diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 644d4664c2..7341738305 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1709,12 +1709,12 @@ "pushed_at": "2019-09-03T20:50:28Z", "stargazers_count": 1089, "watchers_count": 1089, - "forks_count": 358, + "forks_count": 357, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 358, + "forks": 357, "watchers": 1089, "score": 0 }, diff --git a/2019/CVE-2019-11708.json b/2019/CVE-2019-11708.json index 43454d0395..d3c923f3f2 100644 --- a/2019/CVE-2019-11708.json +++ b/2019/CVE-2019-11708.json @@ -13,10 +13,10 @@ "description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.", "fork": false, "created_at": "2019-09-29T07:08:52Z", - "updated_at": "2021-11-08T13:04:45Z", + "updated_at": "2021-11-09T21:53:19Z", "pushed_at": "2020-06-13T17:40:14Z", - "stargazers_count": 596, - "watchers_count": 596, + "stargazers_count": 597, + "watchers_count": 597, "forks_count": 83, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 83, - "watchers": 596, + "watchers": 597, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2555.json b/2020/CVE-2020-2555.json index 60ee52f79f..8f8809067f 100644 --- a/2020/CVE-2020-2555.json +++ b/2020/CVE-2020-2555.json @@ -40,17 +40,17 @@ "description": "CVE-2020-2555 Python POC", "fork": false, "created_at": "2020-03-06T16:02:59Z", - "updated_at": "2021-08-04T22:31:39Z", + "updated_at": "2021-11-09T20:01:29Z", "pushed_at": "2020-04-16T12:04:18Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "forks_count": 24, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 24, - "watchers": 48, + "watchers": 49, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 721b28cd47..d2e749c798 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -279,5 +279,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 426353517, + "name": "CVE-2021-21985_PoC", + "full_name": "sknux\/CVE-2021-21985_PoC", + "owner": { + "login": "sknux", + "id": 45546882, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45546882?v=4", + "html_url": "https:\/\/github.com\/sknux" + }, + "html_url": "https:\/\/github.com\/sknux\/CVE-2021-21985_PoC", + "description": "VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985) ", + "fork": false, + "created_at": "2021-11-09T19:06:29Z", + "updated_at": "2021-11-09T23:06:09Z", + "pushed_at": "2021-11-09T19:14:55Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 95f368d357..2db0a10560 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-06-05T15:42:16Z", - "updated_at": "2021-11-06T20:57:13Z", + "updated_at": "2021-11-09T20:48:25Z", "pushed_at": "2021-11-02T14:45:24Z", - "stargazers_count": 155, - "watchers_count": 155, + "stargazers_count": 156, + "watchers_count": 156, "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 33, - "watchers": 155, + "watchers": 156, "score": 0 }, { @@ -422,16 +422,43 @@ "description": "Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution", "fork": false, "created_at": "2021-11-05T16:56:06Z", - "updated_at": "2021-11-05T17:05:31Z", + "updated_at": "2021-11-09T20:47:08Z", "pushed_at": "2021-11-05T17:05:29Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 426338911, + "name": "GitLab-CVE-2021-22205-scanner", + "full_name": "faisalfs10x\/GitLab-CVE-2021-22205-scanner", + "owner": { + "login": "faisalfs10x", + "id": 51811615, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4", + "html_url": "https:\/\/github.com\/faisalfs10x" + }, + "html_url": "https:\/\/github.com\/faisalfs10x\/GitLab-CVE-2021-22205-scanner", + "description": null, + "fork": false, + "created_at": "2021-11-09T18:19:43Z", + "updated_at": "2021-11-09T19:09:52Z", + "pushed_at": "2021-11-09T19:09:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, "watchers": 0, "score": 0 } diff --git a/2021/CVE-2021-22911.json b/2021/CVE-2021-22911.json index e9d69168a6..5a0db59a84 100644 --- a/2021/CVE-2021-22911.json +++ b/2021/CVE-2021-22911.json @@ -13,17 +13,17 @@ "description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1", "fork": false, "created_at": "2021-06-05T15:05:01Z", - "updated_at": "2021-09-20T07:58:32Z", + "updated_at": "2021-11-09T20:59:58Z", "pushed_at": "2021-09-20T07:58:29Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 31, + "watchers": 32, "score": 0 }, { diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index d81e0aeaba..b48d5ae9df 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", "fork": false, "created_at": "2021-05-31T18:02:39Z", - "updated_at": "2021-11-04T10:05:33Z", + "updated_at": "2021-11-09T18:24:47Z", "pushed_at": "2021-06-01T15:08:23Z", - "stargazers_count": 198, - "watchers_count": 198, + "stargazers_count": 199, + "watchers_count": 199, "forks_count": 33, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 33, - "watchers": 198, + "watchers": 199, "score": 0 }, { @@ -48,17 +48,17 @@ "description": null, "fork": false, "created_at": "2021-06-02T14:50:56Z", - "updated_at": "2021-09-15T03:45:37Z", + "updated_at": "2021-11-09T18:21:53Z", "pushed_at": "2021-06-02T14:54:14Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0 }, { diff --git a/2021/CVE-2021-28663.json b/2021/CVE-2021-28663.json index 007690b9ea..0ed407d73d 100644 --- a/2021/CVE-2021-28663.json +++ b/2021/CVE-2021-28663.json @@ -13,17 +13,17 @@ "description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)", "fork": false, "created_at": "2021-09-01T22:59:29Z", - "updated_at": "2021-11-01T16:02:57Z", + "updated_at": "2021-11-09T20:51:09Z", "pushed_at": "2021-09-03T10:24:34Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 62, + "watchers_count": 62, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 13, - "watchers": 63, + "watchers": 62, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index f2d01bdc34..bca6f11efd 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -121,10 +121,10 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-27T10:16:35Z", - "updated_at": "2021-11-04T11:04:39Z", + "updated_at": "2021-11-09T19:17:03Z", "pushed_at": "2021-03-07T04:39:58Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 10, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 28, + "watchers": 29, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index f6dfc3de71..37399806c8 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -229,17 +229,17 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2021-11-09T13:46:54Z", + "updated_at": "2021-11-09T18:16:32Z", "pushed_at": "2021-09-11T09:50:26Z", - "stargazers_count": 1293, - "watchers_count": 1293, + "stargazers_count": 1294, + "watchers_count": 1294, "forks_count": 417, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 417, - "watchers": 1293, + "watchers": 1294, "score": 0 }, { diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 9d6f21de6b..2ecef1833b 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2021-10-16T16:17:44Z", - "updated_at": "2021-11-08T09:48:11Z", + "updated_at": "2021-11-09T22:11:59Z", "pushed_at": "2021-10-24T21:01:29Z", - "stargazers_count": 315, - "watchers_count": 315, + "stargazers_count": 316, + "watchers_count": 316, "forks_count": 71, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 71, - "watchers": 315, + "watchers": 316, "score": 0 }, { diff --git a/2021/CVE-2021-42574.json b/2021/CVE-2021-42574.json index 188051d115..9e4cb818b2 100644 --- a/2021/CVE-2021-42574.json +++ b/2021/CVE-2021-42574.json @@ -94,17 +94,24 @@ "description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ", "fork": false, "created_at": "2021-11-06T22:12:35Z", - "updated_at": "2021-11-07T00:43:47Z", - "pushed_at": "2021-11-07T00:43:44Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2021-11-09T22:52:02Z", + "pushed_at": "2021-11-09T21:52:58Z", + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, - "topics": [], + "topics": [ + "cve-2021-42574", + "docker", + "rust", + "security", + "supply-chain-attacks", + "unicode-characters" + ], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index afe95fd3ac..90f3df7fb6 100644 --- a/README.md +++ b/README.md @@ -788,6 +788,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to - [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC) - [haiclover/CVE-2021-21985](https://github.com/haiclover/CVE-2021-21985) - [aristosMiliaressis/CVE-2021-21985](https://github.com/aristosMiliaressis/CVE-2021-21985) +- [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC) ### CVE-2021-22005 (2021-09-23) @@ -890,6 +891,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro - [hh-hunter/cve-2021-22205](https://github.com/hh-hunter/cve-2021-22205) - [X1pe0/Automated-Gitlab-RCE](https://github.com/X1pe0/Automated-Gitlab-RCE) - [runsel/GitLab-CVE-2021-22205-](https://github.com/runsel/GitLab-CVE-2021-22205-) +- [faisalfs10x/GitLab-CVE-2021-22205-scanner](https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner) ### CVE-2021-22214 (2021-06-08)