From 9c26bd935344ed78faa1ab06a84bbd20cdbf5471 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 8 May 2021 00:12:40 +0900 Subject: [PATCH] Auto Update 2021/05/08 00:12:40 --- 2014/CVE-2014-0160.json | 8 ++++---- 2015/CVE-2015-0235.json | 23 ----------------------- 2016/CVE-2016-0051.json | 8 ++++---- 2017/CVE-2017-0199.json | 8 ++++---- 2017/CVE-2017-10271.json | 8 ++++---- 2019/CVE-2019-0708.json | 4 ++-- 2019/CVE-2019-1003000.json | 8 ++++---- 2019/CVE-2019-17558.json | 4 ++-- 2019/CVE-2019-2725.json | 16 ++++++++-------- 2019/CVE-2019-9810.json | 8 ++++---- 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-14882.json | 4 ++-- 2020/CVE-2020-25686.json | 4 ++-- 2020/CVE-2020-27904.json | 8 ++++---- 2020/CVE-2020-5902.json | 8 ++++---- 2020/CVE-2020-7693.json | 4 ++-- 2021/CVE-2021-1782.json | 8 ++++---- 2021/CVE-2021-21123.json | 8 ++++---- 2021/CVE-2021-21315.json | 8 ++++---- 2021/CVE-2021-22893.json | 4 ++-- 2021/CVE-2021-30461.json | 23 +++++++++++++++++++++++ 2021/CVE-2021-3156.json | 35 ++++++----------------------------- 2021/CVE-2021-31728.json | 8 ++++---- 2021/CVE-2021-3493.json | 23 +++++++++++++++++++++++ README.md | 4 ++-- 26 files changed, 130 insertions(+), 130 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 8c1f761b15..ba0f3842f9 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -312,13 +312,13 @@ "description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)", "fork": false, "created_at": "2014-04-09T15:59:14Z", - "updated_at": "2021-05-07T00:03:43Z", + "updated_at": "2021-05-07T12:29:19Z", "pushed_at": "2014-07-10T21:17:22Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 132, + "watchers_count": 132, "forks_count": 77, "forks": 77, - "watchers": 131, + "watchers": 132, "score": 0 }, { diff --git a/2015/CVE-2015-0235.json b/2015/CVE-2015-0235.json index 15efa3ea2a..bd0b63140e 100644 --- a/2015/CVE-2015-0235.json +++ b/2015/CVE-2015-0235.json @@ -229,29 +229,6 @@ "watchers": 0, "score": 0 }, - { - "id": 30059704, - "name": "ghosttester", - "full_name": "JustDenisYT\/ghosttester", - "owner": { - "login": "JustDenisYT", - "id": 9379272, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9379272?v=4", - "html_url": "https:\/\/github.com\/JustDenisYT" - }, - "html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester", - "description": "Script to test vulnarability for CVE-2015-0235", - "fork": false, - "created_at": "2015-01-30T06:37:06Z", - "updated_at": "2015-02-04T08:03:37Z", - "pushed_at": "2015-02-04T08:03:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 1, - "forks": 1, - "watchers": 0, - "score": 0 - }, { "id": 30066365, "name": "CVE-2015-0235", diff --git a/2016/CVE-2016-0051.json b/2016/CVE-2016-0051.json index 0cf45a71e1..ae05ec1b91 100644 --- a/2016/CVE-2016-0051.json +++ b/2016/CVE-2016-0051.json @@ -13,13 +13,13 @@ "description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)", "fork": false, "created_at": "2016-02-09T21:30:34Z", - "updated_at": "2021-03-10T15:40:43Z", + "updated_at": "2021-05-07T14:35:46Z", "pushed_at": "2016-05-09T17:53:48Z", - "stargazers_count": 326, - "watchers_count": 326, + "stargazers_count": 325, + "watchers_count": 325, "forks_count": 154, "forks": 154, - "watchers": 326, + "watchers": 325, "score": 0 }, { diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index 90bc428446..1b744345ad 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -59,13 +59,13 @@ "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "fork": false, "created_at": "2017-04-17T08:10:07Z", - "updated_at": "2021-05-04T22:18:58Z", + "updated_at": "2021-05-07T10:12:29Z", "pushed_at": "2017-11-19T11:01:16Z", - "stargazers_count": 650, - "watchers_count": 650, + "stargazers_count": 651, + "watchers_count": 651, "forks_count": 288, "forks": 288, - "watchers": 650, + "watchers": 651, "score": 0 }, { diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index 9aa6b3ce82..1cf72fc229 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -358,13 +358,13 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2021-04-29T07:14:58Z", + "updated_at": "2021-05-07T11:34:01Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 272, - "watchers_count": 272, + "stargazers_count": 271, + "watchers_count": 271, "forks_count": 98, "forks": 98, - "watchers": 272, + "watchers": 271, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index e194e6bbb1..57ef2d3feb 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1581,8 +1581,8 @@ "pushed_at": "2020-06-14T18:43:51Z", "stargazers_count": 40, "watchers_count": 40, - "forks_count": 17, - "forks": 17, + "forks_count": 16, + "forks": 16, "watchers": 40, "score": 0 }, diff --git a/2019/CVE-2019-1003000.json b/2019/CVE-2019-1003000.json index 261e64454c..1f8e7e5363 100644 --- a/2019/CVE-2019-1003000.json +++ b/2019/CVE-2019-1003000.json @@ -36,13 +36,13 @@ "description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)", "fork": false, "created_at": "2019-02-15T05:59:24Z", - "updated_at": "2021-04-26T08:18:02Z", + "updated_at": "2021-05-07T14:37:21Z", "pushed_at": "2019-04-01T13:19:49Z", - "stargazers_count": 274, - "watchers_count": 274, + "stargazers_count": 275, + "watchers_count": 275, "forks_count": 84, "forks": 84, - "watchers": 274, + "watchers": 275, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index c6219bab76..4ec991f812 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,8 +40,8 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 2553, "watchers_count": 2553, - "forks_count": 744, - "forks": 744, + "forks_count": 745, + "forks": 745, "watchers": 2553, "score": 0 }, diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 36eb83c792..beece30413 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,13 +13,13 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2021-04-29T07:14:58Z", + "updated_at": "2021-05-07T11:34:01Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 272, - "watchers_count": 272, + "stargazers_count": 271, + "watchers_count": 271, "forks_count": 98, "forks": 98, - "watchers": 272, + "watchers": 271, "score": 0 }, { @@ -312,13 +312,13 @@ "description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ", "fork": false, "created_at": "2019-06-24T08:33:07Z", - "updated_at": "2021-01-26T23:21:20Z", + "updated_at": "2021-05-07T09:56:44Z", "pushed_at": "2019-07-15T06:03:15Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "forks_count": 26, "forks": 26, - "watchers": 60, + "watchers": 61, "score": 0 }, { diff --git a/2019/CVE-2019-9810.json b/2019/CVE-2019-9810.json index 0d02b72762..277de537da 100644 --- a/2019/CVE-2019-9810.json +++ b/2019/CVE-2019-9810.json @@ -36,13 +36,13 @@ "description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.", "fork": false, "created_at": "2019-05-05T17:19:02Z", - "updated_at": "2021-04-08T08:04:36Z", + "updated_at": "2021-05-07T09:13:47Z", "pushed_at": "2019-12-28T18:25:10Z", - "stargazers_count": 201, - "watchers_count": 201, + "stargazers_count": 202, + "watchers_count": 202, "forks_count": 56, "forks": 56, - "watchers": 201, + "watchers": 202, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 85bace05f9..a5e873f91b 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -864,13 +864,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-04-30T20:33:17Z", + "updated_at": "2021-05-07T14:33:28Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1114, - "watchers_count": 1114, + "stargazers_count": 1115, + "watchers_count": 1115, "forks_count": 356, "forks": 356, - "watchers": 1114, + "watchers": 1115, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index fb13211476..cb064075f3 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -36,13 +36,13 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2021-05-06T20:53:38Z", + "updated_at": "2021-05-07T13:22:42Z", "pushed_at": "2020-10-21T12:10:28Z", - "stargazers_count": 1276, - "watchers_count": 1276, + "stargazers_count": 1275, + "watchers_count": 1275, "forks_count": 293, "forks": 293, - "watchers": 1276, + "watchers": 1275, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index b165c0ca0d..db211c40e3 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -17,8 +17,8 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 2553, "watchers_count": 2553, - "forks_count": 744, - "forks": 744, + "forks_count": 745, + "forks": 745, "watchers": 2553, "score": 0 }, diff --git a/2020/CVE-2020-25686.json b/2020/CVE-2020-25686.json index 4aab4ddf05..a52c43b8e4 100644 --- a/2020/CVE-2020-25686.json +++ b/2020/CVE-2020-25686.json @@ -17,8 +17,8 @@ "pushed_at": "2021-01-24T09:05:40Z", "stargazers_count": 68, "watchers_count": 68, - "forks_count": 31, - "forks": 31, + "forks_count": 32, + "forks": 32, "watchers": 68, "score": 0 } diff --git a/2020/CVE-2020-27904.json b/2020/CVE-2020-27904.json index b281f583db..1fbb028103 100644 --- a/2020/CVE-2020-27904.json +++ b/2020/CVE-2020-27904.json @@ -13,13 +13,13 @@ "description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.", "fork": false, "created_at": "2021-03-31T09:11:29Z", - "updated_at": "2021-05-07T08:37:06Z", + "updated_at": "2021-05-07T14:49:09Z", "pushed_at": "2021-04-29T07:14:33Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 18, + "watchers_count": 18, "forks_count": 2, "forks": 2, - "watchers": 9, + "watchers": 18, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index 802a8c974b..210f810b80 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -13,13 +13,13 @@ "description": "CVE-2020-5902", "fork": false, "created_at": "2020-07-04T14:12:57Z", - "updated_at": "2021-03-16T07:08:42Z", + "updated_at": "2021-05-07T14:23:07Z", "pushed_at": "2020-07-04T14:21:27Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 1, "forks": 1, - "watchers": 10, + "watchers": 9, "score": 0 }, { diff --git a/2020/CVE-2020-7693.json b/2020/CVE-2020-7693.json index 39474813cb..fe4226ab29 100644 --- a/2020/CVE-2020-7693.json +++ b/2020/CVE-2020-7693.json @@ -17,8 +17,8 @@ "pushed_at": "2020-07-15T04:59:19Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 1, "score": 0 } diff --git a/2021/CVE-2021-1782.json b/2021/CVE-2021-1782.json index 8ac82c4adb..0926b3a040 100644 --- a/2021/CVE-2021-1782.json +++ b/2021/CVE-2021-1782.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-10T14:38:05Z", - "updated_at": "2021-04-27T07:29:37Z", + "updated_at": "2021-05-07T11:19:58Z", "pushed_at": "2021-02-10T14:39:04Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 4, "forks": 4, - "watchers": 22, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json index a4345cfa24..f0d6ab772c 100644 --- a/2021/CVE-2021-21123.json +++ b/2021/CVE-2021-21123.json @@ -13,13 +13,13 @@ "description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...", "fork": false, "created_at": "2021-03-22T11:53:57Z", - "updated_at": "2021-05-05T17:33:33Z", + "updated_at": "2021-05-07T10:39:44Z", "pushed_at": "2021-03-22T18:24:20Z", - "stargazers_count": 111, - "watchers_count": 111, + "stargazers_count": 112, + "watchers_count": 112, "forks_count": 15, "forks": 15, - "watchers": 111, + "watchers": 112, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21315.json b/2021/CVE-2021-21315.json index 6ffb29f7c1..8c0c254c4e 100644 --- a/2021/CVE-2021-21315.json +++ b/2021/CVE-2021-21315.json @@ -13,13 +13,13 @@ "description": "CVE 2021-21315 PoC", "fork": false, "created_at": "2021-03-01T18:52:41Z", - "updated_at": "2021-05-05T22:00:07Z", + "updated_at": "2021-05-07T15:02:07Z", "pushed_at": "2021-05-05T22:00:05Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 119, + "watchers_count": 119, "forks_count": 21, "forks": 21, - "watchers": 118, + "watchers": 119, "score": 0 }, { diff --git a/2021/CVE-2021-22893.json b/2021/CVE-2021-22893.json index 032792bccb..6bea2cdef1 100644 --- a/2021/CVE-2021-22893.json +++ b/2021/CVE-2021-22893.json @@ -17,8 +17,8 @@ "pushed_at": "2021-05-04T15:32:18Z", "stargazers_count": 26, "watchers_count": 26, - "forks_count": 11, - "forks": 11, + "forks_count": 12, + "forks": 12, "watchers": 26, "score": 0 }, diff --git a/2021/CVE-2021-30461.json b/2021/CVE-2021-30461.json index 1620e8bc1e..187da0ecdf 100644 --- a/2021/CVE-2021-30461.json +++ b/2021/CVE-2021-30461.json @@ -21,5 +21,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 365180712, + "name": "CVE-2021-30461", + "full_name": "Vulnmachines\/CVE-2021-30461", + "owner": { + "login": "Vulnmachines", + "id": 79006904, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", + "html_url": "https:\/\/github.com\/Vulnmachines" + }, + "html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-30461", + "description": "VOIP RCE", + "fork": false, + "created_at": "2021-05-07T09:22:01Z", + "updated_at": "2021-05-07T13:24:21Z", + "pushed_at": "2021-05-07T09:23:38Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index c11885a6f3..69aec1cc20 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -86,8 +86,8 @@ "pushed_at": "2021-01-27T15:19:23Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 24, - "forks": 24, + "forks_count": 25, + "forks": 25, "watchers": 0, "score": 0 }, @@ -137,29 +137,6 @@ "watchers": 4, "score": 0 }, - { - "id": 333619288, - "name": "CVE-2021-3156-Baron-Samedit", - "full_name": "kernelzeroday\/CVE-2021-3156-Baron-Samedit", - "owner": { - "login": "kernelzeroday", - "id": 11334159, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11334159?v=4", - "html_url": "https:\/\/github.com\/kernelzeroday" - }, - "html_url": "https:\/\/github.com\/kernelzeroday\/CVE-2021-3156-Baron-Samedit", - "description": "1day research effort", - "fork": false, - "created_at": "2021-01-28T02:13:49Z", - "updated_at": "2021-03-14T07:05:52Z", - "pushed_at": "2021-01-29T03:21:13Z", - "stargazers_count": 19, - "watchers_count": 19, - "forks_count": 5, - "forks": 5, - "watchers": 19, - "score": 0 - }, { "id": 333620703, "name": "cve-2021-3156", @@ -335,13 +312,13 @@ "description": "PoC for CVE-2021-3156 (sudo heap overflow)", "fork": false, "created_at": "2021-01-30T03:22:04Z", - "updated_at": "2021-05-05T23:01:49Z", + "updated_at": "2021-05-07T14:23:08Z", "pushed_at": "2021-02-08T03:42:50Z", - "stargazers_count": 388, - "watchers_count": 388, + "stargazers_count": 387, + "watchers_count": 387, "forks_count": 108, "forks": 108, - "watchers": 388, + "watchers": 387, "score": 0 }, { diff --git a/2021/CVE-2021-31728.json b/2021/CVE-2021-31728.json index 6baa662b4f..dcb0643379 100644 --- a/2021/CVE-2021-31728.json +++ b/2021/CVE-2021-31728.json @@ -13,13 +13,13 @@ "description": "Vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution.", "fork": false, "created_at": "2021-05-04T17:15:58Z", - "updated_at": "2021-05-07T08:50:02Z", + "updated_at": "2021-05-07T14:54:50Z", "pushed_at": "2021-05-06T15:53:18Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 1, "forks": 1, - "watchers": 11, + "watchers": 12, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index 804505a561..586416f715 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -90,5 +90,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 365269420, + "name": "CVE-2021-3493", + "full_name": "Ishan3011\/CVE-2021-3493", + "owner": { + "login": "Ishan3011", + "id": 68255653, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68255653?v=4", + "html_url": "https:\/\/github.com\/Ishan3011" + }, + "html_url": "https:\/\/github.com\/Ishan3011\/CVE-2021-3493", + "description": null, + "fork": false, + "created_at": "2021-05-07T15:01:25Z", + "updated_at": "2021-05-07T15:16:25Z", + "pushed_at": "2021-05-07T15:16:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 8a01ab7caa..e23be21049 100644 --- a/README.md +++ b/README.md @@ -143,7 +143,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based - [jokerTPR2004/CVE-2021-3156](https://github.com/jokerTPR2004/CVE-2021-3156) - [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156) - [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER) -- [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit) - [yaunsky/cve-2021-3156](https://github.com/yaunsky/cve-2021-3156) - [H4ckForJob/cve-2021-3156](https://github.com/H4ckForJob/cve-2021-3156) - [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp) @@ -277,6 +276,7 @@ The overlayfs implementation in the linux kernel did not properly validate with - [oneoy/CVE-2021-3493](https://github.com/oneoy/CVE-2021-3493) - [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493) - [AmIAHuman/OverlayFS-CVE-2021-3493](https://github.com/AmIAHuman/OverlayFS-CVE-2021-3493) +- [Ishan3011/CVE-2021-3493](https://github.com/Ishan3011/CVE-2021-3493) ### CVE-2021-6857 - [ZiHeny/CVE-2021-6857](https://github.com/ZiHeny/CVE-2021-6857) @@ -957,6 +957,7 @@ Composr 10.0.36 allows XSS in an XML script. ### CVE-2021-30461 - [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461) +- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461) ### CVE-2021-30481 (2021-04-10) @@ -15575,7 +15576,6 @@ Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2 - [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235) - [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc) - [F88/ghostbusters15](https://github.com/F88/ghostbusters15) -- [JustDenisYT/ghosttester](https://github.com/JustDenisYT/ghosttester) - [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235) - [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround) - [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)