/2019/CVE-2019-8561.json index b3206181ab..9f8072d874 100644 --- a/2019/CVE-2019-8561.json +++ b/2019/CVE-2019-8561.json @@ -13,13 +13,13 @@ "description": "Proof of concept exploit for CVE-2019-8561 discovered by @jbradley89 ", "fork": false, "created_at": "2019-06-07T23:48:55Z", - "updated_at": "2021-04-30T18:31:54Z", + "updated_at": "2021-09-07T11:54:33Z", "pushed_at": "2021-04-30T13:45:50Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 74b29c13b2..da442c42c6 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-09-06T07:35:42Z", + "updated_at": "2021-09-07T13:31:34Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 844, - "watchers_count": 844, + "stargazers_count": 845, + "watchers_count": 845, "forks_count": 268, "forks": 268, - "watchers": 844, + "watchers": 845, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17518.json b/2020/CVE-2020-17518.json index 5833c76427..b227ce24b9 100644 --- a/2020/CVE-2020-17518.json +++ b/2020/CVE-2020-17518.json @@ -17,8 +17,8 @@ "pushed_at": "2021-01-06T13:41:04Z", "stargazers_count": 8, "watchers_count": 8, - "forks_count": 6, - "forks": 6, + "forks_count": 5, + "forks": 5, "watchers": 8, "score": 0 }, diff --git a/2020/CVE-2020-17523.json b/2020/CVE-2020-17523.json index 6448958207..c8a5ecb025 100644 --- a/2020/CVE-2020-17523.json +++ b/2020/CVE-2020-17523.json @@ -17,8 +17,8 @@ "pushed_at": "2021-02-07T09:42:36Z", "stargazers_count": 76, "watchers_count": 76, - "forks_count": 10, - "forks": 10, + "forks_count": 11, + "forks": 11, "watchers": 76, "score": 0 } diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 13884007f2..2d3f71334a 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -619,5 +619,28 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 396080591, + "name": "ghostcat", + "full_name": "jptr218\/ghostcat", + "owner": { + "login": "jptr218", + "id": 84092766, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4", + "html_url": "https:\/\/github.com\/jptr218" + }, + "html_url": "https:\/\/github.com\/jptr218\/ghostcat", + "description": "An implementation of CVE-2020-1938", + "fork": false, + "created_at": "2021-08-14T17:32:51Z", + "updated_at": "2021-08-14T18:21:04Z", + "pushed_at": "2021-08-14T18:21:02Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-24186.json b/2020/CVE-2020-24186.json index c0957e3ecd..1d1125ff9d 100644 --- a/2020/CVE-2020-24186.json +++ b/2020/CVE-2020-24186.json @@ -13,13 +13,13 @@ "description": "wpDiscuz 7.0.4 Remote Code Execution", "fork": false, "created_at": "2021-06-13T23:10:19Z", - "updated_at": "2021-09-07T01:26:41Z", + "updated_at": "2021-09-07T11:32:33Z", "pushed_at": "2021-06-15T17:30:23Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2021/CVE-2021-00001.json b/2021/CVE-2021-00001.json new file mode 100644 index 0000000000..c6629057b7 --- /dev/null +++ b/2021/CVE-2021-00001.json @@ -0,0 +1,25 @@ +[ + { + "id": 396639027, + "name": "cve-2021-00001", + "full_name": "FirDragon\/cve-2021-00001", + "owner": { + "login": "FirDragon", + "id": 45531183, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45531183?v=4", + "html_url": "https:\/\/github.com\/FirDragon" + }, + "html_url": "https:\/\/github.com\/FirDragon\/cve-2021-00001", + "description": "cve-2021-00001", + "fork": false, + "created_at": "2021-08-16T05:45:41Z", + "updated_at": "2021-08-16T05:46:29Z", + "pushed_at": "2021-08-16T05:46:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 521cb00960..a69e4ab5b6 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -36,13 +36,13 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2021-09-07T09:13:24Z", + "updated_at": "2021-09-07T13:12:45Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1355, - "watchers_count": 1355, + "stargazers_count": 1356, + "watchers_count": 1356, "forks_count": 492, "forks": 492, - "watchers": 1355, + "watchers": 1356, "score": 0 }, { @@ -220,13 +220,13 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-09-07T09:13:14Z", + "updated_at": "2021-09-07T13:13:10Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 592, - "watchers_count": 592, + "stargazers_count": 593, + "watchers_count": 593, "forks_count": 159, "forks": 159, - "watchers": 592, + "watchers": 593, "score": 0 }, { @@ -707,8 +707,8 @@ "pushed_at": "2021-09-01T11:25:22Z", "stargazers_count": 81, "watchers_count": 81, - "forks_count": 9, - "forks": 9, + "forks_count": 10, + "forks": 10, "watchers": 81, "score": 0 } diff --git a/2021/CVE-2021-21315.json b/2021/CVE-2021-21315.json index 62eed33831..f116e17d07 100644 --- a/2021/CVE-2021-21315.json +++ b/2021/CVE-2021-21315.json @@ -67,5 +67,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 404010458, + "name": "CVE-2021-21315", + "full_name": "alikarimi999\/CVE-2021-21315", + "owner": { + "login": "alikarimi999", + "id": 90207127, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90207127?v=4", + "html_url": "https:\/\/github.com\/alikarimi999" + }, + "html_url": "https:\/\/github.com\/alikarimi999\/CVE-2021-21315", + "description": null, + "fork": false, + "created_at": "2021-09-07T14:31:20Z", + "updated_at": "2021-09-07T14:38:04Z", + "pushed_at": "2021-09-07T14:38:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-24085.json b/2021/CVE-2021-24085.json index 779a981539..857f4ed2e7 100644 --- a/2021/CVE-2021-24085.json +++ b/2021/CVE-2021-24085.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-15T14:41:25Z", - "updated_at": "2021-07-02T18:14:28Z", + "updated_at": "2021-09-07T13:21:03Z", "pushed_at": "2021-02-15T15:11:00Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 59, + "watchers_count": 59, "forks_count": 15, "forks": 15, - "watchers": 58, + "watchers": 59, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 85eb7cf44d..d4f48f0e48 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-09-06T07:35:42Z", + "updated_at": "2021-09-07T13:31:34Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 844, - "watchers_count": 844, + "stargazers_count": 845, + "watchers_count": 845, "forks_count": 268, "forks": 268, - "watchers": 844, + "watchers": 845, "score": 0 }, { diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 64f92b9da5..2b9341fb09 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2021-08-31T23:33:44Z", - "updated_at": "2021-09-07T06:02:18Z", + "updated_at": "2021-09-07T10:12:22Z", "pushed_at": "2021-09-01T01:01:06Z", - "stargazers_count": 37, - "watchers_count": 37, - "forks_count": 10, - "forks": 10, - "watchers": 37, + "stargazers_count": 38, + "watchers_count": 38, + "forks_count": 11, + "forks": 11, + "watchers": 38, "score": 0 }, { @@ -59,13 +59,13 @@ "description": null, "fork": false, "created_at": "2021-09-01T00:50:30Z", - "updated_at": "2021-09-07T03:28:21Z", + "updated_at": "2021-09-07T09:30:53Z", "pushed_at": "2021-09-01T01:17:58Z", - "stargazers_count": 48, - "watchers_count": 48, - "forks_count": 21, - "forks": 21, - "watchers": 48, + "stargazers_count": 49, + "watchers_count": 49, + "forks_count": 23, + "forks": 23, + "watchers": 49, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "Confluence Server Webwork OGNL injection", "fork": false, "created_at": "2021-09-01T07:15:17Z", - "updated_at": "2021-09-07T09:08:05Z", + "updated_at": "2021-09-07T14:42:08Z", "pushed_at": "2021-09-04T22:14:46Z", - "stargazers_count": 197, - "watchers_count": 197, + "stargazers_count": 199, + "watchers_count": 199, "forks_count": 42, "forks": 42, - "watchers": 197, + "watchers": 199, "score": 0 }, { @@ -151,8 +151,8 @@ "description": "Atlassian Confluence Pre-Auth RCE", "fork": false, "created_at": "2021-09-01T08:18:44Z", - "updated_at": "2021-09-07T08:05:21Z", - "pushed_at": "2021-09-03T11:31:01Z", + "updated_at": "2021-09-07T10:25:50Z", + "pushed_at": "2021-09-07T10:25:48Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 3, @@ -247,8 +247,8 @@ "pushed_at": "2021-09-01T12:51:02Z", "stargazers_count": 19, "watchers_count": 19, - "forks_count": 5, - "forks": 5, + "forks_count": 6, + "forks": 6, "watchers": 19, "score": 0 }, @@ -408,8 +408,8 @@ "pushed_at": "2021-09-03T07:37:10Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 0, "score": 0 }, @@ -565,13 +565,36 @@ "description": "Atlassian Confluence CVE-2021-26084 one-liner mass checker", "fork": false, "created_at": "2021-09-07T01:15:16Z", - "updated_at": "2021-09-07T09:04:45Z", - "pushed_at": "2021-09-07T01:16:15Z", - "stargazers_count": 8, - "watchers_count": 8, - "forks_count": 1, - "forks": 1, - "watchers": 8, + "updated_at": "2021-09-07T14:38:06Z", + "pushed_at": "2021-09-07T12:59:45Z", + "stargazers_count": 15, + "watchers_count": 15, + "forks_count": 2, + "forks": 2, + "watchers": 15, + "score": 0 + }, + { + "id": 403962659, + "name": "cve-2021-26084-confluence", + "full_name": "GlennPegden2\/cve-2021-26084-confluence", + "owner": { + "login": "GlennPegden2", + "id": 34956796, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34956796?v=4", + "html_url": "https:\/\/github.com\/GlennPegden2" + }, + "html_url": "https:\/\/github.com\/GlennPegden2\/cve-2021-26084-confluence", + "description": "A quick and dirty PoC of cve-2010-26084 as none of the existing ones worked for me.", + "fork": false, + "created_at": "2021-09-07T12:04:09Z", + "updated_at": "2021-09-07T15:09:43Z", + "pushed_at": "2021-09-07T15:09:40Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index ebb16c095e..0129e39c1e 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -44,5 +44,28 @@ "forks": 1, "watchers": 8, "score": 0 + }, + { + "id": 396324186, + "name": "CVE-2021-28476-tools-env", + "full_name": "sh4m2hwz\/CVE-2021-28476-tools-env", + "owner": { + "login": "sh4m2hwz", + "id": 77354315, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77354315?v=4", + "html_url": "https:\/\/github.com\/sh4m2hwz" + }, + "html_url": "https:\/\/github.com\/sh4m2hwz\/CVE-2021-28476-tools-env", + "description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.", + "fork": false, + "created_at": "2021-08-15T11:10:40Z", + "updated_at": "2021-08-15T17:29:21Z", + "pushed_at": "2021-08-15T11:44:02Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 2, + "forks": 2, + "watchers": 2, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index c591262b8f..912e683cc5 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1149,6 +1149,29 @@ "watchers": 0, "score": 0 }, + { + "id": 396558758, + "name": "CVE-2021-3156", + "full_name": "Kleptocratic\/CVE-2021-3156", + "owner": { + "login": "Kleptocratic", + "id": 72598486, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72598486?v=4", + "html_url": "https:\/\/github.com\/Kleptocratic" + }, + "html_url": "https:\/\/github.com\/Kleptocratic\/CVE-2021-3156", + "description": "Sudo heap-based buffer overflow privilege escalation commands and mitigations.", + "fork": false, + "created_at": "2021-08-16T01:10:34Z", + "updated_at": "2021-08-16T01:29:50Z", + "pushed_at": "2021-08-16T01:26:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 403515290, "name": "CVE-2021-3156", diff --git a/2021/CVE-2021-33909.json b/2021/CVE-2021-33909.json index 5dc4aefdd7..23129f74e0 100644 --- a/2021/CVE-2021-33909.json +++ b/2021/CVE-2021-33909.json @@ -105,13 +105,13 @@ "description": "CVE-2021-33909 Sequoia", "fork": false, "created_at": "2021-09-02T04:51:54Z", - "updated_at": "2021-09-07T06:22:43Z", + "updated_at": "2021-09-07T14:45:10Z", "pushed_at": "2021-09-02T04:52:19Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 1, - "forks": 1, - "watchers": 4, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 2, + "forks": 2, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json index f5306b6bfb..e6bf3698cf 100644 --- a/2021/CVE-2021-34473.json +++ b/2021/CVE-2021-34473.json @@ -67,5 +67,28 @@ "forks": 7, "watchers": 8, "score": 0 + }, + { + "id": 403092854, + "name": "proxyshell", + "full_name": "horizon3ai\/proxyshell", + "owner": { + "login": "horizon3ai", + "id": 79593994, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", + "html_url": "https:\/\/github.com\/horizon3ai" + }, + "html_url": "https:\/\/github.com\/horizon3ai\/proxyshell", + "description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207", + "fork": false, + "created_at": "2021-09-04T15:34:03Z", + "updated_at": "2021-09-07T15:18:48Z", + "pushed_at": "2021-09-07T15:18:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index cd2d6dc594..4155903f07 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -220,13 +220,13 @@ "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "fork": false, "created_at": "2021-07-05T20:13:49Z", - "updated_at": "2021-09-06T15:34:43Z", + "updated_at": "2021-09-07T10:30:11Z", "pushed_at": "2021-08-20T01:54:22Z", - "stargazers_count": 633, - "watchers_count": 633, + "stargazers_count": 634, + "watchers_count": 634, "forks_count": 84, "forks": 84, - "watchers": 633, + "watchers": 634, "score": 0 }, { diff --git a/2021/CVE-2021-36949.json b/2021/CVE-2021-36949.json new file mode 100644 index 0000000000..73485187e8 --- /dev/null +++ b/2021/CVE-2021-36949.json @@ -0,0 +1,25 @@ +[ + { + "id": 396130351, + "name": "Check-AAD-Connect-for-CVE-2021-36949-vulnerability", + "full_name": "Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability", + "owner": { + "login": "Maxwitat", + "id": 18595261, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18595261?v=4", + "html_url": "https:\/\/github.com\/Maxwitat" + }, + "html_url": "https:\/\/github.com\/Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability", + "description": "check if Azure AD Connect is affected by the vulnerability described in CVE-2021-36949", + "fork": false, + "created_at": "2021-08-14T21:05:30Z", + "updated_at": "2021-08-16T01:31:50Z", + "pushed_at": "2021-08-15T18:39:55Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-38699.json b/2021/CVE-2021-38699.json index 46ba06da5a..ad1cbc92fc 100644 --- a/2021/CVE-2021-38699.json +++ b/2021/CVE-2021-38699.json @@ -44,5 +44,28 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 396128386, + "name": "CVE-2021-38699", + "full_name": "Justin-1993\/CVE-2021-38699", + "owner": { + "login": "Justin-1993", + "id": 76507754, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76507754?v=4", + "html_url": "https:\/\/github.com\/Justin-1993" + }, + "html_url": "https:\/\/github.com\/Justin-1993\/CVE-2021-38699", + "description": "TastyIgniter 3.0.7 allows XSS via the name field during user-account creation", + "fork": false, + "created_at": "2021-08-14T20:57:00Z", + "updated_at": "2021-08-16T00:03:32Z", + "pushed_at": "2021-08-15T23:05:47Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 91fb5349b4..1d7d4bca08 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,9 @@ # PoC in GitHub ## 2021 +### CVE-2021-00001 +- [FirDragon/cve-2021-00001](https://github.com/FirDragon/cve-2021-00001) + ### CVE-2021-1056 (2021-01-07) @@ -288,6 +291,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based - [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156) - [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156) - [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156) +- [Kleptocratic/CVE-2021-3156](https://github.com/Kleptocratic/CVE-2021-3156) - [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156) ### CVE-2021-3164 (2021-01-21) @@ -573,6 +577,7 @@ The System Information Library for Node.JS (npm package "systeminformation& - [ForbiddenProgrammer/CVE-2021-21315-PoC](https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC) - [cherrera0001/CVE-2021-21315v2](https://github.com/cherrera0001/CVE-2021-21315v2) - [MazX0p/CVE-2021-21315-exploit](https://github.com/MazX0p/CVE-2021-21315-exploit) +- [alikarimi999/CVE-2021-21315](https://github.com/alikarimi999/CVE-2021-21315) ### CVE-2021-21341 (2021-03-22) @@ -1010,6 +1015,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - [rootsmadi/CVE-2021-26084](https://github.com/rootsmadi/CVE-2021-26084) - [p1gz/CVE-2021-26084-Confluence-OGNL](https://github.com/p1gz/CVE-2021-26084-Confluence-OGNL) - [1ZRR4H/CVE-2021-26084](https://github.com/1ZRR4H/CVE-2021-26084) +- [GlennPegden2/cve-2021-26084-confluence](https://github.com/GlennPegden2/cve-2021-26084-confluence) ### CVE-2021-26119 (2021-02-21) @@ -1401,6 +1407,7 @@ Hyper-V Remote Code Execution Vulnerability - [0vercl0k/CVE-2021-28476](https://github.com/0vercl0k/CVE-2021-28476) - [bluefrostsecurity/CVE-2021-28476](https://github.com/bluefrostsecurity/CVE-2021-28476) +- [sh4m2hwz/CVE-2021-28476-tools-env](https://github.com/sh4m2hwz/CVE-2021-28476-tools-env) ### CVE-2021-28480 (2021-04-13) @@ -1842,6 +1849,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni - [cyberheartmi9/Proxyshell-Scanner](https://github.com/cyberheartmi9/Proxyshell-Scanner) - [RaouzRouik/CVE-2021-34473-scanner](https://github.com/RaouzRouik/CVE-2021-34473-scanner) - [phamphuqui1998/CVE-2021-34473](https://github.com/phamphuqui1998/CVE-2021-34473) +- [horizon3ai/proxyshell](https://github.com/horizon3ai/proxyshell) ### CVE-2021-34481 (2021-07-16) @@ -2002,6 +2010,14 @@ Windows Elevation of Privilege Vulnerability - [OlivierLaflamme/CVE-2021-36934_export_shadow_volume](https://github.com/OlivierLaflamme/CVE-2021-36934_export_shadow_volume) - [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive) +### CVE-2021-36949 (2021-08-12) + + +Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability + + +- [Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability](https://github.com/Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability) + ### CVE-2021-37152 (2021-08-10) @@ -2091,6 +2107,7 @@ TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and - [HuskyHacks/CVE-2021-38699-Reflected-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS) - [HuskyHacks/CVE-2021-38699-Stored-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS) +- [Justin-1993/CVE-2021-38699](https://github.com/Justin-1993/CVE-2021-38699) ### CVE-2021-38704 - [sudonoodle/CVE-2021-38704](https://github.com/sudonoodle/CVE-2021-38704) @@ -2884,6 +2901,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc - [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat) - [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938) - [Neko2sh1ro/CVE-2020-1938](https://github.com/Neko2sh1ro/CVE-2020-1938) +- [jptr218/ghostcat](https://github.com/jptr218/ghostcat) ### CVE-2020-1947 (2020-03-11) @@ -16210,6 +16228,7 @@ Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642. - [jpiechowka/jenkins-cve-2016-0792](https://github.com/jpiechowka/jenkins-cve-2016-0792) - [s0wr0b1ndef/java-deserialization-exploits](https://github.com/s0wr0b1ndef/java-deserialization-exploits) +- [Aviksaikat/CVE-2016-0792](https://github.com/Aviksaikat/CVE-2016-0792) ### CVE-2016-0793 (2016-04-01) @@ -18258,6 +18277,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p - [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan) - [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us) - [BelminD/heartbleed](https://github.com/BelminD/heartbleed) +- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart) ### CVE-2014-0166 (2014-04-09) @@ -19943,6 +19963,9 @@ Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local u - [otofoto/CVE-2010-5230](https://github.com/otofoto/CVE-2010-5230) +### CVE-2010-26084 +- [GlennPegden2/cve-2021-26084-confluence](https://github.com/GlennPegden2/cve-2021-26084-confluence) + ## 2009 ### CVE-2009-0182 (2009-01-20)