diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index 659858f885..91dc98efef 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -17,9 +17,9 @@ "pushed_at": "2017-04-24T14:16:56Z", "stargazers_count": 312, "watchers_count": 312, - "forks_count": 97, + "forks_count": 98, "allow_forking": true, - "forks": 97, + "forks": 98, "watchers": 312, "score": 0 }, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 2dac6e3ca5..e8be0a6ac3 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -37,14 +37,14 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-09-15T02:44:24Z", + "updated_at": "2021-09-15T14:00:30Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1166, - "watchers_count": 1166, + "stargazers_count": 1167, + "watchers_count": 1167, "forks_count": 261, "allow_forking": true, "forks": 261, - "watchers": 1166, + "watchers": 1167, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 13d5c322a3..ef391927d4 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,14 +13,14 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-09-15T02:44:24Z", + "updated_at": "2021-09-15T14:00:30Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1166, - "watchers_count": 1166, + "stargazers_count": 1167, + "watchers_count": 1167, "forks_count": 261, "allow_forking": true, "forks": 261, - "watchers": 1166, + "watchers": 1167, "score": 0 }, { diff --git a/2016/CVE-2016-3088.json b/2016/CVE-2016-3088.json index 5d21e6221a..cd3cce024b 100644 --- a/2016/CVE-2016-3088.json +++ b/2016/CVE-2016-3088.json @@ -13,14 +13,14 @@ "description": "ActiveMQ_putshell直接获取webshell", "fork": false, "created_at": "2020-07-31T09:06:15Z", - "updated_at": "2021-05-28T06:59:23Z", + "updated_at": "2021-09-15T09:34:16Z", "pushed_at": "2020-08-01T06:47:34Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 4, "allow_forking": true, "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0 }, { diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index fcde6b2bf9..328cdb34e6 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -13,14 +13,14 @@ "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "fork": false, "created_at": "2017-10-09T15:13:25Z", - "updated_at": "2021-08-05T07:22:15Z", + "updated_at": "2021-09-15T09:20:24Z", "pushed_at": "2021-07-29T12:00:48Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 80, + "watchers_count": 80, "forks_count": 40, "allow_forking": true, "forks": 40, - "watchers": 79, + "watchers": 80, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 51a122636a..f3c191535a 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -37,14 +37,14 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-09-15T02:44:24Z", + "updated_at": "2021-09-15T14:00:30Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1166, - "watchers_count": 1166, + "stargazers_count": 1167, + "watchers_count": 1167, "forks_count": 261, "allow_forking": true, "forks": 261, - "watchers": 1166, + "watchers": 1167, "score": 0 }, { diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 4865d535d8..b97442e133 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -17,9 +17,9 @@ "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 440, "watchers_count": 440, - "forks_count": 423, + "forks_count": 424, "allow_forking": true, - "forks": 423, + "forks": 424, "watchers": 440, "score": 0 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 88271e365a..3d4500b9fa 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -469,14 +469,14 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-09-15T02:44:24Z", + "updated_at": "2021-09-15T14:00:30Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1166, - "watchers_count": 1166, + "stargazers_count": 1167, + "watchers_count": 1167, "forks_count": 261, "allow_forking": true, "forks": 261, - "watchers": 1166, + "watchers": 1167, "score": 0 }, { diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index 16d7b332fe..837793d33c 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -13,14 +13,14 @@ "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", "fork": false, "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2021-08-22T10:19:42Z", + "updated_at": "2021-09-15T12:39:51Z", "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "forks_count": 41, "allow_forking": true, "forks": 41, - "watchers": 117, + "watchers": 118, "score": 0 }, { @@ -61,14 +61,14 @@ "description": "guest→system(UAC手动提权)", "fork": false, "created_at": "2019-11-27T02:47:37Z", - "updated_at": "2021-08-05T23:36:29Z", + "updated_at": "2021-09-15T12:28:46Z", "pushed_at": "2020-03-18T06:21:13Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "forks_count": 19, "allow_forking": true, "forks": 19, - "watchers": 69, + "watchers": 70, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index f666e18869..e2bdb9b4ac 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -37,14 +37,14 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-09-14T09:01:21Z", + "updated_at": "2021-09-15T14:00:19Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2867, - "watchers_count": 2867, + "stargazers_count": 2868, + "watchers_count": 2868, "forks_count": 836, "allow_forking": true, "forks": 836, - "watchers": 2867, + "watchers": 2868, "score": 0 }, { @@ -61,14 +61,14 @@ "description": "Solr_CVE-2019-17558", "fork": false, "created_at": "2020-08-04T06:13:33Z", - "updated_at": "2021-01-15T02:38:31Z", + "updated_at": "2021-09-15T09:34:12Z", "pushed_at": "2020-08-04T06:29:22Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 2eff52034c..148b871fe5 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -157,14 +157,14 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-09-15T02:44:24Z", + "updated_at": "2021-09-15T14:00:30Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1166, - "watchers_count": 1166, + "stargazers_count": 1167, + "watchers_count": 1167, "forks_count": 261, "allow_forking": true, "forks": 261, - "watchers": 1166, + "watchers": 1167, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1337.json b/2020/CVE-2020-1337.json index ec0b5edafc..cf01553da9 100644 --- a/2020/CVE-2020-1337.json +++ b/2020/CVE-2020-1337.json @@ -17,9 +17,9 @@ "pushed_at": "2020-07-21T10:28:42Z", "stargazers_count": 151, "watchers_count": 151, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, - "forks": 29, + "forks": 30, "watchers": 151, "score": 0 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index f867fbca49..71652136a3 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -161,9 +161,9 @@ "pushed_at": "2020-09-16T14:05:27Z", "stargazers_count": 147, "watchers_count": 147, - "forks_count": 37, + "forks_count": 38, "allow_forking": true, - "forks": 37, + "forks": 38, "watchers": 147, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index b5bb94f968..0e38756a14 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,14 +13,14 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-09-14T09:01:21Z", + "updated_at": "2021-09-15T14:00:19Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2867, - "watchers_count": 2867, + "stargazers_count": 2868, + "watchers_count": 2868, "forks_count": 836, "allow_forking": true, "forks": 836, - "watchers": 2867, + "watchers": 2868, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 59a10eb13f..d33eb3332d 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,14 +13,14 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-09-15T02:44:24Z", + "updated_at": "2021-09-15T14:00:30Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1166, - "watchers_count": 1166, + "stargazers_count": 1167, + "watchers_count": 1167, "forks_count": 261, "allow_forking": true, "forks": 261, - "watchers": 1166, + "watchers": 1167, "score": 0 }, { diff --git a/2020/CVE-2020-36386.json b/2020/CVE-2020-36386.json new file mode 100644 index 0000000000..af7190fa19 --- /dev/null +++ b/2020/CVE-2020-36386.json @@ -0,0 +1,26 @@ +[ + { + "id": 406719264, + "name": "linux-3.0.35_CVE-2020-36386_withPatch", + "full_name": "artsking\/linux-3.0.35_CVE-2020-36386_withPatch", + "owner": { + "login": "artsking", + "id": 87514725, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87514725?v=4", + "html_url": "https:\/\/github.com\/artsking" + }, + "html_url": "https:\/\/github.com\/artsking\/linux-3.0.35_CVE-2020-36386_withPatch", + "description": null, + "fork": false, + "created_at": "2021-09-15T10:38:52Z", + "updated_at": "2021-09-15T10:44:18Z", + "pushed_at": "2021-09-15T10:43:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 542311e7f5..f6be3d13b9 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -41,9 +41,9 @@ "pushed_at": "2021-07-20T15:28:13Z", "stargazers_count": 1370, "watchers_count": 1370, - "forks_count": 498, + "forks_count": 499, "allow_forking": true, - "forks": 498, + "forks": 499, "watchers": 1370, "score": 0 }, @@ -229,14 +229,14 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-09-15T09:01:51Z", + "updated_at": "2021-09-15T14:01:54Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 604, - "watchers_count": 604, + "stargazers_count": 603, + "watchers_count": 603, "forks_count": 161, "allow_forking": true, "forks": 161, - "watchers": 604, + "watchers": 603, "score": 0 }, { diff --git a/2021/CVE-2021-1748.json b/2021/CVE-2021-1748.json index df5f7829df..e59e97d1b7 100644 --- a/2021/CVE-2021-1748.json +++ b/2021/CVE-2021-1748.json @@ -37,14 +37,14 @@ "description": "Backporting CVE-2021-1748 patch for iOS <=14.3", "fork": false, "created_at": "2021-09-03T22:48:11Z", - "updated_at": "2021-09-06T02:13:24Z", + "updated_at": "2021-09-15T11:10:31Z", "pushed_at": "2021-09-03T22:50:08Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 3, "allow_forking": true, "forks": 3, - "watchers": 8, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index c3b6e5922f..b71f747788 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -421,14 +421,14 @@ "description": "漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell", "fork": false, "created_at": "2021-03-01T14:14:01Z", - "updated_at": "2021-04-15T01:53:47Z", + "updated_at": "2021-09-15T09:33:53Z", "pushed_at": "2021-03-01T14:28:30Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 1b40175fbf..4f720cab1d 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -89,9 +89,9 @@ "pushed_at": "2021-06-01T19:13:42Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 }, diff --git a/2021/CVE-2021-24499.json b/2021/CVE-2021-24499.json index 8b9fa3e426..63b2348113 100644 --- a/2021/CVE-2021-24499.json +++ b/2021/CVE-2021-24499.json @@ -17,9 +17,9 @@ "pushed_at": "2021-09-12T12:59:14Z", "stargazers_count": 8, "watchers_count": 8, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, - "forks": 0, + "forks": 1, "watchers": 8, "score": 0 } diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 51faf50292..67108e7053 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -37,14 +37,14 @@ "description": null, "fork": false, "created_at": "2021-08-31T23:33:44Z", - "updated_at": "2021-09-08T17:13:53Z", + "updated_at": "2021-09-15T10:40:46Z", "pushed_at": "2021-09-01T01:01:06Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 12, "allow_forking": true, "forks": 12, - "watchers": 40, + "watchers": 42, "score": 0 }, { @@ -109,14 +109,14 @@ "description": "Confluence Server Webwork OGNL injection", "fork": false, "created_at": "2021-09-01T07:15:17Z", - "updated_at": "2021-09-14T06:21:50Z", + "updated_at": "2021-09-15T14:13:47Z", "pushed_at": "2021-09-10T19:42:33Z", - "stargazers_count": 209, - "watchers_count": 209, - "forks_count": 49, + "stargazers_count": 210, + "watchers_count": 210, + "forks_count": 50, "allow_forking": true, - "forks": 49, - "watchers": 209, + "forks": 50, + "watchers": 210, "score": 0 }, { diff --git a/2021/CVE-2021-28663.json b/2021/CVE-2021-28663.json index 91c34e565a..42467f6d81 100644 --- a/2021/CVE-2021-28663.json +++ b/2021/CVE-2021-28663.json @@ -13,14 +13,14 @@ "description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)", "fork": false, "created_at": "2021-09-01T22:59:29Z", - "updated_at": "2021-09-13T04:01:59Z", + "updated_at": "2021-09-15T14:53:27Z", "pushed_at": "2021-09-03T10:24:34Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 6, "allow_forking": true, "forks": 6, - "watchers": 28, + "watchers": 29, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 75116aff0a..68a54dd9ef 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -61,14 +61,14 @@ "description": "CVE-2021-3156", "fork": false, "created_at": "2021-01-27T16:03:34Z", - "updated_at": "2021-07-23T15:05:02Z", + "updated_at": "2021-09-15T10:16:13Z", "pushed_at": "2021-01-31T04:56:56Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 111, + "watchers_count": 111, "forks_count": 43, "allow_forking": true, "forks": 43, - "watchers": 110, + "watchers": 111, "score": 0 }, { @@ -1127,6 +1127,30 @@ "watchers": 1, "score": 0 }, + { + "id": 381790796, + "name": "CVE-2021-3156", + "full_name": "TheFlash2k\/CVE-2021-3156", + "owner": { + "login": "TheFlash2k", + "id": 19727349, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19727349?v=4", + "html_url": "https:\/\/github.com\/TheFlash2k" + }, + "html_url": "https:\/\/github.com\/TheFlash2k\/CVE-2021-3156", + "description": null, + "fork": false, + "created_at": "2021-06-30T18:00:03Z", + "updated_at": "2021-09-15T11:53:44Z", + "pushed_at": "2021-06-30T18:00:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 393627940, "name": "CVE-2021-3156", diff --git a/2021/CVE-2021-33766.json b/2021/CVE-2021-33766.json index 68491a7e54..756f6009e4 100644 --- a/2021/CVE-2021-33766.json +++ b/2021/CVE-2021-33766.json @@ -37,14 +37,14 @@ "description": "CVE-2021-33766-poc", "fork": false, "created_at": "2021-09-15T09:09:20Z", - "updated_at": "2021-09-15T09:17:48Z", - "pushed_at": "2021-09-15T09:09:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, + "updated_at": "2021-09-15T09:26:35Z", + "pushed_at": "2021-09-15T09:23:39Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 2, "allow_forking": true, - "forks": 0, - "watchers": 0, + "forks": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index ea3bc87ef4..75cee596fc 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -113,9 +113,9 @@ "pushed_at": "2021-07-22T04:17:47Z", "stargazers_count": 11, "watchers_count": 11, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, - "forks": 6, + "forks": 7, "watchers": 11, "score": 0 }, @@ -254,12 +254,12 @@ "fork": false, "created_at": "2021-07-24T12:55:05Z", "updated_at": "2021-09-15T00:50:09Z", - "pushed_at": "2021-07-25T15:41:33Z", + "pushed_at": "2021-09-15T12:41:32Z", "stargazers_count": 209, "watchers_count": 209, - "forks_count": 51, + "forks_count": 52, "allow_forking": true, - "forks": 51, + "forks": 52, "watchers": 209, "score": 0 }, diff --git a/2021/CVE-2021-3707.json b/2021/CVE-2021-3707.json index 443961cec5..b5a5977856 100644 --- a/2021/CVE-2021-3707.json +++ b/2021/CVE-2021-3707.json @@ -13,14 +13,14 @@ "description": "CVE-2021-3707 , CVE-2021-3708", "fork": false, "created_at": "2021-05-29T12:24:04Z", - "updated_at": "2021-09-07T05:50:53Z", + "updated_at": "2021-09-15T15:14:53Z", "pushed_at": "2021-09-05T17:10:48Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 4, "allow_forking": true, "forks": 4, - "watchers": 9, + "watchers": 11, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 38bcefee74..46c3cd815c 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -205,14 +205,14 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2021-09-15T09:16:22Z", + "updated_at": "2021-09-15T15:21:41Z", "pushed_at": "2021-09-11T09:50:26Z", - "stargazers_count": 992, - "watchers_count": 992, - "forks_count": 313, + "stargazers_count": 1014, + "watchers_count": 1014, + "forks_count": 325, "allow_forking": true, - "forks": 313, - "watchers": 992, + "forks": 325, + "watchers": 1014, "score": 0 }, { @@ -373,14 +373,14 @@ "description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit", "fork": false, "created_at": "2021-09-12T18:05:53Z", - "updated_at": "2021-09-15T08:25:16Z", + "updated_at": "2021-09-15T14:25:35Z", "pushed_at": "2021-09-13T12:30:10Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 102, + "watchers_count": 102, "forks_count": 30, "allow_forking": true, "forks": 30, - "watchers": 93, + "watchers": 102, "score": 0 }, { @@ -445,14 +445,14 @@ "description": null, "fork": false, "created_at": "2021-09-14T17:10:48Z", - "updated_at": "2021-09-15T07:43:59Z", + "updated_at": "2021-09-15T11:45:16Z", "pushed_at": "2021-09-14T17:19:26Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 1, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 2, "allow_forking": true, - "forks": 1, - "watchers": 9, + "forks": 2, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 13cb0fce36..6cd831b932 100644 --- a/README.md +++ b/README.md @@ -289,6 +289,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based - [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build) - [wuuconix/CVE-2021-3156-Dockerfile-not-succeed](https://github.com/wuuconix/CVE-2021-3156-Dockerfile-not-succeed) - [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156) +- [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156) - [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156) - [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156) - [Kleptocratic/CVE-2021-3156](https://github.com/Kleptocratic/CVE-2021-3156) @@ -2341,7 +2342,12 @@ playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the ### CVE-2021-40375 - [DCKento/CVE-2021-40375](https://github.com/DCKento/CVE-2021-40375) -### CVE-2021-40444 +### CVE-2021-40444 (2021-09-15) + + +Microsoft MSHTML Remote Code Execution Vulnerability + + - [ozergoker/CVE-2021-40444](https://github.com/ozergoker/CVE-2021-40444) - [DarkSprings/CVE-2021-40444](https://github.com/DarkSprings/CVE-2021-40444) - [rfcxv/CVE-2021-40444-POC](https://github.com/rfcxv/CVE-2021-40444-POC) @@ -2370,7 +2376,12 @@ A reflected XSS vulnerability exists in multiple pages in version 22 of the Gibb - [5qu1n7/CVE-2021-40492](https://github.com/5qu1n7/CVE-2021-40492) -### CVE-2021-40845 +### CVE-2021-40845 (2021-09-15) + + +The web part of Zenitel AlphaCom XE Audio Server through 11.2.3.10, called AlphaWeb XE, does not restrict file upload in the Custom Scripts section at php/index.php. Neither the content nor extension of the uploaded files is checked, allowing execution of PHP code under the /cmd directory. + + - [ricardojoserf/CVE-2021-40845](https://github.com/ricardojoserf/CVE-2021-40845) ### CVE-2021-41074 @@ -6877,6 +6888,14 @@ The dashboard gadgets preference resource of the Atlassian gadgets plugin used i - [f4rber/CVE-2020-36287](https://github.com/f4rber/CVE-2020-36287) +### CVE-2020-36386 (2021-06-07) + + +An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf. + + +- [artsking/linux-3.0.35_CVE-2020-36386_withPatch](https://github.com/artsking/linux-3.0.35_CVE-2020-36386_withPatch) + ### CVE-2020-72381 - [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)