diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index f4606ab935..563a72ebc3 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-03T08:48:31Z",
+ "updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1048,
- "watchers_count": 1048,
+ "stargazers_count": 1049,
+ "watchers_count": 1049,
"forks_count": 234,
"forks": 234,
- "watchers": 1048,
+ "watchers": 1049,
"score": 0
},
{
diff --git a/2015/CVE-2015-7297.json b/2015/CVE-2015-7297.json
index f046542141..ec998fc7d1 100644
--- a/2015/CVE-2015-7297.json
+++ b/2015/CVE-2015-7297.json
@@ -23,26 +23,26 @@
"score": 0
},
{
- "id": 295014591,
+ "id": 308175941,
"name": "exploit-joomla",
- "full_name": "kally-life\/exploit-joomla",
+ "full_name": "areaventuno\/exploit-joomla",
"owner": {
- "login": "kally-life",
- "id": 57679174,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57679174?v=4",
- "html_url": "https:\/\/github.com\/kally-life"
+ "login": "areaventuno",
+ "id": 73592193,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73592193?v=4",
+ "html_url": "https:\/\/github.com\/areaventuno"
},
- "html_url": "https:\/\/github.com\/kally-life\/exploit-joomla",
+ "html_url": "https:\/\/github.com\/areaventuno\/exploit-joomla",
"description": "Un semplice exploit che sfrutta CVE-2015-7297, CVE-2015-7857 and CVE-2015-7858 per elencare gli utenti con la psw del db",
"fork": false,
- "created_at": "2020-09-12T19:44:41Z",
- "updated_at": "2020-09-13T18:08:13Z",
- "pushed_at": "2020-09-13T18:08:11Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "forks_count": 2,
- "forks": 2,
- "watchers": 2,
+ "created_at": "2020-10-29T00:35:35Z",
+ "updated_at": "2021-06-03T13:29:34Z",
+ "pushed_at": "2020-09-13T18:01:18Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 0,
"score": 0
}
]
\ No newline at end of file
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index d46be884c9..28945d48f1 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-03T08:48:31Z",
+ "updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1048,
- "watchers_count": 1048,
+ "stargazers_count": 1049,
+ "watchers_count": 1049,
"forks_count": 234,
"forks": 234,
- "watchers": 1048,
+ "watchers": 1049,
"score": 0
},
{
diff --git a/2016/CVE-2016-10033.json b/2016/CVE-2016-10033.json
index a8b3276960..d7b354a8e6 100644
--- a/2016/CVE-2016-10033.json
+++ b/2016/CVE-2016-10033.json
@@ -109,8 +109,8 @@
"pushed_at": "2017-05-19T12:57:32Z",
"stargazers_count": 0,
"watchers_count": 0,
- "forks_count": 0,
- "forks": 0,
+ "forks_count": 1,
+ "forks": 1,
"watchers": 0,
"score": 0
},
diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json
index a6580a3a18..cdd76077a0 100644
--- a/2017/CVE-2017-0144.json
+++ b/2017/CVE-2017-0144.json
@@ -36,13 +36,13 @@
"description": "CVE-2017-0144",
"fork": false,
"created_at": "2019-06-02T03:41:47Z",
- "updated_at": "2021-03-17T09:29:07Z",
+ "updated_at": "2021-06-03T12:27:46Z",
"pushed_at": "2019-06-02T03:51:12Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 0,
+ "watchers_count": 0,
"forks_count": 0,
"forks": 0,
- "watchers": 1,
+ "watchers": 0,
"score": 0
},
{
diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json
index cfee5c0ac9..91ce6b93e0 100644
--- a/2017/CVE-2017-11882.json
+++ b/2017/CVE-2017-11882.json
@@ -105,13 +105,13 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
- "updated_at": "2021-06-01T12:58:46Z",
+ "updated_at": "2021-06-03T13:05:09Z",
"pushed_at": "2017-12-06T12:47:31Z",
- "stargazers_count": 282,
- "watchers_count": 282,
+ "stargazers_count": 283,
+ "watchers_count": 283,
"forks_count": 84,
"forks": 84,
- "watchers": 282,
+ "watchers": 283,
"score": 0
},
{
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 878b98dc23..16949c7d73 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-03T08:48:31Z",
+ "updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1048,
- "watchers_count": 1048,
+ "stargazers_count": 1049,
+ "watchers_count": 1049,
"forks_count": 234,
"forks": 234,
- "watchers": 1048,
+ "watchers": 1049,
"score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-8917.json b/2017/CVE-2017-8917.json
index 9b61948210..d5ca118908 100644
--- a/2017/CVE-2017-8917.json
+++ b/2017/CVE-2017-8917.json
@@ -13,13 +13,13 @@
"description": "Joomla 3.7 SQL injection (CVE-2017-8917)",
"fork": false,
"created_at": "2017-05-19T15:21:46Z",
- "updated_at": "2021-02-28T21:11:38Z",
+ "updated_at": "2021-06-03T12:54:34Z",
"pushed_at": "2017-05-19T15:30:18Z",
- "stargazers_count": 9,
- "watchers_count": 9,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"forks_count": 3,
"forks": 3,
- "watchers": 9,
+ "watchers": 8,
"score": 0
},
{
diff --git a/2018/CVE-2018-14714.json b/2018/CVE-2018-14714.json
index 51e0c58514..b96e57cd80 100644
--- a/2018/CVE-2018-14714.json
+++ b/2018/CVE-2018-14714.json
@@ -13,13 +13,13 @@
"description": "POC CVE-2018-14714",
"fork": false,
"created_at": "2020-04-25T03:43:44Z",
- "updated_at": "2021-02-13T16:18:17Z",
+ "updated_at": "2021-06-03T11:34:48Z",
"pushed_at": "2021-02-13T16:18:15Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"forks_count": 0,
"forks": 0,
- "watchers": 5,
+ "watchers": 6,
"score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 1ce10217d4..64c8a908c9 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-03T08:48:31Z",
+ "updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1048,
- "watchers_count": 1048,
+ "stargazers_count": 1049,
+ "watchers_count": 1049,
"forks_count": 234,
"forks": 234,
- "watchers": 1048,
+ "watchers": 1049,
"score": 0
},
{
diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json
index 3fc3706769..c578531054 100644
--- a/2018/CVE-2018-5955.json
+++ b/2018/CVE-2018-5955.json
@@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
- "updated_at": "2021-06-03T08:32:03Z",
+ "updated_at": "2021-06-03T12:29:14Z",
"pushed_at": "2020-01-05T21:46:25Z",
- "stargazers_count": 426,
- "watchers_count": 426,
+ "stargazers_count": 427,
+ "watchers_count": 427,
"forks_count": 100,
"forks": 100,
- "watchers": 426,
+ "watchers": 427,
"score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json
index 77982b1600..9e795f3c1a 100644
--- a/2018/CVE-2018-7600.json
+++ b/2018/CVE-2018-7600.json
@@ -454,8 +454,8 @@
"pushed_at": "2020-08-31T14:52:37Z",
"stargazers_count": 4,
"watchers_count": 4,
- "forks_count": 3,
- "forks": 3,
+ "forks_count": 4,
+ "forks": 4,
"watchers": 4,
"score": 0
},
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index 782a597422..a1b8227ea3 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -684,8 +684,8 @@
"pushed_at": "2020-03-25T05:07:43Z",
"stargazers_count": 84,
"watchers_count": 84,
- "forks_count": 20,
- "forks": 20,
+ "forks_count": 21,
+ "forks": 21,
"watchers": 84,
"score": 0
},
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 5c1b2dbb8a..6fdc5e2090 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-03T08:48:31Z",
+ "updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1048,
- "watchers_count": 1048,
+ "stargazers_count": 1049,
+ "watchers_count": 1049,
"forks_count": 234,
"forks": 234,
- "watchers": 1048,
+ "watchers": 1049,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-0022.json b/2020/CVE-2020-0022.json
index 2ad6e2b935..c9bf659687 100644
--- a/2020/CVE-2020-0022.json
+++ b/2020/CVE-2020-0022.json
@@ -59,13 +59,13 @@
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
"fork": false,
"created_at": "2020-08-24T19:33:10Z",
- "updated_at": "2021-06-01T08:38:51Z",
+ "updated_at": "2021-06-03T14:46:00Z",
"pushed_at": "2021-03-21T20:59:46Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"forks_count": 6,
"forks": 6,
- "watchers": 17,
+ "watchers": 18,
"score": 0
},
{
diff --git a/2020/CVE-2020-10977.json b/2020/CVE-2020-10977.json
index 163e08610d..8a1e3da286 100644
--- a/2020/CVE-2020-10977.json
+++ b/2020/CVE-2020-10977.json
@@ -36,13 +36,13 @@
"description": "GitLab 12.9.0 Arbitrary File Read ",
"fork": false,
"created_at": "2020-11-20T15:40:03Z",
- "updated_at": "2021-05-25T06:13:30Z",
+ "updated_at": "2021-06-03T09:51:06Z",
"pushed_at": "2021-04-23T19:21:16Z",
- "stargazers_count": 44,
- "watchers_count": 44,
+ "stargazers_count": 45,
+ "watchers_count": 45,
"forks_count": 18,
"forks": 18,
- "watchers": 44,
+ "watchers": 45,
"score": 0
},
{
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 1f10f3cd8c..b17dcc7969 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
- "updated_at": "2021-06-02T15:28:47Z",
+ "updated_at": "2021-06-03T12:23:21Z",
"pushed_at": "2020-10-21T12:10:28Z",
- "stargazers_count": 1289,
- "watchers_count": 1289,
+ "stargazers_count": 1288,
+ "watchers_count": 1288,
"forks_count": 293,
"forks": 293,
- "watchers": 1289,
+ "watchers": 1288,
"score": 0
},
{
@@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
- "updated_at": "2021-06-01T23:10:43Z",
+ "updated_at": "2021-06-03T11:57:59Z",
"pushed_at": "2020-11-05T16:37:20Z",
- "stargazers_count": 209,
- "watchers_count": 209,
+ "stargazers_count": 210,
+ "watchers_count": 210,
"forks_count": 40,
"forks": 40,
- "watchers": 209,
+ "watchers": 210,
"score": 0
},
{
diff --git a/2020/CVE-2020-24949.json b/2020/CVE-2020-24949.json
new file mode 100644
index 0000000000..82b06df843
--- /dev/null
+++ b/2020/CVE-2020-24949.json
@@ -0,0 +1,25 @@
+[
+ {
+ "id": 373457880,
+ "name": "CVE-2020-24949",
+ "full_name": "r90tpass\/CVE-2020-24949",
+ "owner": {
+ "login": "r90tpass",
+ "id": 82740056,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
+ "html_url": "https:\/\/github.com\/r90tpass"
+ },
+ "html_url": "https:\/\/github.com\/r90tpass\/CVE-2020-24949",
+ "description": "PHPFusion 9.03.50 - Remote Code Execution",
+ "fork": false,
+ "created_at": "2021-06-03T09:49:22Z",
+ "updated_at": "2021-06-03T09:50:31Z",
+ "pushed_at": "2021-06-03T09:50:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 48cfcfc90d..3ca2b0d0ce 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-06-03T08:48:31Z",
+ "updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1048,
- "watchers_count": 1048,
+ "stargazers_count": 1049,
+ "watchers_count": 1049,
"forks_count": 234,
"forks": 234,
- "watchers": 1048,
+ "watchers": 1049,
"score": 0
},
{
diff --git a/2020/CVE-2020-36109.json b/2020/CVE-2020-36109.json
index 1c2e9d7a98..aa24186e88 100644
--- a/2020/CVE-2020-36109.json
+++ b/2020/CVE-2020-36109.json
@@ -13,13 +13,13 @@
"description": "PoC DoS CVE-2020-36109",
"fork": false,
"created_at": "2021-02-13T16:03:36Z",
- "updated_at": "2021-02-15T09:25:48Z",
+ "updated_at": "2021-06-03T11:33:50Z",
"pushed_at": "2021-02-15T09:25:45Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-7471.json b/2020/CVE-2020-7471.json
index 21e0db42b2..6e32719389 100644
--- a/2020/CVE-2020-7471.json
+++ b/2020/CVE-2020-7471.json
@@ -113,5 +113,28 @@
"forks": 1,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 373481625,
+ "name": "CVE-2020-7471-Django",
+ "full_name": "huzaifakhan771\/CVE-2020-7471-Django",
+ "owner": {
+ "login": "huzaifakhan771",
+ "id": 56702423,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56702423?v=4",
+ "html_url": "https:\/\/github.com\/huzaifakhan771"
+ },
+ "html_url": "https:\/\/github.com\/huzaifakhan771\/CVE-2020-7471-Django",
+ "description": "PoC for the SQL injection vulnerability in PostgreSQL with Django, found in Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3",
+ "fork": false,
+ "created_at": "2021-06-03T11:21:27Z",
+ "updated_at": "2021-06-03T11:37:30Z",
+ "pushed_at": "2021-06-03T11:37:28Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json
index ea5f7658b8..b98f4cb4de 100644
--- a/2021/CVE-2021-21551.json
+++ b/2021/CVE-2021-21551.json
@@ -79,11 +79,11 @@
"html_url": "https:\/\/github.com\/mathisvickie"
},
"html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-21551",
- "description": "CVE-2021-21551 local privilege escalation to nt authority\/system",
+ "description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
"fork": false,
"created_at": "2021-05-30T10:15:10Z",
- "updated_at": "2021-06-01T17:51:31Z",
- "pushed_at": "2021-05-31T13:05:24Z",
+ "updated_at": "2021-06-03T13:01:07Z",
+ "pushed_at": "2021-06-03T14:47:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
index a8d106da30..404a0b724f 100644
--- a/2021/CVE-2021-21985.json
+++ b/2021/CVE-2021-21985.json
@@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
- "updated_at": "2021-06-03T07:53:34Z",
- "pushed_at": "2021-05-31T06:14:36Z",
- "stargazers_count": 80,
- "watchers_count": 80,
+ "updated_at": "2021-06-03T10:19:10Z",
+ "pushed_at": "2021-06-03T10:04:41Z",
+ "stargazers_count": 82,
+ "watchers_count": 82,
"forks_count": 17,
"forks": 17,
- "watchers": 80,
+ "watchers": 82,
"score": 0
},
{
@@ -90,5 +90,51 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 373460655,
+ "name": "CVE-2021-21985",
+ "full_name": "r0ckysec\/CVE-2021-21985",
+ "owner": {
+ "login": "r0ckysec",
+ "id": 44518337,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44518337?v=4",
+ "html_url": "https:\/\/github.com\/r0ckysec"
+ },
+ "html_url": "https:\/\/github.com\/r0ckysec\/CVE-2021-21985",
+ "description": "CVE-2021-21985 vmware vcenter 远程代码执行 EXP",
+ "fork": false,
+ "created_at": "2021-06-03T09:59:21Z",
+ "updated_at": "2021-06-03T14:42:51Z",
+ "pushed_at": "2021-06-03T11:07:53Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 2,
+ "score": 0
+ },
+ {
+ "id": 373496154,
+ "name": "cve-2021-21985_exp",
+ "full_name": "xnianq\/cve-2021-21985_exp",
+ "owner": {
+ "login": "xnianq",
+ "id": 17513849,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17513849?v=4",
+ "html_url": "https:\/\/github.com\/xnianq"
+ },
+ "html_url": "https:\/\/github.com\/xnianq\/cve-2021-21985_exp",
+ "description": "cve-2021-21985 exploit",
+ "fork": false,
+ "created_at": "2021-06-03T12:17:06Z",
+ "updated_at": "2021-06-03T13:43:17Z",
+ "pushed_at": "2021-06-03T13:43:15Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-24086.json b/2021/CVE-2021-24086.json
index d75c241bf8..e823679429 100644
--- a/2021/CVE-2021-24086.json
+++ b/2021/CVE-2021-24086.json
@@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
"fork": false,
"created_at": "2021-04-07T11:10:40Z",
- "updated_at": "2021-06-01T23:23:47Z",
+ "updated_at": "2021-06-03T12:49:07Z",
"pushed_at": "2021-04-15T12:46:54Z",
- "stargazers_count": 172,
- "watchers_count": 172,
+ "stargazers_count": 173,
+ "watchers_count": 173,
"forks_count": 37,
"forks": 37,
- "watchers": 172,
+ "watchers": 173,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-27651.json b/2021/CVE-2021-27651.json
index 7e800520d3..2ff3ee8ac8 100644
--- a/2021/CVE-2021-27651.json
+++ b/2021/CVE-2021-27651.json
@@ -13,13 +13,13 @@
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
"fork": false,
"created_at": "2021-05-16T01:40:47Z",
- "updated_at": "2021-06-02T06:47:25Z",
+ "updated_at": "2021-06-03T13:09:57Z",
"pushed_at": "2021-05-16T05:54:07Z",
- "stargazers_count": 40,
- "watchers_count": 40,
+ "stargazers_count": 41,
+ "watchers_count": 41,
"forks_count": 8,
"forks": 8,
- "watchers": 40,
+ "watchers": 41,
"score": 0
},
{
diff --git a/2021/CVE-2021-27965.json b/2021/CVE-2021-27965.json
new file mode 100644
index 0000000000..abfc688d24
--- /dev/null
+++ b/2021/CVE-2021-27965.json
@@ -0,0 +1,25 @@
+[
+ {
+ "id": 373502325,
+ "name": "CVE-2021-27965",
+ "full_name": "mathisvickie\/CVE-2021-27965",
+ "owner": {
+ "login": "mathisvickie",
+ "id": 60326914,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60326914?v=4",
+ "html_url": "https:\/\/github.com\/mathisvickie"
+ },
+ "html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-27965",
+ "description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
+ "fork": false,
+ "created_at": "2021-06-03T12:39:11Z",
+ "updated_at": "2021-06-03T14:03:54Z",
+ "pushed_at": "2021-06-03T13:57:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json
index 304a631873..8aed961bae 100644
--- a/2021/CVE-2021-28476.json
+++ b/2021/CVE-2021-28476.json
@@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
- "updated_at": "2021-06-03T07:32:25Z",
+ "updated_at": "2021-06-03T14:06:06Z",
"pushed_at": "2021-06-01T15:08:23Z",
- "stargazers_count": 137,
- "watchers_count": 137,
+ "stargazers_count": 141,
+ "watchers_count": 141,
"forks_count": 25,
"forks": 25,
- "watchers": 137,
+ "watchers": 141,
"score": 0
},
{
@@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-06-02T14:50:56Z",
- "updated_at": "2021-06-03T06:25:30Z",
+ "updated_at": "2021-06-03T10:55:55Z",
"pushed_at": "2021-06-02T14:54:14Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"forks_count": 1,
"forks": 1,
- "watchers": 4,
+ "watchers": 6,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index a390a52aa9..179ace0127 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
- "updated_at": "2021-06-01T02:43:38Z",
+ "updated_at": "2021-06-03T13:27:35Z",
"pushed_at": "2021-05-12T12:01:20Z",
- "stargazers_count": 318,
- "watchers_count": 318,
+ "stargazers_count": 319,
+ "watchers_count": 319,
"forks_count": 54,
"forks": 54,
- "watchers": 318,
+ "watchers": 319,
"score": 0
},
{
diff --git a/README.md b/README.md
index 27bba4c50c..48fa5ccfce 100644
--- a/README.md
+++ b/README.md
@@ -528,6 +528,8 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
- [alt3kx/CVE-2021-21985_PoC](https://github.com/alt3kx/CVE-2021-21985_PoC)
- [onSec-fr/CVE-2021-21985-Checker](https://github.com/onSec-fr/CVE-2021-21985-Checker)
- [mauricelambert/CVE-2021-21985](https://github.com/mauricelambert/CVE-2021-21985)
+- [r0ckysec/CVE-2021-21985](https://github.com/r0ckysec/CVE-2021-21985)
+- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
### CVE-2021-22192 (2021-03-24)
@@ -967,6 +969,14 @@ SonLogger before 6.4.1 is affected by user creation with any user permissions pr
- [erberkan/SonLogger-vulns](https://github.com/erberkan/SonLogger-vulns)
+### CVE-2021-27965 (2021-03-04)
+
+
+The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.
+
+
+- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
+
### CVE-2021-28310 (2021-04-13)
@@ -2518,6 +2528,7 @@ Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL I
- [SNCKER/CVE-2020-7471](https://github.com/SNCKER/CVE-2020-7471)
- [Tempuss/CTF_CVE-2020-7471](https://github.com/Tempuss/CTF_CVE-2020-7471)
- [victomteng1997/cve-2020-7471-Time_Blind_SQLi-](https://github.com/victomteng1997/cve-2020-7471-Time_Blind_SQLi-)
+- [huzaifakhan771/CVE-2020-7471-Django](https://github.com/huzaifakhan771/CVE-2020-7471-Django)
### CVE-2020-7473 (2020-05-07)
@@ -4664,6 +4675,14 @@ InterMind iMind Server through 3.13.65 allows remote unauthenticated attackers t
- [trump88/CVE-2020-24765](https://github.com/trump88/CVE-2020-24765)
+### CVE-2020-24949 (2020-09-03)
+
+
+Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
+
+
+- [r90tpass/CVE-2020-24949](https://github.com/r90tpass/CVE-2020-24949)
+
### CVE-2020-24955 (2020-09-01)
@@ -11367,7 +11386,7 @@ Crestron TSW-X60 all versions prior to 2.001.0037.001 and MC3 all versions prior
### CVE-2018-13379 (2019-06-04)
-An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
+An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
- [milo2012/CVE-2018-13379](https://github.com/milo2012/CVE-2018-13379)
@@ -11383,7 +11402,7 @@ An Improper Limitation of a Pathname to a Restricted Directory ("Path Trave
### CVE-2018-13382 (2019-06-04)
-An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests.
+An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
- [milo2012/CVE-2018-13382](https://github.com/milo2012/CVE-2018-13382)
@@ -16530,7 +16549,7 @@ SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers
- [CCrashBandicot/ContentHistory](https://github.com/CCrashBandicot/ContentHistory)
-- [kally-life/exploit-joomla](https://github.com/kally-life/exploit-joomla)
+- [areaventuno/exploit-joomla](https://github.com/areaventuno/exploit-joomla)
### CVE-2015-7501 (2017-11-09)