diff --git a/2015/CVE-2015-1579.json b/2015/CVE-2015-1579.json
index bba437ea18..6f0e3475e5 100644
--- a/2015/CVE-2015-1579.json
+++ b/2015/CVE-2015-1579.json
@@ -17,8 +17,8 @@
"pushed_at": "2018-05-21T21:20:54Z",
"stargazers_count": 23,
"watchers_count": 23,
- "forks_count": 16,
- "forks": 16,
+ "forks_count": 17,
+ "forks": 17,
"watchers": 23,
"score": 0
},
diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json
index c6f5566386..810ecbdef1 100644
--- a/2017/CVE-2017-0785.json
+++ b/2017/CVE-2017-0785.json
@@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
- "updated_at": "2021-05-02T00:17:47Z",
+ "updated_at": "2021-05-26T07:13:50Z",
"pushed_at": "2017-09-23T05:11:45Z",
- "stargazers_count": 428,
- "watchers_count": 428,
+ "stargazers_count": 429,
+ "watchers_count": 429,
"forks_count": 187,
"forks": 187,
- "watchers": 428,
+ "watchers": 429,
"score": 0
},
{
diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json
index b1f8716500..be3615e80c 100644
--- a/2017/CVE-2017-11882.json
+++ b/2017/CVE-2017-11882.json
@@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
- "updated_at": "2021-05-14T09:34:30Z",
+ "updated_at": "2021-05-26T06:25:29Z",
"pushed_at": "2017-11-29T03:33:53Z",
- "stargazers_count": 492,
- "watchers_count": 492,
+ "stargazers_count": 493,
+ "watchers_count": 493,
"forks_count": 247,
"forks": 247,
- "watchers": 492,
+ "watchers": 493,
"score": 0
},
{
diff --git a/2017/CVE-2017-9841.json b/2017/CVE-2017-9841.json
index 78b2ca1f03..773710a5e1 100644
--- a/2017/CVE-2017-9841.json
+++ b/2017/CVE-2017-9841.json
@@ -40,8 +40,8 @@
"pushed_at": "2020-11-17T17:58:39Z",
"stargazers_count": 19,
"watchers_count": 19,
- "forks_count": 15,
- "forks": 15,
+ "forks_count": 16,
+ "forks": 16,
"watchers": 19,
"score": 0
},
diff --git a/2018/CVE-2018-19423.json b/2018/CVE-2018-19423.json
deleted file mode 100644
index 3ab0af31d4..0000000000
--- a/2018/CVE-2018-19423.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
- {
- "id": 370766722,
- "name": "CVE-2018-19423-Exploit",
- "full_name": "Hacker5preme\/CVE-2018-19423-Exploit",
- "owner": {
- "login": "Hacker5preme",
- "id": 54862244,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54862244?v=4",
- "html_url": "https:\/\/github.com\/Hacker5preme"
- },
- "html_url": "https:\/\/github.com\/Hacker5preme\/CVE-2018-19423-Exploit",
- "description": "Authenticated RCE in Codiad 2.8.4",
- "fork": false,
- "created_at": "2021-05-25T16:55:17Z",
- "updated_at": "2021-05-25T21:44:42Z",
- "pushed_at": "2021-05-25T17:21:41Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json
index 92adf2e5df..68f9b0ba6f 100644
--- a/2018/CVE-2018-6389.json
+++ b/2018/CVE-2018-6389.json
@@ -293,8 +293,8 @@
"pushed_at": "2020-10-01T11:51:46Z",
"stargazers_count": 85,
"watchers_count": 85,
- "forks_count": 59,
- "forks": 59,
+ "forks_count": 60,
+ "forks": 60,
"watchers": 85,
"score": 0
},
diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json
index 3f5b0cb90b..3a8ecba204 100644
--- a/2019/CVE-2019-0232.json
+++ b/2019/CVE-2019-0232.json
@@ -13,13 +13,13 @@
"description": "Apache Tomcat Remote Code Execution on Windows",
"fork": false,
"created_at": "2019-04-15T07:54:25Z",
- "updated_at": "2021-05-14T10:10:33Z",
+ "updated_at": "2021-05-26T04:02:32Z",
"pushed_at": "2019-11-27T07:39:40Z",
- "stargazers_count": 181,
- "watchers_count": 181,
+ "stargazers_count": 182,
+ "watchers_count": 182,
"forks_count": 54,
"forks": 54,
- "watchers": 181,
+ "watchers": 182,
"score": 0
},
{
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index eff3c3a3bc..439d499457 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -316,8 +316,8 @@
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 352,
"watchers_count": 352,
- "forks_count": 190,
- "forks": 190,
+ "forks_count": 189,
+ "forks": 189,
"watchers": 352,
"score": 0
},
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index 1658dee34c..7908f65464 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
- "updated_at": "2021-05-25T14:19:03Z",
+ "updated_at": "2021-05-26T06:59:57Z",
"pushed_at": "2019-11-12T18:53:14Z",
- "stargazers_count": 1656,
- "watchers_count": 1656,
+ "stargazers_count": 1657,
+ "watchers_count": 1657,
"forks_count": 251,
"forks": 251,
- "watchers": 1656,
+ "watchers": 1657,
"score": 0
},
{
diff --git a/2019/CVE-2019-19208.json b/2019/CVE-2019-19208.json
index fd300d56e9..53c1ba3cdc 100644
--- a/2019/CVE-2019-19208.json
+++ b/2019/CVE-2019-19208.json
@@ -13,8 +13,8 @@
"description": "Codiad Remote Code Execution",
"fork": false,
"created_at": "2021-05-13T13:57:07Z",
- "updated_at": "2021-05-24T11:22:44Z",
- "pushed_at": "2021-05-23T12:45:43Z",
+ "updated_at": "2021-05-26T07:05:51Z",
+ "pushed_at": "2021-05-26T07:05:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json
index 3d9a1320e5..ca2fe6b0de 100644
--- a/2019/CVE-2019-3396.json
+++ b/2019/CVE-2019-3396.json
@@ -105,13 +105,13 @@
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
"fork": false,
"created_at": "2019-04-10T02:22:24Z",
- "updated_at": "2021-05-12T05:40:51Z",
+ "updated_at": "2021-05-26T06:27:02Z",
"pushed_at": "2019-11-01T14:33:21Z",
- "stargazers_count": 122,
- "watchers_count": 122,
+ "stargazers_count": 123,
+ "watchers_count": 123,
"forks_count": 58,
"forks": 58,
- "watchers": 122,
+ "watchers": 123,
"score": 0
},
{
diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json
index c79c3876f3..f15ff34e7c 100644
--- a/2019/CVE-2019-7304.json
+++ b/2019/CVE-2019-7304.json
@@ -17,8 +17,8 @@
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 571,
"watchers_count": 571,
- "forks_count": 133,
- "forks": 133,
+ "forks_count": 134,
+ "forks": 134,
"watchers": 571,
"score": 0
},
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 4cb1d6e575..08c2eb2282 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -40,8 +40,8 @@
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1284,
"watchers_count": 1284,
- "forks_count": 294,
- "forks": 294,
+ "forks_count": 293,
+ "forks": 293,
"watchers": 1284,
"score": 0
},
@@ -155,8 +155,8 @@
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 148,
"watchers_count": 148,
- "forks_count": 36,
- "forks": 36,
+ "forks_count": 35,
+ "forks": 35,
"watchers": 148,
"score": 0
},
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 52ec4241b8..13361e0815 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -592,8 +592,8 @@
"pushed_at": "2021-05-08T09:41:31Z",
"stargazers_count": 11,
"watchers_count": 11,
- "forks_count": 1,
- "forks": 1,
+ "forks_count": 2,
+ "forks": 2,
"watchers": 11,
"score": 0
},
diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json
index 54903669e7..587757e9bc 100644
--- a/2020/CVE-2020-14883.json
+++ b/2020/CVE-2020-14883.json
@@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
- "updated_at": "2021-05-26T02:32:29Z",
+ "updated_at": "2021-05-26T07:08:44Z",
"pushed_at": "2021-04-26T02:30:11Z",
- "stargazers_count": 767,
- "watchers_count": 767,
+ "stargazers_count": 769,
+ "watchers_count": 769,
"forks_count": 241,
"forks": 241,
- "watchers": 767,
+ "watchers": 769,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-17530.json b/2020/CVE-2020-17530.json
index e74d43eac1..3db7769ae0 100644
--- a/2020/CVE-2020-17530.json
+++ b/2020/CVE-2020-17530.json
@@ -36,13 +36,13 @@
"description": "S2-061 的payload,以及对应简单的PoC\/Exp",
"fork": false,
"created_at": "2020-12-10T17:42:37Z",
- "updated_at": "2021-03-07T11:43:01Z",
+ "updated_at": "2021-05-26T07:36:39Z",
"pushed_at": "2020-12-18T00:57:50Z",
- "stargazers_count": 40,
- "watchers_count": 40,
+ "stargazers_count": 41,
+ "watchers_count": 41,
"forks_count": 19,
"forks": 19,
- "watchers": 40,
+ "watchers": 41,
"score": 0
},
{
diff --git a/2020/CVE-2020-29607.json b/2020/CVE-2020-29607.json
deleted file mode 100644
index b4fb36910d..0000000000
--- a/2020/CVE-2020-29607.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
- {
- "id": 370835991,
- "name": "CVE-2020-29607-exploit",
- "full_name": "Hacker5preme\/CVE-2020-29607-exploit",
- "owner": {
- "login": "Hacker5preme",
- "id": 54862244,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54862244?v=4",
- "html_url": "https:\/\/github.com\/Hacker5preme"
- },
- "html_url": "https:\/\/github.com\/Hacker5preme\/CVE-2020-29607-exploit",
- "description": "Exploit coming soon",
- "fork": false,
- "created_at": "2021-05-25T21:48:04Z",
- "updated_at": "2021-05-25T21:48:07Z",
- "pushed_at": "2021-05-25T21:48:05Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2020/CVE-2020-7661.json b/2020/CVE-2020-7661.json
index 63682911e3..88ce533dcd 100644
--- a/2020/CVE-2020-7661.json
+++ b/2020/CVE-2020-7661.json
@@ -13,13 +13,13 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
- "updated_at": "2021-05-21T07:38:32Z",
+ "updated_at": "2021-05-26T06:49:29Z",
"pushed_at": "2021-02-15T04:14:12Z",
- "stargazers_count": 31,
- "watchers_count": 31,
+ "stargazers_count": 32,
+ "watchers_count": 32,
"forks_count": 5,
"forks": 5,
- "watchers": 31,
+ "watchers": 32,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json
index 6b71138166..3f1e6fb015 100644
--- a/2021/CVE-2021-21551.json
+++ b/2021/CVE-2021-21551.json
@@ -13,13 +13,13 @@
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
- "updated_at": "2021-05-24T08:18:02Z",
+ "updated_at": "2021-05-26T07:55:52Z",
"pushed_at": "2021-05-20T20:33:09Z",
- "stargazers_count": 196,
- "watchers_count": 196,
- "forks_count": 31,
- "forks": 31,
- "watchers": 196,
+ "stargazers_count": 197,
+ "watchers_count": 197,
+ "forks_count": 32,
+ "forks": 32,
+ "watchers": 197,
"score": 0
},
{
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index c964b46c0b..0d6a3746af 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -109,8 +109,8 @@
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 111,
"watchers_count": 111,
- "forks_count": 40,
- "forks": 40,
+ "forks_count": 41,
+ "forks": 41,
"watchers": 111,
"score": 0
},
diff --git a/2021/CVE-2021-22893.json b/2021/CVE-2021-22893.json
index f1b22dacf3..c943f405c1 100644
--- a/2021/CVE-2021-22893.json
+++ b/2021/CVE-2021-22893.json
@@ -44,28 +44,5 @@
"forks": 4,
"watchers": 3,
"score": 0
- },
- {
- "id": 370613273,
- "name": "cve-2021-22893",
- "full_name": "r90tpass\/cve-2021-22893",
- "owner": {
- "login": "r90tpass",
- "id": 82740056,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
- "html_url": "https:\/\/github.com\/r90tpass"
- },
- "html_url": "https:\/\/github.com\/r90tpass\/cve-2021-22893",
- "description": "22893 poc",
- "fork": false,
- "created_at": "2021-05-25T08:04:43Z",
- "updated_at": "2021-05-25T08:04:43Z",
- "pushed_at": "2021-05-25T08:04:44Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json
index 6a88145113..e9cff2840a 100644
--- a/2021/CVE-2021-25646.json
+++ b/2021/CVE-2021-25646.json
@@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
- "updated_at": "2021-05-26T02:32:29Z",
+ "updated_at": "2021-05-26T07:08:44Z",
"pushed_at": "2021-04-26T02:30:11Z",
- "stargazers_count": 767,
- "watchers_count": 767,
+ "stargazers_count": 769,
+ "watchers_count": 769,
"forks_count": 241,
"forks": 241,
- "watchers": 767,
+ "watchers": 769,
"score": 0
},
{
diff --git a/2021/CVE-2021-26121.json b/2021/CVE-2021-26121.json
index ec6781f1fa..504c9ae6ca 100644
--- a/2021/CVE-2021-26121.json
+++ b/2021/CVE-2021-26121.json
@@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-12T18:53:37Z",
- "updated_at": "2021-04-30T15:45:05Z",
+ "updated_at": "2021-05-26T08:52:35Z",
"pushed_at": "2021-04-30T15:45:02Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"forks_count": 5,
"forks": 5,
- "watchers": 11,
+ "watchers": 12,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-28482.json b/2021/CVE-2021-28482.json
index 3436443a2a..53f4445950 100644
--- a/2021/CVE-2021-28482.json
+++ b/2021/CVE-2021-28482.json
@@ -17,8 +17,8 @@
"pushed_at": "2021-05-03T14:29:49Z",
"stargazers_count": 35,
"watchers_count": 35,
- "forks_count": 15,
- "forks": 15,
+ "forks_count": 16,
+ "forks": 16,
"watchers": 35,
"score": 0
},
diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json
index 7c4872d796..b700c88193 100644
--- a/2021/CVE-2021-31166.json
+++ b/2021/CVE-2021-31166.json
@@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
- "updated_at": "2021-05-26T03:02:05Z",
+ "updated_at": "2021-05-26T08:39:24Z",
"pushed_at": "2021-05-21T23:58:50Z",
- "stargazers_count": 699,
- "watchers_count": 699,
+ "stargazers_count": 703,
+ "watchers_count": 703,
"forks_count": 109,
"forks": 109,
- "watchers": 699,
+ "watchers": 703,
"score": 0
},
{
diff --git a/2021/CVE-2021-3222222.json b/2021/CVE-2021-3222222.json
deleted file mode 100644
index af22bad56b..0000000000
--- a/2021/CVE-2021-3222222.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
- {
- "id": 370592630,
- "name": "CVE-2021-3222222",
- "full_name": "r90tpass\/CVE-2021-3222222",
- "owner": {
- "login": "r90tpass",
- "id": 82740056,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
- "html_url": "https:\/\/github.com\/r90tpass"
- },
- "html_url": "https:\/\/github.com\/r90tpass\/CVE-2021-3222222",
- "description": "RCE",
- "fork": false,
- "created_at": "2021-05-25T06:46:52Z",
- "updated_at": "2021-05-25T06:46:52Z",
- "pushed_at": "2021-05-25T06:46:53Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2021/CVE-2021-8989898.json b/2021/CVE-2021-8989898.json
deleted file mode 100644
index ff40830ca9..0000000000
--- a/2021/CVE-2021-8989898.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
- {
- "id": 370610425,
- "name": "CVE-2021-8989898",
- "full_name": "r90tpass\/CVE-2021-8989898",
- "owner": {
- "login": "r90tpass",
- "id": 82740056,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
- "html_url": "https:\/\/github.com\/r90tpass"
- },
- "html_url": "https:\/\/github.com\/r90tpass\/CVE-2021-8989898",
- "description": "RCE",
- "fork": false,
- "created_at": "2021-05-25T07:53:47Z",
- "updated_at": "2021-05-25T07:53:47Z",
- "pushed_at": "2021-05-25T07:53:47Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
- "watchers": 0,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/README.md b/README.md
index 1cb6935335..cd92cdc635 100644
--- a/README.md
+++ b/README.md
@@ -543,7 +543,6 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b
- [ZephrFish/CVE-2021-22893](https://github.com/ZephrFish/CVE-2021-22893)
- [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893)
-- [r90tpass/cve-2021-22893](https://github.com/r90tpass/cve-2021-22893)
### CVE-2021-22986 (2021-03-31)
@@ -1166,12 +1165,6 @@ Insufficient input validation in the Marvin Minsky 1967 implementation of the Un
### CVE-2021-33558
- [mdanzaruddin/CVE-2021-33558.](https://github.com/mdanzaruddin/CVE-2021-33558.)
-### CVE-2021-3222222
-- [r90tpass/CVE-2021-3222222](https://github.com/r90tpass/CVE-2021-3222222)
-
-### CVE-2021-8989898
-- [r90tpass/CVE-2021-8989898](https://github.com/r90tpass/CVE-2021-8989898)
-
## 2020
### CVE-2020-0001 (2020-01-08)
@@ -5233,14 +5226,6 @@ Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyf
- [ruppde/scan_CVE-2020-29583](https://github.com/ruppde/scan_CVE-2020-29583)
-### CVE-2020-29607 (2020-12-16)
-
-
-A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
-
-
-- [Hacker5preme/CVE-2020-29607-exploit](https://github.com/Hacker5preme/CVE-2020-29607-exploit)
-
### CVE-2020-29666 (2020-12-10)
@@ -11988,14 +11973,6 @@ The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRA
- [ASkyeye/CVE-2018-19320](https://github.com/ASkyeye/CVE-2018-19320)
- [a00x90/CVE-2018-19320](https://github.com/a00x90/CVE-2018-19320)
-### CVE-2018-19423 (2018-11-21)
-
-
-Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file.
-
-
-- [Hacker5preme/CVE-2018-19423-Exploit](https://github.com/Hacker5preme/CVE-2018-19423-Exploit)
-
### CVE-2018-19466 (2019-03-27)