diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index 188669b509..77f8c7fc51 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-16T08:07:36Z",
+ "updated_at": "2021-06-17T09:50:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1067,
- "watchers_count": 1067,
- "forks_count": 236,
- "forks": 236,
- "watchers": 1067,
+ "stargazers_count": 1068,
+ "watchers_count": 1068,
+ "forks_count": 237,
+ "forks": 237,
+ "watchers": 1068,
"score": 0
},
{
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 495842c921..a41c12127c 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-16T08:07:36Z",
+ "updated_at": "2021-06-17T09:50:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1067,
- "watchers_count": 1067,
- "forks_count": 236,
- "forks": 236,
- "watchers": 1067,
+ "stargazers_count": 1068,
+ "watchers_count": 1068,
+ "forks_count": 237,
+ "forks": 237,
+ "watchers": 1068,
"score": 0
},
{
diff --git a/2017/CVE-2017-14980.json b/2017/CVE-2017-14980.json
new file mode 100644
index 0000000000..ef2183ea05
--- /dev/null
+++ b/2017/CVE-2017-14980.json
@@ -0,0 +1,25 @@
+[
+ {
+ "id": 377775623,
+ "name": "CVE-2017-14980",
+ "full_name": "bmdyy\/CVE-2017-14980",
+ "owner": {
+ "login": "bmdyy",
+ "id": 45366012,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45366012?v=4",
+ "html_url": "https:\/\/github.com\/bmdyy"
+ },
+ "html_url": "https:\/\/github.com\/bmdyy\/CVE-2017-14980",
+ "description": "A PoC for CVE-2017-14980 which works on systems with DEP enabled",
+ "fork": false,
+ "created_at": "2021-06-17T09:28:57Z",
+ "updated_at": "2021-06-17T09:34:29Z",
+ "pushed_at": "2021-06-17T09:34:26Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index d8627a5ea2..3d9be65987 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-16T08:07:36Z",
+ "updated_at": "2021-06-17T09:50:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1067,
- "watchers_count": 1067,
- "forks_count": 236,
- "forks": 236,
- "watchers": 1067,
+ "stargazers_count": 1068,
+ "watchers_count": 1068,
+ "forks_count": 237,
+ "forks": 237,
+ "watchers": 1068,
"score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-8570.json b/2017/CVE-2017-8570.json
index d11c962b41..260e6da340 100644
--- a/2017/CVE-2017-8570.json
+++ b/2017/CVE-2017-8570.json
@@ -36,13 +36,13 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
- "updated_at": "2021-04-23T12:49:54Z",
+ "updated_at": "2021-06-17T14:06:36Z",
"pushed_at": "2018-01-09T19:23:43Z",
- "stargazers_count": 175,
- "watchers_count": 175,
- "forks_count": 100,
- "forks": 100,
- "watchers": 175,
+ "stargazers_count": 176,
+ "watchers_count": 176,
+ "forks_count": 101,
+ "forks": 101,
+ "watchers": 176,
"score": 0
},
{
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 2e2a0381e4..025f6f67f5 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-16T08:07:36Z",
+ "updated_at": "2021-06-17T09:50:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1067,
- "watchers_count": 1067,
- "forks_count": 236,
- "forks": 236,
- "watchers": 1067,
+ "stargazers_count": 1068,
+ "watchers_count": 1068,
+ "forks_count": 237,
+ "forks": 237,
+ "watchers": 1068,
"score": 0
},
{
diff --git a/2018/CVE-2018-4441.json b/2018/CVE-2018-4441.json
index 8bafc8def3..44d09c7e48 100644
--- a/2018/CVE-2018-4441.json
+++ b/2018/CVE-2018-4441.json
@@ -17,8 +17,8 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 198,
"watchers_count": 198,
- "forks_count": 55,
- "forks": 55,
+ "forks_count": 54,
+ "forks": 54,
"watchers": 198,
"score": 0
}
diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json
index 5a1582be22..f6f921b563 100644
--- a/2018/CVE-2018-8174.json
+++ b/2018/CVE-2018-8174.json
@@ -40,8 +40,8 @@
"pushed_at": "2018-05-30T03:33:14Z",
"stargazers_count": 132,
"watchers_count": 132,
- "forks_count": 58,
- "forks": 58,
+ "forks_count": 60,
+ "forks": 60,
"watchers": 132,
"score": 0
},
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index 067e5d01c4..f2d614e41f 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1236,8 +1236,8 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 817,
"watchers_count": 817,
- "forks_count": 205,
- "forks": 205,
+ "forks_count": 206,
+ "forks": 206,
"watchers": 817,
"score": 0
},
@@ -2405,13 +2405,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
- "updated_at": "2021-06-09T05:26:36Z",
+ "updated_at": "2021-06-17T13:31:53Z",
"pushed_at": "2020-01-21T03:15:41Z",
- "stargazers_count": 204,
- "watchers_count": 204,
+ "stargazers_count": 206,
+ "watchers_count": 206,
"forks_count": 53,
"forks": 53,
- "watchers": 204,
+ "watchers": 206,
"score": 0
},
{
diff --git a/2019/CVE-2019-12815.json b/2019/CVE-2019-12815.json
index 197e6e9d70..a723ceb1c8 100644
--- a/2019/CVE-2019-12815.json
+++ b/2019/CVE-2019-12815.json
@@ -17,8 +17,8 @@
"pushed_at": "2019-09-24T02:06:40Z",
"stargazers_count": 2,
"watchers_count": 2,
- "forks_count": 5,
- "forks": 5,
+ "forks_count": 6,
+ "forks": 6,
"watchers": 2,
"score": 0
},
diff --git a/2019/CVE-2019-14287.json b/2019/CVE-2019-14287.json
index 655ad200f7..e632679588 100644
--- a/2019/CVE-2019-14287.json
+++ b/2019/CVE-2019-14287.json
@@ -504,5 +504,28 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 377824354,
+ "name": "CVE-2019-14287",
+ "full_name": "3hydraking\/CVE-2019-14287",
+ "owner": {
+ "login": "3hydraking",
+ "id": 66146701,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
+ "html_url": "https:\/\/github.com\/3hydraking"
+ },
+ "html_url": "https:\/\/github.com\/3hydraking\/CVE-2019-14287",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-06-17T12:33:08Z",
+ "updated_at": "2021-06-17T12:34:49Z",
+ "pushed_at": "2021-06-17T12:34:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index e5111f5176..a4858261fe 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-16T08:07:36Z",
+ "updated_at": "2021-06-17T09:50:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1067,
- "watchers_count": 1067,
- "forks_count": 236,
- "forks": 236,
- "watchers": 1067,
+ "stargazers_count": 1068,
+ "watchers_count": 1068,
+ "forks_count": 237,
+ "forks": 237,
+ "watchers": 1068,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json
index 7d51c56db0..cf6776419c 100644
--- a/2019/CVE-2019-5736.json
+++ b/2019/CVE-2019-5736.json
@@ -201,8 +201,8 @@
"pushed_at": "2020-06-22T13:04:55Z",
"stargazers_count": 58,
"watchers_count": 58,
- "forks_count": 20,
- "forks": 20,
+ "forks_count": 21,
+ "forks": 21,
"watchers": 58,
"score": 0
},
diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json
index b645fdbca3..39155e32f1 100644
--- a/2020/CVE-2020-0041.json
+++ b/2020/CVE-2020-0041.json
@@ -113,28 +113,5 @@
"forks": 0,
"watchers": 0,
"score": 0
- },
- {
- "id": 374646605,
- "name": "CVE_2020_0041",
- "full_name": "Byte-Master-101\/CVE_2020_0041",
- "owner": {
- "login": "Byte-Master-101",
- "id": 36032977,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36032977?v=4",
- "html_url": "https:\/\/github.com\/Byte-Master-101"
- },
- "html_url": "https:\/\/github.com\/Byte-Master-101\/CVE_2020_0041",
- "description": "My implementation for an exploit of the CVE-2020-0041 bug",
- "fork": false,
- "created_at": "2021-06-07T11:48:43Z",
- "updated_at": "2021-06-08T16:08:10Z",
- "pushed_at": "2021-06-08T16:08:07Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json
index fecd0a6dbd..ffaba46ca6 100644
--- a/2020/CVE-2020-0601.json
+++ b/2020/CVE-2020-0601.json
@@ -247,8 +247,8 @@
"pushed_at": "2020-02-24T18:41:10Z",
"stargazers_count": 62,
"watchers_count": 62,
- "forks_count": 16,
- "forks": 16,
+ "forks_count": 15,
+ "forks": 15,
"watchers": 62,
"score": 0
},
diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json
index 213b15810a..94f37d4f77 100644
--- a/2020/CVE-2020-0688.json
+++ b/2020/CVE-2020-0688.json
@@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
- "updated_at": "2021-06-04T08:13:51Z",
+ "updated_at": "2021-06-17T09:30:52Z",
"pushed_at": "2020-02-27T15:57:53Z",
- "stargazers_count": 137,
- "watchers_count": 137,
+ "stargazers_count": 138,
+ "watchers_count": 138,
"forks_count": 60,
"forks": 60,
- "watchers": 137,
+ "watchers": 138,
"score": 0
},
{
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index f19cb56421..02e267314e 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -868,8 +868,8 @@
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1124,
"watchers_count": 1124,
- "forks_count": 354,
- "forks": 354,
+ "forks_count": 353,
+ "forks": 353,
"watchers": 1124,
"score": 0
},
diff --git a/2020/CVE-2020-11932.json b/2020/CVE-2020-11932.json
index a688f7e7cb..f0b75e768c 100644
--- a/2020/CVE-2020-11932.json
+++ b/2020/CVE-2020-11932.json
@@ -13,13 +13,13 @@
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2020-05-10T15:25:59Z",
- "updated_at": "2021-06-16T03:01:27Z",
+ "updated_at": "2021-06-17T10:13:18Z",
"pushed_at": "2020-05-10T15:32:54Z",
- "stargazers_count": 81,
- "watchers_count": 81,
+ "stargazers_count": 82,
+ "watchers_count": 82,
"forks_count": 35,
"forks": 35,
- "watchers": 81,
+ "watchers": 82,
"score": 0
},
{
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 76f7bda73d..34d8d8894f 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
- "updated_at": "2021-06-17T03:18:30Z",
+ "updated_at": "2021-06-17T10:10:05Z",
"pushed_at": "2020-11-03T09:45:24Z",
- "stargazers_count": 801,
- "watchers_count": 801,
+ "stargazers_count": 802,
+ "watchers_count": 802,
"forks_count": 230,
"forks": 230,
- "watchers": 801,
+ "watchers": 802,
"score": 0
},
{
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index bdc34f2948..66103d7064 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -36,13 +36,13 @@
"description": "CVE-2020–14882、CVE-2020–14883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
- "updated_at": "2021-06-03T08:05:36Z",
+ "updated_at": "2021-06-17T09:38:56Z",
"pushed_at": "2020-11-16T04:23:09Z",
- "stargazers_count": 226,
- "watchers_count": 226,
+ "stargazers_count": 227,
+ "watchers_count": 227,
"forks_count": 46,
"forks": 46,
- "watchers": 226,
+ "watchers": 227,
"score": 0
},
{
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 5f7fc60c74..257839547a 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-16T08:07:36Z",
+ "updated_at": "2021-06-17T09:50:24Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1067,
- "watchers_count": 1067,
- "forks_count": 236,
- "forks": 236,
- "watchers": 1067,
+ "stargazers_count": 1068,
+ "watchers_count": 1068,
+ "forks_count": 237,
+ "forks": 237,
+ "watchers": 1068,
"score": 0
},
{
diff --git a/2020/CVE-2020-7961.json b/2020/CVE-2020-7961.json
index 5ce9d51726..af35aff502 100644
--- a/2020/CVE-2020-7961.json
+++ b/2020/CVE-2020-7961.json
@@ -59,13 +59,13 @@
"description": "Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)",
"fork": false,
"created_at": "2020-05-23T17:01:57Z",
- "updated_at": "2021-04-03T19:43:24Z",
+ "updated_at": "2021-06-17T10:58:15Z",
"pushed_at": "2020-04-03T19:23:54Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"forks_count": 0,
"forks": 0,
- "watchers": 3,
+ "watchers": 4,
"score": 0
},
{
diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json
index 577cff8aa7..5622453348 100644
--- a/2020/CVE-2020-8554.json
+++ b/2020/CVE-2020-8554.json
@@ -63,8 +63,8 @@
"pushed_at": "2020-12-22T16:04:01Z",
"stargazers_count": 1,
"watchers_count": 1,
- "forks_count": 0,
- "forks": 0,
+ "forks_count": 1,
+ "forks": 1,
"watchers": 1,
"score": 0
},
diff --git a/2020/CVE-2020-8558.json b/2020/CVE-2020-8558.json
index 641a990044..cdb3ae988d 100644
--- a/2020/CVE-2020-8558.json
+++ b/2020/CVE-2020-8558.json
@@ -17,8 +17,8 @@
"pushed_at": "2020-07-22T12:34:47Z",
"stargazers_count": 30,
"watchers_count": 30,
- "forks_count": 7,
- "forks": 7,
+ "forks_count": 6,
+ "forks": 6,
"watchers": 30,
"score": 0
},
diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json
index c82ad20f3b..74340526d2 100644
--- a/2021/CVE-2021-21123.json
+++ b/2021/CVE-2021-21123.json
@@ -13,13 +13,13 @@
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
- "updated_at": "2021-06-09T02:48:14Z",
+ "updated_at": "2021-06-17T13:59:18Z",
"pushed_at": "2021-03-22T18:24:20Z",
- "stargazers_count": 115,
- "watchers_count": 115,
+ "stargazers_count": 116,
+ "watchers_count": 116,
"forks_count": 19,
"forks": 19,
- "watchers": 115,
+ "watchers": 116,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
index 863550b165..16929765ea 100644
--- a/2021/CVE-2021-21985.json
+++ b/2021/CVE-2021-21985.json
@@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
- "updated_at": "2021-06-17T09:08:05Z",
+ "updated_at": "2021-06-17T14:40:10Z",
"pushed_at": "2021-06-03T21:29:39Z",
- "stargazers_count": 143,
- "watchers_count": 143,
- "forks_count": 37,
- "forks": 37,
- "watchers": 143,
+ "stargazers_count": 146,
+ "watchers_count": 146,
+ "forks_count": 38,
+ "forks": 38,
+ "watchers": 146,
"score": 0
},
{
diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json
index 0639a92f6b..8460e05a82 100644
--- a/2021/CVE-2021-31166.json
+++ b/2021/CVE-2021-31166.json
@@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
- "updated_at": "2021-06-16T17:03:54Z",
+ "updated_at": "2021-06-17T14:16:36Z",
"pushed_at": "2021-06-12T08:27:09Z",
- "stargazers_count": 736,
- "watchers_count": 736,
+ "stargazers_count": 737,
+ "watchers_count": 737,
"forks_count": 119,
"forks": 119,
- "watchers": 736,
+ "watchers": 737,
"score": 0
},
{
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index 438f42db67..370d5f2c7e 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -730,8 +730,8 @@
"pushed_at": "2021-05-29T10:48:54Z",
"stargazers_count": 22,
"watchers_count": 22,
- "forks_count": 6,
- "forks": 6,
+ "forks_count": 7,
+ "forks": 7,
"watchers": 22,
"score": 0
},
diff --git a/README.md b/README.md
index c7597f9bfc..ef90f01678 100644
--- a/README.md
+++ b/README.md
@@ -1411,7 +1411,6 @@ In binder_transaction of binder.c, there is a possible out of bounds write due t
- [minutesinch/CVE-2020-0041](https://github.com/minutesinch/CVE-2020-0041)
- [minutesinch/CVE-2020-0041-Original](https://github.com/minutesinch/CVE-2020-0041-Original)
- [TechnoHT/CVE-2020-0041](https://github.com/TechnoHT/CVE-2020-0041)
-- [Byte-Master-101/CVE_2020_0041](https://github.com/Byte-Master-101/CVE_2020_0041)
### CVE-2020-0069 (2020-03-10)
@@ -8323,6 +8322,7 @@ In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can
- [M108Falcon/Sudo-CVE-2019-14287](https://github.com/M108Falcon/Sudo-CVE-2019-14287)
- [edsonjt81/CVE-2019-14287-](https://github.com/edsonjt81/CVE-2019-14287-)
- [DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights](https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights)
+- [3hydraking/CVE-2019-14287](https://github.com/3hydraking/CVE-2019-14287)
### CVE-2019-14314 (2019-08-27)
@@ -14412,6 +14412,14 @@ Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L
- [badnack/d_link_880_bug](https://github.com/badnack/d_link_880_bug)
+### CVE-2017-14980 (2017-10-09)
+
+
+Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
+
+
+- [bmdyy/CVE-2017-14980](https://github.com/bmdyy/CVE-2017-14980)
+
### CVE-2017-15120 (2018-07-27)