diff --git a/2016/CVE-2016-1757.json b/2016/CVE-2016-1757.json new file mode 100644 index 0000000000..bcf4fe6155 --- /dev/null +++ b/2016/CVE-2016-1757.json @@ -0,0 +1,29 @@ +[ + { + "id": 57211701, + "name": "mach_race", + "full_name": "gdbinit\/mach_race", + "owner": { + "login": "gdbinit", + "id": 859134, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/859134?v=4", + "html_url": "https:\/\/github.com\/gdbinit" + }, + "html_url": "https:\/\/github.com\/gdbinit\/mach_race", + "description": "Exploit code for CVE-2016-1757", + "fork": false, + "created_at": "2016-04-27T12:29:28Z", + "updated_at": "2021-09-09T02:27:23Z", + "pushed_at": "2016-04-27T14:07:43Z", + "stargazers_count": 81, + "watchers_count": 81, + "forks_count": 24, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 24, + "watchers": 81, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-2118.json b/2016/CVE-2016-2118.json new file mode 100644 index 0000000000..01e6542696 --- /dev/null +++ b/2016/CVE-2016-2118.json @@ -0,0 +1,29 @@ +[ + { + "id": 56461631, + "name": "cfengine-CVE-2016-2118", + "full_name": "nickanderson\/cfengine-CVE-2016-2118", + "owner": { + "login": "nickanderson", + "id": 202896, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4", + "html_url": "https:\/\/github.com\/nickanderson" + }, + "html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118", + "description": "An example detection and remediation policy.", + "fork": false, + "created_at": "2016-04-17T22:22:04Z", + "updated_at": "2016-04-18T02:57:44Z", + "pushed_at": "2016-04-19T14:24:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-3141.json b/2016/CVE-2016-3141.json new file mode 100644 index 0000000000..3fffc527bc --- /dev/null +++ b/2016/CVE-2016-3141.json @@ -0,0 +1,29 @@ +[ + { + "id": 56758577, + "name": "CVE-2016-3141", + "full_name": "peternguyen93\/CVE-2016-3141", + "owner": { + "login": "peternguyen93", + "id": 1802870, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4", + "html_url": "https:\/\/github.com\/peternguyen93" + }, + "html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141", + "description": "CVE-2016-3141", + "fork": false, + "created_at": "2016-04-21T08:59:05Z", + "updated_at": "2019-11-27T06:28:33Z", + "pushed_at": "2016-04-23T15:55:01Z", + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 5, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 5, + "watchers": 14, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19571.json b/2018/CVE-2018-19571.json index 2cee00bad0..295909b469 100644 --- a/2018/CVE-2018-19571.json +++ b/2018/CVE-2018-19571.json @@ -45,14 +45,19 @@ "description": "GitLab 11.4.7 CE RCE exploit with different reverse shells. CVE-2018-19571 + CVE-2018-19585", "fork": false, "created_at": "2021-04-11T11:23:37Z", - "updated_at": "2021-05-03T12:59:20Z", + "updated_at": "2021-10-31T18:14:10Z", "pushed_at": "2021-05-03T12:59:18Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, - "topics": [], + "topics": [ + "cve-2018-19571", + "cve-2018-19585", + "exploit", + "gitlab" + ], "visibility": "public", "forks": 1, "watchers": 1, diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index 4330a93e0e..3a214537af 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -40,17 +40,17 @@ "description": "The exploit for CVE-2019-13272", "fork": false, "created_at": "2019-07-31T06:36:21Z", - "updated_at": "2020-12-14T12:01:59Z", + "updated_at": "2021-10-31T16:17:53Z", "pushed_at": "2019-07-31T07:05:04Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2019/CVE-2019-7609.json b/2019/CVE-2019-7609.json index d6de2face5..db334ad4d4 100644 --- a/2019/CVE-2019-7609.json +++ b/2019/CVE-2019-7609.json @@ -70,10 +70,10 @@ "description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts", "fork": false, "created_at": "2019-10-21T15:31:13Z", - "updated_at": "2021-09-10T22:00:32Z", + "updated_at": "2021-10-31T17:08:17Z", "pushed_at": "2019-10-23T07:10:35Z", - "stargazers_count": 122, - "watchers_count": 122, + "stargazers_count": 123, + "watchers_count": 123, "forks_count": 48, "allow_forking": true, "is_template": false, @@ -84,7 +84,7 @@ ], "visibility": "public", "forks": 48, - "watchers": 122, + "watchers": 123, "score": 0 }, { diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 91f04fe7c4..dd853071c4 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -193,8 +193,8 @@ "description": null, "fork": false, "created_at": "2021-07-01T12:24:19Z", - "updated_at": "2021-10-24T04:48:36Z", - "pushed_at": "2021-10-03T13:04:19Z", + "updated_at": "2021-10-31T15:29:24Z", + "pushed_at": "2021-10-31T15:29:21Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 5, diff --git a/2021/CVE-2021-20837.json b/2021/CVE-2021-20837.json index 339e64db04..3f2ee389ba 100644 --- a/2021/CVE-2021-20837.json +++ b/2021/CVE-2021-20837.json @@ -40,11 +40,11 @@ "description": "XMLRPC - RCE in MovableTypePoC", "fork": false, "created_at": "2021-10-30T09:15:56Z", - "updated_at": "2021-10-31T10:30:17Z", + "updated_at": "2021-10-31T19:36:43Z", "pushed_at": "2021-10-30T09:22:31Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ @@ -52,8 +52,8 @@ "xmlrpc-api" ], "visibility": "public", - "forks": 2, - "watchers": 4, + "forks": 3, + "watchers": 6, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index ffc789aa23..0d83cdeb4a 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -40,17 +40,17 @@ "description": "Pocsuite3 For CVE-2021-22205", "fork": false, "created_at": "2021-10-28T06:29:37Z", - "updated_at": "2021-10-31T08:11:03Z", + "updated_at": "2021-10-31T18:26:16Z", "pushed_at": "2021-10-28T08:54:26Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 63, + "watchers_count": 63, "forks_count": 21, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 21, - "watchers": 62, + "watchers": 63, "score": 0 }, { @@ -233,8 +233,8 @@ "description": "CVE-2021-22205 RCE ", "fork": false, "created_at": "2021-10-31T14:34:51Z", - "updated_at": "2021-10-31T14:34:54Z", - "pushed_at": "2021-10-31T14:34:51Z", + "updated_at": "2021-10-31T15:40:36Z", + "pushed_at": "2021-10-31T15:40:34Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-28663.json b/2021/CVE-2021-28663.json index dde3ca7abf..74f364f155 100644 --- a/2021/CVE-2021-28663.json +++ b/2021/CVE-2021-28663.json @@ -13,17 +13,17 @@ "description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)", "fork": false, "created_at": "2021-09-01T22:59:29Z", - "updated_at": "2021-10-30T15:07:21Z", + "updated_at": "2021-10-31T15:35:25Z", "pushed_at": "2021-09-03T10:24:34Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 12, - "watchers": 57, + "watchers": 58, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 5cf5ffab8b..d35d4f5916 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -73,17 +73,17 @@ "description": null, "fork": false, "created_at": "2021-07-02T12:10:49Z", - "updated_at": "2021-10-28T21:12:48Z", + "updated_at": "2021-10-31T16:50:36Z", "pushed_at": "2021-07-02T12:17:50Z", - "stargazers_count": 140, - "watchers_count": 140, + "stargazers_count": 141, + "watchers_count": 141, "forks_count": 36, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 36, - "watchers": 140, + "watchers": 141, "score": 0 }, { diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index b293832b23..422b85700a 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -40,17 +40,17 @@ "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", - "updated_at": "2021-10-30T12:50:39Z", + "updated_at": "2021-10-31T16:23:14Z", "pushed_at": "2021-10-28T06:37:37Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 15, - "watchers": 26, + "watchers": 27, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 48d8968285..229b637daa 100644 --- a/README.md +++ b/README.md @@ -17276,6 +17276,14 @@ AppleUSBNetworking in Apple iOS before 9.3 and OS X before 10.11.4 allows physic - [Manouchehri/CVE-2016-1734](https://github.com/Manouchehri/CVE-2016-1734) +### CVE-2016-1757 (2016-03-23) + + +Race condition in the kernel in Apple iOS before 9.3 and OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context via a crafted app. + + +- [gdbinit/mach_race](https://github.com/gdbinit/mach_race) + ### CVE-2016-1764 (2016-03-23) @@ -17341,6 +17349,14 @@ The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does - [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107) - [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107) +### CVE-2016-2118 (2016-04-12) + + +The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK." + + +- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118) + ### CVE-2016-2173 (2017-04-21) @@ -17462,6 +17478,14 @@ Cross-site scripting (XSS) vulnerability in ovirt-engine allows remote attackers - [0xEmanuel/CVE-2016-3113](https://github.com/0xEmanuel/CVE-2016-3113) +### CVE-2016-3141 (2016-03-31) + + +Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element. + + +- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141) + ### CVE-2016-3238 (2016-07-12)