diff --git a/2016/CVE-2016-1757.json b/2016/CVE-2016-1757.json
new file mode 100644
index 0000000000..bcf4fe6155
--- /dev/null
+++ b/2016/CVE-2016-1757.json
@@ -0,0 +1,29 @@
+[
+ {
+ "id": 57211701,
+ "name": "mach_race",
+ "full_name": "gdbinit\/mach_race",
+ "owner": {
+ "login": "gdbinit",
+ "id": 859134,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/859134?v=4",
+ "html_url": "https:\/\/github.com\/gdbinit"
+ },
+ "html_url": "https:\/\/github.com\/gdbinit\/mach_race",
+ "description": "Exploit code for CVE-2016-1757",
+ "fork": false,
+ "created_at": "2016-04-27T12:29:28Z",
+ "updated_at": "2021-09-09T02:27:23Z",
+ "pushed_at": "2016-04-27T14:07:43Z",
+ "stargazers_count": 81,
+ "watchers_count": 81,
+ "forks_count": 24,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 24,
+ "watchers": 81,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2016/CVE-2016-2118.json b/2016/CVE-2016-2118.json
new file mode 100644
index 0000000000..01e6542696
--- /dev/null
+++ b/2016/CVE-2016-2118.json
@@ -0,0 +1,29 @@
+[
+ {
+ "id": 56461631,
+ "name": "cfengine-CVE-2016-2118",
+ "full_name": "nickanderson\/cfengine-CVE-2016-2118",
+ "owner": {
+ "login": "nickanderson",
+ "id": 202896,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
+ "html_url": "https:\/\/github.com\/nickanderson"
+ },
+ "html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
+ "description": "An example detection and remediation policy.",
+ "fork": false,
+ "created_at": "2016-04-17T22:22:04Z",
+ "updated_at": "2016-04-18T02:57:44Z",
+ "pushed_at": "2016-04-19T14:24:20Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2016/CVE-2016-3141.json b/2016/CVE-2016-3141.json
new file mode 100644
index 0000000000..3fffc527bc
--- /dev/null
+++ b/2016/CVE-2016-3141.json
@@ -0,0 +1,29 @@
+[
+ {
+ "id": 56758577,
+ "name": "CVE-2016-3141",
+ "full_name": "peternguyen93\/CVE-2016-3141",
+ "owner": {
+ "login": "peternguyen93",
+ "id": 1802870,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
+ "html_url": "https:\/\/github.com\/peternguyen93"
+ },
+ "html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
+ "description": "CVE-2016-3141",
+ "fork": false,
+ "created_at": "2016-04-21T08:59:05Z",
+ "updated_at": "2019-11-27T06:28:33Z",
+ "pushed_at": "2016-04-23T15:55:01Z",
+ "stargazers_count": 14,
+ "watchers_count": 14,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 14,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2018/CVE-2018-19571.json b/2018/CVE-2018-19571.json
index 2cee00bad0..295909b469 100644
--- a/2018/CVE-2018-19571.json
+++ b/2018/CVE-2018-19571.json
@@ -45,14 +45,19 @@
"description": "GitLab 11.4.7 CE RCE exploit with different reverse shells. CVE-2018-19571 + CVE-2018-19585",
"fork": false,
"created_at": "2021-04-11T11:23:37Z",
- "updated_at": "2021-05-03T12:59:20Z",
+ "updated_at": "2021-10-31T18:14:10Z",
"pushed_at": "2021-05-03T12:59:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
- "topics": [],
+ "topics": [
+ "cve-2018-19571",
+ "cve-2018-19585",
+ "exploit",
+ "gitlab"
+ ],
"visibility": "public",
"forks": 1,
"watchers": 1,
diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json
index 4330a93e0e..3a214537af 100644
--- a/2019/CVE-2019-13272.json
+++ b/2019/CVE-2019-13272.json
@@ -40,17 +40,17 @@
"description": "The exploit for CVE-2019-13272",
"fork": false,
"created_at": "2019-07-31T06:36:21Z",
- "updated_at": "2020-12-14T12:01:59Z",
+ "updated_at": "2021-10-31T16:17:53Z",
"pushed_at": "2019-07-31T07:05:04Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 4,
+ "watchers": 5,
"score": 0
},
{
diff --git a/2019/CVE-2019-7609.json b/2019/CVE-2019-7609.json
index d6de2face5..db334ad4d4 100644
--- a/2019/CVE-2019-7609.json
+++ b/2019/CVE-2019-7609.json
@@ -70,10 +70,10 @@
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
- "updated_at": "2021-09-10T22:00:32Z",
+ "updated_at": "2021-10-31T17:08:17Z",
"pushed_at": "2019-10-23T07:10:35Z",
- "stargazers_count": 122,
- "watchers_count": 122,
+ "stargazers_count": 123,
+ "watchers_count": 123,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
@@ -84,7 +84,7 @@
],
"visibility": "public",
"forks": 48,
- "watchers": 122,
+ "watchers": 123,
"score": 0
},
{
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index 91f04fe7c4..dd853071c4 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -193,8 +193,8 @@
"description": null,
"fork": false,
"created_at": "2021-07-01T12:24:19Z",
- "updated_at": "2021-10-24T04:48:36Z",
- "pushed_at": "2021-10-03T13:04:19Z",
+ "updated_at": "2021-10-31T15:29:24Z",
+ "pushed_at": "2021-10-31T15:29:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 5,
diff --git a/2021/CVE-2021-20837.json b/2021/CVE-2021-20837.json
index 339e64db04..3f2ee389ba 100644
--- a/2021/CVE-2021-20837.json
+++ b/2021/CVE-2021-20837.json
@@ -40,11 +40,11 @@
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",
- "updated_at": "2021-10-31T10:30:17Z",
+ "updated_at": "2021-10-31T19:36:43Z",
"pushed_at": "2021-10-30T09:22:31Z",
- "stargazers_count": 4,
- "watchers_count": 4,
- "forks_count": 2,
+ "stargazers_count": 6,
+ "watchers_count": 6,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -52,8 +52,8 @@
"xmlrpc-api"
],
"visibility": "public",
- "forks": 2,
- "watchers": 4,
+ "forks": 3,
+ "watchers": 6,
"score": 0
},
{
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index ffc789aa23..0d83cdeb4a 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -40,17 +40,17 @@
"description": "Pocsuite3 For CVE-2021-22205",
"fork": false,
"created_at": "2021-10-28T06:29:37Z",
- "updated_at": "2021-10-31T08:11:03Z",
+ "updated_at": "2021-10-31T18:26:16Z",
"pushed_at": "2021-10-28T08:54:26Z",
- "stargazers_count": 62,
- "watchers_count": 62,
+ "stargazers_count": 63,
+ "watchers_count": 63,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
- "watchers": 62,
+ "watchers": 63,
"score": 0
},
{
@@ -233,8 +233,8 @@
"description": "CVE-2021-22205 RCE ",
"fork": false,
"created_at": "2021-10-31T14:34:51Z",
- "updated_at": "2021-10-31T14:34:54Z",
- "pushed_at": "2021-10-31T14:34:51Z",
+ "updated_at": "2021-10-31T15:40:36Z",
+ "pushed_at": "2021-10-31T15:40:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2021/CVE-2021-28663.json b/2021/CVE-2021-28663.json
index dde3ca7abf..74f364f155 100644
--- a/2021/CVE-2021-28663.json
+++ b/2021/CVE-2021-28663.json
@@ -13,17 +13,17 @@
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
"fork": false,
"created_at": "2021-09-01T22:59:29Z",
- "updated_at": "2021-10-30T15:07:21Z",
+ "updated_at": "2021-10-31T15:35:25Z",
"pushed_at": "2021-09-03T10:24:34Z",
- "stargazers_count": 57,
- "watchers_count": 57,
+ "stargazers_count": 58,
+ "watchers_count": 58,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 57,
+ "watchers": 58,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
index 5cf5ffab8b..d35d4f5916 100644
--- a/2021/CVE-2021-34527.json
+++ b/2021/CVE-2021-34527.json
@@ -73,17 +73,17 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
- "updated_at": "2021-10-28T21:12:48Z",
+ "updated_at": "2021-10-31T16:50:36Z",
"pushed_at": "2021-07-02T12:17:50Z",
- "stargazers_count": 140,
- "watchers_count": 140,
+ "stargazers_count": 141,
+ "watchers_count": 141,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
- "watchers": 140,
+ "watchers": 141,
"score": 0
},
{
diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json
index b293832b23..422b85700a 100644
--- a/2021/CVE-2021-36260.json
+++ b/2021/CVE-2021-36260.json
@@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
- "updated_at": "2021-10-30T12:50:39Z",
+ "updated_at": "2021-10-31T16:23:14Z",
"pushed_at": "2021-10-28T06:37:37Z",
- "stargazers_count": 26,
- "watchers_count": 26,
+ "stargazers_count": 27,
+ "watchers_count": 27,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
- "watchers": 26,
+ "watchers": 27,
"score": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 48d8968285..229b637daa 100644
--- a/README.md
+++ b/README.md
@@ -17276,6 +17276,14 @@ AppleUSBNetworking in Apple iOS before 9.3 and OS X before 10.11.4 allows physic
- [Manouchehri/CVE-2016-1734](https://github.com/Manouchehri/CVE-2016-1734)
+### CVE-2016-1757 (2016-03-23)
+
+
+Race condition in the kernel in Apple iOS before 9.3 and OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context via a crafted app.
+
+
+- [gdbinit/mach_race](https://github.com/gdbinit/mach_race)
+
### CVE-2016-1764 (2016-03-23)
@@ -17341,6 +17349,14 @@ The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
+### CVE-2016-2118 (2016-04-12)
+
+
+The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
+
+
+- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
+
### CVE-2016-2173 (2017-04-21)
@@ -17462,6 +17478,14 @@ Cross-site scripting (XSS) vulnerability in ovirt-engine allows remote attackers
- [0xEmanuel/CVE-2016-3113](https://github.com/0xEmanuel/CVE-2016-3113)
+### CVE-2016-3141 (2016-03-31)
+
+
+Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
+
+
+- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
+
### CVE-2016-3238 (2016-07-12)