diff --git a/2013/CVE-2013-5211.json b/2013/CVE-2013-5211.json index bd49eb676b..07eec05aca 100644 --- a/2013/CVE-2013-5211.json +++ b/2013/CVE-2013-5211.json @@ -71,7 +71,7 @@ "pushed_at": "2019-10-04T19:03:50Z", "stargazers_count": 7, "watchers_count": 7, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [ @@ -86,7 +86,7 @@ "spoofed-packets" ], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 7, "score": 0 } diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 47c7e31659..bff7aed63b 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -44,7 +44,7 @@ "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1194, "watchers_count": 1194, - "forks_count": 264, + "forks_count": 265, "allow_forking": true, "is_template": false, "topics": [ @@ -70,7 +70,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 264, + "forks": 265, "watchers": 1194, "score": 0 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index f642186a46..a0e854c2e1 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -17,7 +17,7 @@ "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1194, "watchers_count": 1194, - "forks_count": 264, + "forks_count": 265, "allow_forking": true, "is_template": false, "topics": [ @@ -43,7 +43,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 264, + "forks": 265, "watchers": 1194, "score": 0 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 7b7506eb19..518f39a61d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -44,7 +44,7 @@ "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1194, "watchers_count": 1194, - "forks_count": 264, + "forks_count": 265, "allow_forking": true, "is_template": false, "topics": [ @@ -70,7 +70,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 264, + "forks": 265, "watchers": 1194, "score": 0 }, diff --git a/2018/CVE-2018-16341.json b/2018/CVE-2018-16341.json index 25bd6f2d10..fda3de0137 100644 --- a/2018/CVE-2018-16341.json +++ b/2018/CVE-2018-16341.json @@ -17,7 +17,7 @@ "pushed_at": "2019-06-05T18:43:28Z", "stargazers_count": 13, "watchers_count": 13, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [ @@ -25,7 +25,7 @@ "ssti" ], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 13, "score": 0 } diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index a5a18d11fd..b01e831965 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -534,7 +534,7 @@ "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1194, "watchers_count": 1194, - "forks_count": 264, + "forks_count": 265, "allow_forking": true, "is_template": false, "topics": [ @@ -560,7 +560,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 264, + "forks": 265, "watchers": 1194, "score": 0 }, diff --git a/2018/CVE-2018-4280.json b/2018/CVE-2018-4280.json index f787c0de9e..f7494add0b 100644 --- a/2018/CVE-2018-4280.json +++ b/2018/CVE-2018-4280.json @@ -40,17 +40,17 @@ "description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.", "fork": false, "created_at": "2018-02-23T00:19:05Z", - "updated_at": "2021-08-30T04:55:35Z", + "updated_at": "2021-10-11T16:01:26Z", "pushed_at": "2018-11-13T00:26:18Z", - "stargazers_count": 231, - "watchers_count": 231, + "stargazers_count": 230, + "watchers_count": 230, "forks_count": 43, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 43, - "watchers": 231, + "watchers": 230, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 9559d4a7fe..92e625cb97 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,10 +40,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-10-11T08:29:50Z", + "updated_at": "2021-10-11T16:18:22Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2916, - "watchers_count": 2916, + "stargazers_count": 2917, + "watchers_count": 2917, "forks_count": 856, "allow_forking": true, "is_template": false, @@ -70,7 +70,7 @@ ], "visibility": "public", "forks": 856, - "watchers": 2916, + "watchers": 2917, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 99373576ce..0d9031f985 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -179,7 +179,7 @@ "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1194, "watchers_count": 1194, - "forks_count": 264, + "forks_count": 265, "allow_forking": true, "is_template": false, "topics": [ @@ -205,7 +205,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 264, + "forks": 265, "watchers": 1194, "score": 0 } diff --git a/2019/CVE-2019-8942.json b/2019/CVE-2019-8942.json index 4dcf6894e6..492766845c 100644 --- a/2019/CVE-2019-8942.json +++ b/2019/CVE-2019-8942.json @@ -13,11 +13,11 @@ "description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.", "fork": false, "created_at": "2019-02-25T06:38:15Z", - "updated_at": "2021-09-29T16:24:56Z", + "updated_at": "2021-10-11T17:57:11Z", "pushed_at": "2019-03-18T01:20:52Z", - "stargazers_count": 62, - "watchers_count": 62, - "forks_count": 20, + "stargazers_count": 63, + "watchers_count": 63, + "forks_count": 21, "allow_forking": true, "is_template": false, "topics": [ @@ -25,8 +25,8 @@ "cve-2019-8943" ], "visibility": "public", - "forks": 20, - "watchers": 62, + "forks": 21, + "watchers": 63, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index f8a305fb87..1653aacf60 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -44,12 +44,12 @@ "pushed_at": "2020-10-21T12:10:28Z", "stargazers_count": 1356, "watchers_count": 1356, - "forks_count": 310, + "forks_count": 309, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 310, + "forks": 309, "watchers": 1356, "score": 0 }, @@ -94,17 +94,17 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2021-10-11T00:42:43Z", + "updated_at": "2021-10-11T19:11:37Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 867, - "watchers_count": 867, + "stargazers_count": 868, + "watchers_count": 868, "forks_count": 237, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 237, - "watchers": 867, + "watchers": 868, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 86c166afd9..d0749d2562 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-10-11T08:29:50Z", + "updated_at": "2021-10-11T16:18:22Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2916, - "watchers_count": 2916, + "stargazers_count": 2917, + "watchers_count": 2917, "forks_count": 856, "allow_forking": true, "is_template": false, @@ -43,7 +43,7 @@ ], "visibility": "public", "forks": 856, - "watchers": 2916, + "watchers": 2917, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 98d0cdfa7e..e916f47159 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -121,10 +121,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-10-11T08:19:00Z", + "updated_at": "2021-10-11T16:39:06Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 860, - "watchers_count": 860, + "stargazers_count": 861, + "watchers_count": 861, "forks_count": 272, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 272, - "watchers": 860, + "watchers": 861, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index bd8810a519..f8e0320d58 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -13,10 +13,10 @@ "description": "CVE-2020-15368", "fork": false, "created_at": "2021-06-29T04:38:24Z", - "updated_at": "2021-10-11T02:01:08Z", + "updated_at": "2021-10-11T18:09:27Z", "pushed_at": "2021-10-11T01:30:56Z", - "stargazers_count": 293, - "watchers_count": 293, + "stargazers_count": 294, + "watchers_count": 294, "forks_count": 30, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 30, - "watchers": 293, + "watchers": 294, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 517ed9f527..c45ea2204e 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -17,7 +17,7 @@ "pushed_at": "2020-11-27T15:10:58Z", "stargazers_count": 1194, "watchers_count": 1194, - "forks_count": 264, + "forks_count": 265, "allow_forking": true, "is_template": false, "topics": [ @@ -43,7 +43,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 264, + "forks": 265, "watchers": 1194, "score": 0 }, diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json index e484614d43..2ea0d3ba58 100644 --- a/2020/CVE-2020-8554.json +++ b/2020/CVE-2020-8554.json @@ -13,8 +13,8 @@ "description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs", "fork": false, "created_at": "2020-12-01T16:58:39Z", - "updated_at": "2021-07-14T03:13:56Z", - "pushed_at": "2021-10-05T19:51:13Z", + "updated_at": "2021-10-11T17:20:02Z", + "pushed_at": "2021-10-11T17:19:59Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 3121faa0bb..136f60678c 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -40,7 +40,7 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2021-10-11T14:11:20Z", + "updated_at": "2021-10-11T20:43:52Z", "pushed_at": "2021-07-20T15:28:13Z", "stargazers_count": 1409, "watchers_count": 1409, @@ -220,17 +220,17 @@ "description": null, "fork": false, "created_at": "2021-07-01T13:58:01Z", - "updated_at": "2021-08-25T16:32:47Z", + "updated_at": "2021-10-11T20:43:35Z", "pushed_at": "2021-07-01T14:26:05Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, - "watchers": 13, + "watchers": 14, "score": 0 }, { @@ -274,17 +274,17 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-10-11T14:50:27Z", + "updated_at": "2021-10-11T18:13:55Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 652, - "watchers_count": 652, + "stargazers_count": 653, + "watchers_count": 653, "forks_count": 173, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 173, - "watchers": 652, + "watchers": 653, "score": 0 }, { @@ -301,10 +301,10 @@ "description": "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare", "fork": false, "created_at": "2021-07-02T01:45:00Z", - "updated_at": "2021-09-11T06:40:24Z", + "updated_at": "2021-10-11T20:43:16Z", "pushed_at": "2021-07-02T01:52:46Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -317,7 +317,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index a9c73c09e8..d7353d522c 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -98,7 +98,7 @@ "pushed_at": "2021-06-06T08:11:22Z", "stargazers_count": 10, "watchers_count": 10, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -118,7 +118,7 @@ "windows" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 10, "score": 0 }, diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index 8e1470b540..bb44cd5c04 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -121,17 +121,17 @@ "description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE", "fork": false, "created_at": "2021-09-25T16:21:56Z", - "updated_at": "2021-10-11T09:28:58Z", + "updated_at": "2021-10-11T18:23:26Z", "pushed_at": "2021-10-02T03:17:45Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "forks_count": 27, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 27, - "watchers": 99, + "watchers": 100, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 2f18f8588f..44e917672b 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -121,10 +121,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-10-11T08:19:00Z", + "updated_at": "2021-10-11T16:39:06Z", "pushed_at": "2021-07-30T03:28:00Z", - "stargazers_count": 860, - "watchers_count": 860, + "stargazers_count": 861, + "watchers_count": 861, "forks_count": 272, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 272, - "watchers": 860, + "watchers": 861, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 65b0ee40e8..3943540077 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -765,17 +765,17 @@ "description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.", "fork": false, "created_at": "2021-03-16T07:31:25Z", - "updated_at": "2021-10-03T16:14:33Z", + "updated_at": "2021-10-11T17:35:55Z", "pushed_at": "2021-05-01T17:20:15Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 16, + "watchers": 17, "score": 0 }, { @@ -908,7 +908,7 @@ "pushed_at": "2021-03-17T05:06:18Z", "stargazers_count": 90, "watchers_count": 90, - "forks_count": 25, + "forks_count": 26, "allow_forking": true, "is_template": false, "topics": [ @@ -924,7 +924,7 @@ "zeroday" ], "visibility": "public", - "forks": 25, + "forks": 26, "watchers": 90, "score": 0 }, diff --git a/2021/CVE-2021-27965.json b/2021/CVE-2021-27965.json index a60c02ba3e..7c1dbc8ad4 100644 --- a/2021/CVE-2021-27965.json +++ b/2021/CVE-2021-27965.json @@ -17,7 +17,7 @@ "pushed_at": "2021-06-07T13:46:21Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -37,7 +37,7 @@ "windows" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0 }, diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json index 622dca5f87..3eec617e4b 100644 --- a/2021/CVE-2021-30632.json +++ b/2021/CVE-2021-30632.json @@ -40,17 +40,17 @@ "description": null, "fork": false, "created_at": "2021-09-28T03:47:36Z", - "updated_at": "2021-10-11T15:12:27Z", + "updated_at": "2021-10-11T19:46:51Z", "pushed_at": "2021-09-29T02:20:40Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 22, - "watchers": 103, + "watchers": 104, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 2e8b692f75..0272f836d4 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,10 +13,10 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2021-10-08T14:31:10Z", + "updated_at": "2021-10-11T17:28:35Z", "pushed_at": "2021-06-12T08:27:09Z", - "stargazers_count": 777, - "watchers_count": 777, + "stargazers_count": 778, + "watchers_count": 778, "forks_count": 128, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 128, - "watchers": 777, + "watchers": 778, "score": 0 }, { diff --git a/2021/CVE-2021-31796.json b/2021/CVE-2021-31796.json new file mode 100644 index 0000000000..015ef8a892 --- /dev/null +++ b/2021/CVE-2021-31796.json @@ -0,0 +1,29 @@ +[ + { + "id": 88706883, + "name": "CACredDecoder", + "full_name": "unmanarc\/CACredDecoder", + "owner": { + "login": "unmanarc", + "id": 7947734, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7947734?v=4", + "html_url": "https:\/\/github.com\/unmanarc" + }, + "html_url": "https:\/\/github.com\/unmanarc\/CACredDecoder", + "description": "C-Ark Credential Decoder for #CVE-2021-31796", + "fork": false, + "created_at": "2017-04-19T06:01:08Z", + "updated_at": "2021-10-11T18:01:38Z", + "pushed_at": "2021-10-11T17:59:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-33045.json b/2021/CVE-2021-33045.json index c99da33df3..a639af85f7 100644 --- a/2021/CVE-2021-33045.json +++ b/2021/CVE-2021-33045.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-10-11T15:11:48Z", - "updated_at": "2021-10-11T15:13:21Z", - "pushed_at": "2021-10-11T15:13:19Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2021-10-11T15:24:14Z", + "pushed_at": "2021-10-11T15:23:39Z", + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3492.json b/2021/CVE-2021-3492.json index 8cc7c12db0..c4dcb26681 100644 --- a/2021/CVE-2021-3492.json +++ b/2021/CVE-2021-3492.json @@ -13,17 +13,17 @@ "description": "PoC for CVE-2021-3492 used at Pwn2Own 2021", "fork": false, "created_at": "2021-06-28T09:43:31Z", - "updated_at": "2021-10-10T08:50:58Z", + "updated_at": "2021-10-11T17:45:11Z", "pushed_at": "2021-08-03T14:48:27Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 30, + "watchers": 31, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-36798.json b/2021/CVE-2021-36798.json index c94577b521..184641095a 100644 --- a/2021/CVE-2021-36798.json +++ b/2021/CVE-2021-36798.json @@ -42,17 +42,17 @@ "description": "CVE-2021-36798 Exp: Cobalt Strike < 4.4 Dos", "fork": false, "created_at": "2021-09-06T11:49:03Z", - "updated_at": "2021-10-10T14:34:52Z", + "updated_at": "2021-10-11T18:58:40Z", "pushed_at": "2021-09-26T10:02:37Z", - "stargazers_count": 91, - "watchers_count": 91, + "stargazers_count": 92, + "watchers_count": 92, "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 14, - "watchers": 91, + "watchers": 92, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json index 5c39a83999..17b91844e6 100644 --- a/2021/CVE-2021-38647.json +++ b/2021/CVE-2021-38647.json @@ -67,17 +67,17 @@ "description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)", "fork": false, "created_at": "2021-09-16T02:11:36Z", - "updated_at": "2021-10-10T22:28:56Z", + "updated_at": "2021-10-11T18:33:19Z", "pushed_at": "2021-09-16T10:39:04Z", - "stargazers_count": 172, - "watchers_count": 172, + "stargazers_count": 173, + "watchers_count": 173, "forks_count": 50, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 50, - "watchers": 172, + "watchers": 173, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 0cdf197b7c..757773ad56 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -229,17 +229,17 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2021-10-11T11:12:04Z", + "updated_at": "2021-10-11T20:42:57Z", "pushed_at": "2021-09-11T09:50:26Z", - "stargazers_count": 1269, - "watchers_count": 1269, + "stargazers_count": 1270, + "watchers_count": 1270, "forks_count": 402, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 402, - "watchers": 1269, + "watchers": 1270, "score": 0 }, { @@ -418,8 +418,8 @@ "description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit", "fork": false, "created_at": "2021-09-12T18:05:53Z", - "updated_at": "2021-10-03T00:20:48Z", - "pushed_at": "2021-10-03T07:07:22Z", + "updated_at": "2021-10-11T20:53:21Z", + "pushed_at": "2021-10-11T20:53:19Z", "stargazers_count": 160, "watchers_count": 160, "forks_count": 43, diff --git a/2021/CVE-2021-40870.json b/2021/CVE-2021-40870.json index 226fb11987..0c0bcde0ae 100644 --- a/2021/CVE-2021-40870.json +++ b/2021/CVE-2021-40870.json @@ -13,10 +13,10 @@ "description": "Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file which allows an unauthenticated user to execute arbitrary code via directory traversal", "fork": false, "created_at": "2021-10-07T17:19:12Z", - "updated_at": "2021-10-11T12:12:03Z", + "updated_at": "2021-10-11T16:16:12Z", "pushed_at": "2021-10-09T06:06:47Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 539f7159d4..53befdcf5d 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -125,12 +125,12 @@ "pushed_at": "2021-10-10T04:43:33Z", "stargazers_count": 30, "watchers_count": 30, - "forks_count": 28, + "forks_count": 29, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 28, + "forks": 29, "watchers": 30, "score": 0 }, @@ -256,11 +256,11 @@ "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-06T02:28:41Z", - "updated_at": "2021-10-11T13:11:06Z", + "updated_at": "2021-10-11T16:21:48Z", "pushed_at": "2021-10-09T19:37:29Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 3, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [ @@ -272,8 +272,8 @@ "rce" ], "visibility": "public", - "forks": 3, - "watchers": 9, + "forks": 4, + "watchers": 10, "score": 0 }, { @@ -398,17 +398,17 @@ "description": "CVE-2021-41773 playground", "fork": false, "created_at": "2021-10-06T07:17:05Z", - "updated_at": "2021-10-11T10:44:41Z", + "updated_at": "2021-10-11T18:33:32Z", "pushed_at": "2021-10-07T17:56:38Z", - "stargazers_count": 174, - "watchers_count": 174, - "forks_count": 43, + "stargazers_count": 177, + "watchers_count": 177, + "forks_count": 44, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 43, - "watchers": 174, + "forks": 44, + "watchers": 177, "score": 0 }, { @@ -1093,17 +1093,17 @@ "description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ", "fork": false, "created_at": "2021-10-08T07:24:49Z", - "updated_at": "2021-10-10T18:02:05Z", + "updated_at": "2021-10-11T16:02:36Z", "pushed_at": "2021-10-08T07:27:04Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0 }, { @@ -1147,17 +1147,17 @@ "description": "POC", "fork": false, "created_at": "2021-10-08T15:40:41Z", - "updated_at": "2021-10-10T22:26:28Z", + "updated_at": "2021-10-11T16:11:44Z", "pushed_at": "2021-10-10T22:26:26Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/README.md b/README.md index ad7008d63f..891e99e276 100644 --- a/README.md +++ b/README.md @@ -1870,6 +1870,14 @@ Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to create a privil - [Mesh3l911/CVE-2021-31762](https://github.com/Mesh3l911/CVE-2021-31762) - [electronicbots/CVE-2021-31762](https://github.com/electronicbots/CVE-2021-31762) +### CVE-2021-31796 (2021-09-01) + + +An inadequate encryption vulnerability discovered in CyberArk Credential Provider before 12.1 may lead to Information Disclosure. An attacker may realistically have enough information that the number of possible keys (for a credential file) is only one, and the number is usually not higher than 2^36. + + +- [unmanarc/CACredDecoder](https://github.com/unmanarc/CACredDecoder) + ### CVE-2021-31856 (2021-04-28)