Auto Update 2021/07/03 12:12:12

This commit is contained in:
motikan2010-bot 2021-07-03 12:12:12 +09:00
parent db914d5918
commit ab06c816fb
25 changed files with 298 additions and 155 deletions

25
2011/CVE-2011-1485.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 10719585,
"name": "CVE-2011-1485",
"full_name": "Pashkela\/CVE-2011-1485",
"owner": {
"login": "Pashkela",
"id": 4710642,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4710642?v=4",
"html_url": "https:\/\/github.com\/Pashkela"
},
"html_url": "https:\/\/github.com\/Pashkela\/CVE-2011-1485",
"description": "CVE-2011-1485 - Published: 2011-04-01 - PolicyKit:",
"fork": false,
"created_at": "2013-06-16T12:11:36Z",
"updated_at": "2016-09-05T04:27:17Z",
"pushed_at": "2013-06-16T12:12:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2011/CVE-2011-3026.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 5274773,
"name": "cve-2011-3026-firefox",
"full_name": "argp\/cve-2011-3026-firefox",
"owner": {
"login": "argp",
"id": 145419,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145419?v=4",
"html_url": "https:\/\/github.com\/argp"
},
"html_url": "https:\/\/github.com\/argp\/cve-2011-3026-firefox",
"description": "Example of exploiting CVE-2011-3026 on Firefox (Linux\/x86)",
"fork": false,
"created_at": "2012-08-02T16:12:06Z",
"updated_at": "2018-05-07T05:03:19Z",
"pushed_at": "2012-08-06T09:52:05Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2021-05-26T07:13:50Z",
"updated_at": "2021-07-02T21:31:02Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 429,
"watchers_count": 429,
"forks_count": 188,
"forks": 188,
"watchers": 429,
"stargazers_count": 430,
"watchers_count": 430,
"forks_count": 190,
"forks": 190,
"watchers": 430,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2021-06-26T05:39:09Z",
"updated_at": "2021-07-02T21:29:09Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 485,
"watchers_count": 485,
"stargazers_count": 486,
"watchers_count": 486,
"forks_count": 198,
"forks": 198,
"watchers": 485,
"watchers": 486,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2021-07-01T16:20:17Z",
"updated_at": "2021-07-02T21:18:56Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 497,
"watchers_count": 497,
"forks_count": 250,
"forks": 250,
"watchers": 497,
"stargazers_count": 498,
"watchers_count": 498,
"forks_count": 251,
"forks": 251,
"watchers": 498,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2021-06-23T11:04:54Z",
"updated_at": "2021-07-02T21:30:20Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 700,
"watchers_count": 700,
"stargazers_count": 701,
"watchers_count": 701,
"forks_count": 187,
"forks": 187,
"watchers": 700,
"watchers": 701,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
"fork": false,
"created_at": "2018-05-07T10:34:10Z",
"updated_at": "2021-07-02T10:51:02Z",
"updated_at": "2021-07-02T22:08:17Z",
"pushed_at": "2018-05-10T15:08:43Z",
"stargazers_count": 210,
"watchers_count": 210,
"stargazers_count": 209,
"watchers_count": 209,
"forks_count": 69,
"forks": 69,
"watchers": 210,
"watchers": 209,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
"fork": false,
"created_at": "2019-05-11T12:11:05Z",
"updated_at": "2021-03-18T01:53:30Z",
"pushed_at": "2019-05-13T22:21:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"updated_at": "2021-07-02T22:13:20Z",
"pushed_at": "2021-07-03T02:34:44Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2021-06-30T07:08:22Z",
"updated_at": "2021-07-02T21:28:50Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 455,
"watchers_count": 455,
"forks_count": 206,
"forks": 206,
"watchers": 455,
"stargazers_count": 456,
"watchers_count": 456,
"forks_count": 207,
"forks": 207,
"watchers": 456,
"score": 0
},
{

View file

@ -312,13 +312,13 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2021-06-30T05:56:42Z",
"updated_at": "2021-07-02T21:33:38Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 354,
"watchers_count": 354,
"forks_count": 189,
"forks": 189,
"watchers": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 190,
"forks": 190,
"watchers": 355,
"score": 0
},
{
@ -910,13 +910,13 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2021-06-17T16:04:02Z",
"updated_at": "2021-07-02T21:29:49Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 475,
"watchers_count": 475,
"forks_count": 193,
"forks": 193,
"watchers": 475,
"stargazers_count": 476,
"watchers_count": 476,
"forks_count": 194,
"forks": 194,
"watchers": 476,
"score": 0
},
{
@ -1416,13 +1416,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-06-14T22:04:09Z",
"updated_at": "2021-07-02T21:18:28Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 355,
"forks": 355,
"watchers": 1072,
"stargazers_count": 1073,
"watchers_count": 1073,
"forks_count": 356,
"forks": 356,
"watchers": 1073,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 153,
"watchers_count": 153,
"forks_count": 82,
"forks": 82,
"forks_count": 83,
"forks": 83,
"watchers": 153,
"score": 0
},

View file

@ -359,7 +359,7 @@
"fork": false,
"created_at": "2021-07-02T19:51:18Z",
"updated_at": "2021-07-02T19:53:25Z",
"pushed_at": "2021-07-02T19:53:23Z",
"pushed_at": "2021-07-02T22:55:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -82,13 +82,13 @@
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
"fork": false,
"created_at": "2020-01-24T19:47:45Z",
"updated_at": "2021-05-14T21:13:23Z",
"updated_at": "2021-07-03T00:34:22Z",
"pushed_at": "2020-01-31T13:49:06Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 18,
"forks": 18,
"watchers": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 19,
"forks": 19,
"watchers": 77,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-07-02T19:44:40Z",
"updated_at": "2021-07-02T21:17:59Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 807,
"watchers_count": 807,
"forks_count": 231,
"forks": 231,
"watchers": 807,
"stargazers_count": 808,
"watchers_count": 808,
"forks_count": 232,
"forks": 232,
"watchers": 808,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2021-07-01T06:44:59Z",
"updated_at": "2021-07-02T21:32:35Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 46,
"forks": 46,
"watchers": 228,
"stargazers_count": 229,
"watchers_count": 229,
"forks_count": 47,
"forks": 47,
"watchers": 229,
"score": 0
},
{
@ -619,5 +619,28 @@
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 382503531,
"name": "CVE-2020-14882-14883",
"full_name": "N0Coriander\/CVE-2020-14882-14883",
"owner": {
"login": "N0Coriander",
"id": 53027649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53027649?v=4",
"html_url": "https:\/\/github.com\/N0Coriander"
},
"html_url": "https:\/\/github.com\/N0Coriander\/CVE-2020-14882-14883",
"description": "结合14882的未授权访问漏洞通过14883可远程执行任意代码",
"fork": false,
"created_at": "2021-07-03T02:02:42Z",
"updated_at": "2021-07-03T02:17:57Z",
"pushed_at": "2021-07-03T02:29:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2021-07-02T20:40:49Z",
"updated_at": "2021-07-03T00:14:17Z",
"pushed_at": "2021-07-02T04:48:28Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 15,
"forks": 15,
"watchers": 236,
"watchers": 239,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2021-06-29T06:36:05Z",
"updated_at": "2021-07-03T01:20:33Z",
"pushed_at": "2021-04-20T10:12:22Z",
"stargazers_count": 230,
"watchers_count": 230,
"stargazers_count": 231,
"watchers_count": 231,
"forks_count": 94,
"forks": 94,
"watchers": 230,
"watchers": 231,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "C# and Impacket implementation of CVE-2021-1675\/PrintNightmare",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-07-02T21:17:05Z",
"updated_at": "2021-07-03T03:16:25Z",
"pushed_at": "2021-07-02T16:40:23Z",
"stargazers_count": 799,
"watchers_count": 799,
"forks_count": 317,
"forks": 317,
"watchers": 799,
"stargazers_count": 835,
"watchers_count": 835,
"forks_count": 322,
"forks": 322,
"watchers": 835,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2021-1675 Detection Info",
"fork": false,
"created_at": "2021-06-30T18:32:17Z",
"updated_at": "2021-07-02T20:47:25Z",
"pushed_at": "2021-07-02T15:43:43Z",
"stargazers_count": 104,
"watchers_count": 104,
"updated_at": "2021-07-03T01:57:24Z",
"pushed_at": "2021-07-02T21:27:47Z",
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 18,
"forks": 18,
"watchers": 104,
"watchers": 107,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2021-1675 LPE Exploit",
"fork": false,
"created_at": "2021-07-01T09:00:31Z",
"updated_at": "2021-07-02T15:14:29Z",
"updated_at": "2021-07-03T01:22:22Z",
"pushed_at": "2021-07-02T10:47:36Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
"updated_at": "2021-07-02T20:23:37Z",
"updated_at": "2021-07-03T02:57:37Z",
"pushed_at": "2021-07-01T13:24:06Z",
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 36,
"forks": 36,
"watchers": 146,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 37,
"forks": 37,
"watchers": 152,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": null,
"fork": false,
"created_at": "2021-07-01T13:58:01Z",
"updated_at": "2021-07-02T18:30:20Z",
"updated_at": "2021-07-02T23:47:12Z",
"pushed_at": "2021-07-01T14:26:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-07-02T20:35:48Z",
"updated_at": "2021-07-03T02:53:13Z",
"pushed_at": "2021-07-02T16:03:25Z",
"stargazers_count": 219,
"watchers_count": 219,
"forks_count": 60,
"forks": 60,
"watchers": 219,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 66,
"forks": 66,
"watchers": 249,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare",
"fork": false,
"created_at": "2021-07-02T01:45:00Z",
"updated_at": "2021-07-02T15:47:11Z",
"updated_at": "2021-07-03T00:18:08Z",
"pushed_at": "2021-07-02T01:52:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -366,5 +366,51 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 382466613,
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"full_name": "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"owner": {
"login": "gohrenberg",
"id": 80491750,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4",
"html_url": "https:\/\/github.com\/gohrenberg"
},
"html_url": "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
"fork": false,
"created_at": "2021-07-02T21:18:11Z",
"updated_at": "2021-07-02T22:08:33Z",
"pushed_at": "2021-07-02T22:06:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 382496518,
"name": "cve-2021-1675-printnightmare",
"full_name": "initconf\/cve-2021-1675-printnightmare",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf"
},
"html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare",
"description": "to catch cve-2021-1675-printnightmare",
"fork": false,
"created_at": "2021-07-03T01:04:06Z",
"updated_at": "2021-07-03T01:08:45Z",
"pushed_at": "2021-07-03T01:08:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 78,
"forks": 78,
"forks_count": 79,
"forks": 79,
"watchers": 313,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2021-07-02T06:50:47Z",
"updated_at": "2021-07-02T23:40:59Z",
"pushed_at": "2021-06-03T21:29:39Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 39,
"forks": 39,
"watchers": 155,
"watchers": 156,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "cve-2021-21985 exploit",
"fork": false,
"created_at": "2021-06-03T12:17:06Z",
"updated_at": "2021-06-30T16:11:52Z",
"updated_at": "2021-07-03T01:26:50Z",
"pushed_at": "2021-06-07T01:44:03Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 18,
"forks": 18,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "对CVE-2021-29505进行复现并分析学了下Xstream反序列化过程",
"fork": false,
"created_at": "2021-06-08T05:27:57Z",
"updated_at": "2021-06-17T06:44:31Z",
"updated_at": "2021-07-03T02:48:45Z",
"pushed_at": "2021-06-08T05:55:57Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2021-06-30T05:56:53Z",
"updated_at": "2021-07-02T23:42:47Z",
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 740,
"watchers_count": 740,
"stargazers_count": 741,
"watchers_count": 741,
"forks_count": 122,
"forks": 122,
"watchers": 740,
"watchers": 741,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-06-30T14:10:03Z",
"updated_at": "2021-07-02T21:20:15Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 733,
"watchers_count": 733,
"forks_count": 207,
"forks": 207,
"watchers": 733,
"stargazers_count": 734,
"watchers_count": 734,
"forks_count": 208,
"forks": 208,
"watchers": 734,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527",
"fork": false,
"created_at": "2021-07-02T07:30:52Z",
"updated_at": "2021-07-02T20:38:52Z",
"updated_at": "2021-07-03T01:43:20Z",
"pushed_at": "2021-07-02T20:38:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2021-07-02T20:52:24Z",
"updated_at": "2021-07-03T03:16:54Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 2,
"forks": 2,
"watchers": 29,
"watchers": 36,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "openam-CVE-2021-35464 tomcat 执行命令回显",
"fork": false,
"created_at": "2021-07-01T03:51:32Z",
"updated_at": "2021-07-02T15:38:35Z",
"updated_at": "2021-07-03T02:27:52Z",
"pushed_at": "2021-07-01T03:56:55Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 4,
"forks": 4,
"watchers": 44,
"watchers": 46,
"score": 0
}
]

View file

@ -50,6 +50,8 @@ Windows Print Spooler Elevation of Privilege Vulnerability
- [killtr0/CVE-2021-1675-PrintNightmare](https://github.com/killtr0/CVE-2021-1675-PrintNightmare)
- [kougyokugentou/CVE-2021-1675](https://github.com/kougyokugentou/CVE-2021-1675)
- [ptter23/CVE-2021-1675](https://github.com/ptter23/CVE-2021-1675)
- [gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler](https://github.com/gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler)
- [initconf/cve-2021-1675-printnightmare](https://github.com/initconf/cve-2021-1675-printnightmare)
### CVE-2021-1699 (2021-01-12)
@ -1824,7 +1826,12 @@ In Artica Pandora FMS <=754 in the File Manager component, there is sensitive
- [AlAIAL90/CVE-2021-34075](https://github.com/AlAIAL90/CVE-2021-34075)
### CVE-2021-34527
### CVE-2021-34527 (2021-07-02)
<code>
Windows Print Spooler Remote Code Execution Vulnerability
</code>
- [DenizSe/CVE-2021-34527](https://github.com/DenizSe/CVE-2021-34527)
- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare)
- [JohnHammond/CVE-2021-34527](https://github.com/JohnHammond/CVE-2021-34527)
@ -4741,6 +4748,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [milo2012/CVE-2020-14882](https://github.com/milo2012/CVE-2020-14882)
- [nice0e3/CVE-2020-14882_Exploit_Gui](https://github.com/nice0e3/CVE-2020-14882_Exploit_Gui)
- [exploitblizzard/CVE-2020-14882-WebLogic](https://github.com/exploitblizzard/CVE-2020-14882-WebLogic)
- [N0Coriander/CVE-2020-14882-14883](https://github.com/N0Coriander/CVE-2020-14882-14883)
### CVE-2020-14883 (2020-10-21)
@ -18923,6 +18931,14 @@ The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly ha
- [samaujs/CVE-2011-1475](https://github.com/samaujs/CVE-2011-1475)
### CVE-2011-1485 (2011-05-31)
<code>
Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
</code>
- [Pashkela/CVE-2011-1485](https://github.com/Pashkela/CVE-2011-1485)
### CVE-2011-1571 (2011-05-07)
<code>
@ -18982,6 +18998,14 @@ Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.
- [pwntester/SpringBreaker](https://github.com/pwntester/SpringBreaker)
### CVE-2011-3026 (2012-02-16)
<code>
Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
</code>
- [argp/cve-2011-3026-firefox](https://github.com/argp/cve-2011-3026-firefox)
### CVE-2011-3192 (2011-08-29)
<code>