diff --git a/2006/CVE-2006-3747.json b/2006/CVE-2006-3747.json index 9a95e27889..45a90e7d96 100644 --- a/2006/CVE-2006-3747.json +++ b/2006/CVE-2006-3747.json @@ -2,14 +2,14 @@ { "id": 74795309, "name": "CVE-2006-3747", - "full_name": "spinfoo\/CVE-2006-3747", + "full_name": "defensahacker\/CVE-2006-3747", "owner": { - "login": "spinfoo", + "login": "defensahacker", "id": 23421429, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23421429?v=4", - "html_url": "https:\/\/github.com\/spinfoo" + "html_url": "https:\/\/github.com\/defensahacker" }, - "html_url": "https:\/\/github.com\/spinfoo\/CVE-2006-3747", + "html_url": "https:\/\/github.com\/defensahacker\/CVE-2006-3747", "description": "Information about my advisory on CVE-2006-3747 (Apache mod_rewrite LDAP off-by-one buffer overflow).. At the time, it was the first public working exploit :)", "fork": false, "created_at": "2016-11-26T00:20:33Z", diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index e5f9e346c2..ae6411ffdc 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -1217,5 +1217,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 338782923, + "name": "heartpatch.us", + "full_name": "ingochris\/heartpatch.us", + "owner": { + "login": "ingochris", + "id": 2686679, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2686679?v=4", + "html_url": "https:\/\/github.com\/ingochris" + }, + "html_url": "https:\/\/github.com\/ingochris\/heartpatch.us", + "description": "OpenSSL Heartbleed Bug CVE-2014-0160 Toolkit. Built with ❤ by Christopher Ngo.", + "fork": false, + "created_at": "2021-02-14T10:48:56Z", + "updated_at": "2021-02-14T13:34:20Z", + "pushed_at": "2021-02-14T13:34:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-1000027.json b/2016/CVE-2016-1000027.json index 5aa0768e95..6518e30fda 100644 --- a/2016/CVE-2016-1000027.json +++ b/2016/CVE-2016-1000027.json @@ -13,8 +13,8 @@ "description": "PoC for CVE-2016-1000027", "fork": false, "created_at": "2021-02-01T19:46:51Z", - "updated_at": "2021-02-13T09:17:36Z", - "pushed_at": "2021-02-01T22:30:53Z", + "updated_at": "2021-02-14T11:29:55Z", + "pushed_at": "2021-02-14T11:29:53Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2018/CVE-2018-1133.json b/2018/CVE-2018-1133.json index 615f8be6b4..63269b464e 100644 --- a/2018/CVE-2018-1133.json +++ b/2018/CVE-2018-1133.json @@ -13,13 +13,13 @@ "description": "Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133", "fork": false, "created_at": "2019-03-15T14:25:20Z", - "updated_at": "2021-01-24T08:02:06Z", + "updated_at": "2021-02-14T12:38:09Z", "pushed_at": "2019-03-15T14:48:18Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 3, "forks": 3, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index daa7910260..60fd59fe40 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,8 +40,8 @@ "pushed_at": "2020-11-07T05:55:00Z", "stargazers_count": 2334, "watchers_count": 2334, - "forks_count": 656, - "forks": 656, + "forks_count": 657, + "forks": 657, "watchers": 2334, "score": 0 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 5e518f47e2..eb41aaefd1 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -887,13 +887,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-02-14T08:15:34Z", + "updated_at": "2021-02-14T14:24:31Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1072, - "watchers_count": 1072, + "stargazers_count": 1073, + "watchers_count": 1073, "forks_count": 358, "forks": 358, - "watchers": 1072, + "watchers": 1073, "score": 0 }, { diff --git a/2020/CVE-2020-12928.json b/2020/CVE-2020-12928.json index 4eea5a5315..9f57dbdeeb 100644 --- a/2020/CVE-2020-12928.json +++ b/2020/CVE-2020-12928.json @@ -13,8 +13,8 @@ "description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#", "fork": false, "created_at": "2020-11-10T13:08:21Z", - "updated_at": "2021-02-02T13:49:01Z", - "pushed_at": "2020-11-11T20:13:05Z", + "updated_at": "2021-02-14T15:08:06Z", + "pushed_at": "2021-02-14T15:08:01Z", "stargazers_count": 13, "watchers_count": 13, "forks_count": 12, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 10b0be5fba..f23c278904 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -17,8 +17,8 @@ "pushed_at": "2020-11-07T05:55:00Z", "stargazers_count": 2334, "watchers_count": 2334, - "forks_count": 656, - "forks": 656, + "forks_count": 657, + "forks": 657, "watchers": 2334, "score": 0 }, diff --git a/2020/CVE-2020-24032.json b/2020/CVE-2020-24032.json index 4217c631ae..2fc88f265c 100644 --- a/2020/CVE-2020-24032.json +++ b/2020/CVE-2020-24032.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-01-21T08:07:09Z", - "updated_at": "2021-01-21T08:08:29Z", + "updated_at": "2021-02-14T09:24:10Z", "pushed_at": "2021-01-21T08:08:27Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-25747.json b/2020/CVE-2020-25747.json index 6b08c3287a..6b10e7e9d7 100644 --- a/2020/CVE-2020-25747.json +++ b/2020/CVE-2020-25747.json @@ -13,13 +13,13 @@ "description": "CVE-2020-25747", "fork": false, "created_at": "2020-09-18T14:23:35Z", - "updated_at": "2020-09-18T15:02:53Z", + "updated_at": "2021-02-14T09:24:26Z", "pushed_at": "2020-09-18T15:02:50Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-25748.json b/2020/CVE-2020-25748.json index 28c171b595..aaad5a7133 100644 --- a/2020/CVE-2020-25748.json +++ b/2020/CVE-2020-25748.json @@ -13,13 +13,13 @@ "description": "CVE-2020-25748", "fork": false, "created_at": "2020-09-18T15:03:38Z", - "updated_at": "2020-09-18T15:04:20Z", + "updated_at": "2021-02-14T09:24:25Z", "pushed_at": "2020-09-18T15:04:18Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-25749.json b/2020/CVE-2020-25749.json index d10e240e1b..b62234da21 100644 --- a/2020/CVE-2020-25749.json +++ b/2020/CVE-2020-25749.json @@ -13,13 +13,13 @@ "description": "CVE-2020-25749", "fork": false, "created_at": "2020-09-18T15:05:16Z", - "updated_at": "2020-09-18T15:06:02Z", + "updated_at": "2021-02-14T09:24:24Z", "pushed_at": "2020-09-18T15:06:00Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-27747.json b/2020/CVE-2020-27747.json index b136b751e2..e26f129e60 100644 --- a/2020/CVE-2020-27747.json +++ b/2020/CVE-2020-27747.json @@ -13,13 +13,13 @@ "description": "Possible Account Takeover | Brute Force Ability", "fork": false, "created_at": "2020-10-29T09:06:24Z", - "updated_at": "2020-10-29T09:23:49Z", + "updated_at": "2021-02-14T09:24:22Z", "pushed_at": "2020-10-29T09:23:47Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-28414.json b/2020/CVE-2020-28414.json index cd23bd3c2a..73cc904921 100644 --- a/2020/CVE-2020-28414.json +++ b/2020/CVE-2020-28414.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-11-12T13:31:50Z", - "updated_at": "2020-11-12T13:32:04Z", + "updated_at": "2021-02-14T09:24:18Z", "pushed_at": "2020-11-12T13:32:02Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-28415.json b/2020/CVE-2020-28415.json index 9b6f8606ba..6328a2099b 100644 --- a/2020/CVE-2020-28415.json +++ b/2020/CVE-2020-28415.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-11-12T13:32:23Z", - "updated_at": "2020-11-12T13:32:34Z", + "updated_at": "2021-02-14T09:24:17Z", "pushed_at": "2020-11-12T13:32:31Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 68436110b0..31bf1aaec5 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -128,13 +128,13 @@ "description": "CVE-2020-2883", "fork": false, "created_at": "2020-11-26T14:10:25Z", - "updated_at": "2020-11-27T02:12:54Z", + "updated_at": "2021-02-14T12:53:40Z", "pushed_at": "2020-11-27T02:12:52Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-29666.json b/2020/CVE-2020-29666.json index 765a82415f..45cf110733 100644 --- a/2020/CVE-2020-29666.json +++ b/2020/CVE-2020-29666.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-12-10T06:24:48Z", - "updated_at": "2020-12-10T06:39:56Z", + "updated_at": "2021-02-14T09:24:16Z", "pushed_at": "2020-12-10T06:39:55Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-29667.json b/2020/CVE-2020-29667.json index 8cbff7c1ba..c781f195cf 100644 --- a/2020/CVE-2020-29667.json +++ b/2020/CVE-2020-29667.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2020-12-10T06:43:58Z", - "updated_at": "2020-12-10T07:04:44Z", + "updated_at": "2021-02-14T09:24:13Z", "pushed_at": "2020-12-10T07:04:42Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-3187.json b/2020/CVE-2020-3187.json index 916a5da1e8..e87497ef29 100644 --- a/2020/CVE-2020-3187.json +++ b/2020/CVE-2020-3187.json @@ -40,8 +40,8 @@ "pushed_at": "2020-09-10T06:34:29Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 0, "score": 0 } diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index d0bea26723..7cbe548d00 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -59,13 +59,13 @@ "description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check", "fork": false, "created_at": "2020-07-24T15:04:45Z", - "updated_at": "2021-02-07T00:10:48Z", + "updated_at": "2021-02-14T14:19:55Z", "pushed_at": "2020-08-30T21:34:41Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "forks_count": 5, "forks": 5, - "watchers": 19, + "watchers": 20, "score": 0 }, { diff --git a/2021/CVE-2021-21014.json b/2021/CVE-2021-21014.json index 60261cae6b..db02745a7b 100644 --- a/2021/CVE-2021-21014.json +++ b/2021/CVE-2021-21014.json @@ -17,8 +17,8 @@ "pushed_at": "2021-02-13T06:30:25Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 1, "score": 0 } diff --git a/2021/CVE-2021-26700.json b/2021/CVE-2021-26700.json new file mode 100644 index 0000000000..e43dc8a785 --- /dev/null +++ b/2021/CVE-2021-26700.json @@ -0,0 +1,25 @@ +[ + { + "id": 338818030, + "name": "CVE-2021-26700", + "full_name": "jackadamson\/CVE-2021-26700", + "owner": { + "login": "jackadamson", + "id": 7891953, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7891953?v=4", + "html_url": "https:\/\/github.com\/jackadamson" + }, + "html_url": "https:\/\/github.com\/jackadamson\/CVE-2021-26700", + "description": "RCE in NPM VSCode Extention", + "fork": false, + "created_at": "2021-02-14T14:01:04Z", + "updated_at": "2021-02-14T14:01:43Z", + "pushed_at": "2021-02-14T14:01:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-27187.json b/2021/CVE-2021-27187.json index b0584f29dd..3ad1777e61 100644 --- a/2021/CVE-2021-27187.json +++ b/2021/CVE-2021-27187.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-11T15:03:48Z", - "updated_at": "2021-02-11T15:08:26Z", + "updated_at": "2021-02-14T09:24:04Z", "pushed_at": "2021-02-11T15:08:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-27188.json b/2021/CVE-2021-27188.json index 44ac123fd8..ee7a74ae88 100644 --- a/2021/CVE-2021-27188.json +++ b/2021/CVE-2021-27188.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-12T07:32:51Z", - "updated_at": "2021-02-12T07:36:37Z", + "updated_at": "2021-02-14T09:24:02Z", "pushed_at": "2021-02-12T07:36:35Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 4a523321a3..1b1c941d34 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -113,5 +113,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 338768882, + "name": "Laravel-8.4.2-rce-CVE-2021-3129", + "full_name": "FunPhishing\/Laravel-8.4.2-rce-CVE-2021-3129", + "owner": { + "login": "FunPhishing", + "id": 77312720, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77312720?v=4", + "html_url": "https:\/\/github.com\/FunPhishing" + }, + "html_url": "https:\/\/github.com\/FunPhishing\/Laravel-8.4.2-rce-CVE-2021-3129", + "description": null, + "fork": false, + "created_at": "2021-02-14T09:24:07Z", + "updated_at": "2021-02-14T12:27:56Z", + "pushed_at": "2021-02-14T12:27:54Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3130.json b/2021/CVE-2021-3130.json index 3185614370..f06e5625c7 100644 --- a/2021/CVE-2021-3130.json +++ b/2021/CVE-2021-3130.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-01-21T08:04:32Z", - "updated_at": "2021-01-21T12:31:36Z", + "updated_at": "2021-02-14T09:24:07Z", "pushed_at": "2021-01-21T12:31:34Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3131.json b/2021/CVE-2021-3131.json index 294663ef33..7f16322ab0 100644 --- a/2021/CVE-2021-3131.json +++ b/2021/CVE-2021-3131.json @@ -13,13 +13,13 @@ "description": "CVE-2021-3131", "fork": false, "created_at": "2021-01-13T07:41:25Z", - "updated_at": "2021-01-13T07:54:41Z", + "updated_at": "2021-02-14T09:24:11Z", "pushed_at": "2021-01-13T07:54:38Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 1, "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 282d6ec31c..72b9c45319 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -335,13 +335,13 @@ "description": "PoC for CVE-2021-3156 (sudo heap overflow)", "fork": false, "created_at": "2021-01-30T03:22:04Z", - "updated_at": "2021-02-14T07:40:20Z", + "updated_at": "2021-02-14T14:48:57Z", "pushed_at": "2021-02-08T03:42:50Z", - "stargazers_count": 327, - "watchers_count": 327, + "stargazers_count": 329, + "watchers_count": 329, "forks_count": 89, "forks": 89, - "watchers": 327, + "watchers": 329, "score": 0 }, { @@ -381,13 +381,13 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2021-02-14T06:11:37Z", + "updated_at": "2021-02-14T12:59:04Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 572, - "watchers_count": 572, + "stargazers_count": 574, + "watchers_count": 574, "forks_count": 162, "forks": 162, - "watchers": 572, + "watchers": 574, "score": 0 }, { @@ -795,13 +795,13 @@ "description": "CVE-2021-3156非交互式执行命令", "fork": false, "created_at": "2021-02-09T19:25:18Z", - "updated_at": "2021-02-14T02:43:41Z", + "updated_at": "2021-02-14T14:02:26Z", "pushed_at": "2021-02-09T19:31:33Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 91, + "watchers_count": 91, "forks_count": 9, "forks": 9, - "watchers": 89, + "watchers": 91, "score": 0 }, { diff --git a/2021/CVE-2021-3395.json b/2021/CVE-2021-3395.json index 7f32d6607e..8952c8a931 100644 --- a/2021/CVE-2021-3395.json +++ b/2021/CVE-2021-3395.json @@ -13,13 +13,13 @@ "description": null, "fork": false, "created_at": "2021-02-02T18:31:35Z", - "updated_at": "2021-02-02T18:38:02Z", + "updated_at": "2021-02-14T09:24:05Z", "pushed_at": "2021-02-02T18:38:00Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index de5591b5a0..a4acf1af2b 100644 --- a/README.md +++ b/README.md @@ -58,6 +58,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic - [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP) - [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP) - [nth347/CVE-2021-3129-exploit](https://github.com/nth347/CVE-2021-3129-exploit) +- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129) ### CVE-2021-3130 (2021-01-20) @@ -194,6 +195,9 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed ### CVE-2021-26121 - [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121) +### CVE-2021-26700 +- [jackadamson/CVE-2021-26700](https://github.com/jackadamson/CVE-2021-26700) + ### CVE-2021-27187 (2021-02-12) @@ -14963,6 +14967,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p - [WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed](https://github.com/WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed) - [GuillermoEscobero/heartbleed](https://github.com/GuillermoEscobero/heartbleed) - [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan) +- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us) ### CVE-2014-0166 (2014-04-09) @@ -16972,7 +16977,7 @@ Unspecified vulnerability in the command line interface (CLI) in Cisco Unified C Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules. -- [spinfoo/CVE-2006-3747](https://github.com/spinfoo/CVE-2006-3747) +- [defensahacker/CVE-2006-3747](https://github.com/defensahacker/CVE-2006-3747) ### CVE-2006-4777 (2006-09-13)