diff --git a/2015/CVE-2015-1528.json b/2015/CVE-2015-1528.json index 29da230d44..74662b08fa 100644 --- a/2015/CVE-2015-1528.json +++ b/2015/CVE-2015-1528.json @@ -13,17 +13,17 @@ "description": "I'll submit the poc after blackhat", "fork": false, "created_at": "2015-07-17T06:09:41Z", - "updated_at": "2021-08-07T17:11:08Z", + "updated_at": "2021-10-12T02:18:56Z", "pushed_at": "2015-08-30T19:24:32Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "forks_count": 78, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 78, - "watchers": 114, + "watchers": 115, "score": 0 }, { diff --git a/2015/CVE-2015-3825.json b/2015/CVE-2015-3825.json index 736a6a5f22..d7de7c79f2 100644 --- a/2015/CVE-2015-3825.json +++ b/2015/CVE-2015-3825.json @@ -13,17 +13,17 @@ "description": "This app verifies if your device is still vulnerable to CVE-2015-3825 \/ CVE-2015-3837, aka \"One Class to Rule Them All\", by checking if it contains the vulnerable conscrypt's OpenSSLX509Certificate class. A patch was released in August 2015 by Google.", "fork": false, "created_at": "2016-02-13T08:57:44Z", - "updated_at": "2017-12-22T21:03:30Z", + "updated_at": "2021-10-12T02:19:42Z", "pushed_at": "2016-02-13T09:16:01Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index 00c45b2190..ce3083dbdb 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -429,17 +429,17 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2021-10-11T10:22:24Z", + "updated_at": "2021-10-11T23:54:48Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 296, - "watchers_count": 296, + "stargazers_count": 297, + "watchers_count": 297, "forks_count": 105, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 105, - "watchers": 296, + "watchers": 297, "score": 0 }, { diff --git a/2018/CVE-2018-12636.json b/2018/CVE-2018-12636.json index 0d7888e073..1ed6c1edb0 100644 --- a/2018/CVE-2018-12636.json +++ b/2018/CVE-2018-12636.json @@ -2,14 +2,14 @@ { "id": 390422057, "name": "CVE-2018-12636_exploit", - "full_name": "nth347\/CVE-2018-12636_exploit", + "full_name": "hungnt199\/CVE-2018-12636_exploit", "owner": { - "login": "nth347", + "login": "hungnt199", "id": 20441996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4", - "html_url": "https:\/\/github.com\/nth347" + "html_url": "https:\/\/github.com\/hungnt199" }, - "html_url": "https:\/\/github.com\/nth347\/CVE-2018-12636_exploit", + "html_url": "https:\/\/github.com\/hungnt199\/CVE-2018-12636_exploit", "description": "Exploit for CVE-2018-12636", "fork": false, "created_at": "2021-07-28T16:30:05Z", diff --git a/2018/CVE-2018-3810.json b/2018/CVE-2018-3810.json index 1d6157b250..6ffb7cd831 100644 --- a/2018/CVE-2018-3810.json +++ b/2018/CVE-2018-3810.json @@ -56,14 +56,14 @@ { "id": 391018517, "name": "CVE-2018-3810_exploit", - "full_name": "nth347\/CVE-2018-3810_exploit", + "full_name": "hungnt199\/CVE-2018-3810_exploit", "owner": { - "login": "nth347", + "login": "hungnt199", "id": 20441996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4", - "html_url": "https:\/\/github.com\/nth347" + "html_url": "https:\/\/github.com\/hungnt199" }, - "html_url": "https:\/\/github.com\/nth347\/CVE-2018-3810_exploit", + "html_url": "https:\/\/github.com\/hungnt199\/CVE-2018-3810_exploit", "description": "Exploit for CVE-2018-3810", "fork": false, "created_at": "2021-07-30T10:06:04Z", diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index b1080d7fe2..1988c767b5 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1488,12 +1488,12 @@ "pushed_at": "2019-06-22T21:48:45Z", "stargazers_count": 830, "watchers_count": 830, - "forks_count": 241, + "forks_count": 242, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 241, + "forks": 242, "watchers": 830, "score": 0 }, diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 93a5fce6b0..066dd94415 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2021-10-11T08:54:27Z", + "updated_at": "2021-10-12T03:14:22Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1678, - "watchers_count": 1678, + "stargazers_count": 1679, + "watchers_count": 1679, "forks_count": 251, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 251, - "watchers": 1678, + "watchers": 1679, "score": 0 }, { diff --git a/2019/CVE-2019-15858.json b/2019/CVE-2019-15858.json index 7d4abfd475..ca3c8e34e5 100644 --- a/2019/CVE-2019-15858.json +++ b/2019/CVE-2019-15858.json @@ -25,5 +25,35 @@ "forks": 6, "watchers": 29, "score": 0 + }, + { + "id": 416094403, + "name": "CVE-2019-15858", + "full_name": "oxctdev\/CVE-2019-15858", + "owner": { + "login": "oxctdev", + "id": 91846073, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", + "html_url": "https:\/\/github.com\/oxctdev" + }, + "html_url": "https:\/\/github.com\/oxctdev\/CVE-2019-15858", + "description": "Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)", + "fork": false, + "created_at": "2021-10-11T21:37:06Z", + "updated_at": "2021-10-11T21:42:30Z", + "pushed_at": "2021-10-11T21:41:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [ + "cve-2019-15858", + "remote-code-execution" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index c4bd0bf560..a61f3a6a33 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,17 +13,17 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2021-10-11T10:22:24Z", + "updated_at": "2021-10-11T23:54:48Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 296, - "watchers_count": 296, + "stargazers_count": 297, + "watchers_count": 297, "forks_count": 105, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 105, - "watchers": 296, + "watchers": 297, "score": 0 }, { diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json index 9f938faa9e..a2553c193e 100644 --- a/2019/CVE-2019-7304.json +++ b/2019/CVE-2019-7304.json @@ -17,7 +17,7 @@ "pushed_at": "2019-05-09T21:34:26Z", "stargazers_count": 605, "watchers_count": 605, - "forks_count": 149, + "forks_count": 150, "allow_forking": true, "is_template": false, "topics": [ @@ -26,7 +26,7 @@ "security" ], "visibility": "public", - "forks": 149, + "forks": 150, "watchers": 605, "score": 0 }, diff --git a/2019/CVE-2019-9081.json b/2019/CVE-2019-9081.json index 0b4788c4b4..be4af73cb3 100644 --- a/2019/CVE-2019-9081.json +++ b/2019/CVE-2019-9081.json @@ -2,14 +2,14 @@ { "id": 368085499, "name": "CVE-2019-9081_PoC", - "full_name": "nth347\/CVE-2019-9081_PoC", + "full_name": "hungnt199\/CVE-2019-9081_PoC", "owner": { - "login": "nth347", + "login": "hungnt199", "id": 20441996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4", - "html_url": "https:\/\/github.com\/nth347" + "html_url": "https:\/\/github.com\/hungnt199" }, - "html_url": "https:\/\/github.com\/nth347\/CVE-2019-9081_PoC", + "html_url": "https:\/\/github.com\/hungnt199\/CVE-2019-9081_PoC", "description": "PoC for CVE-2019-9081", "fork": false, "created_at": "2021-05-17T06:54:05Z", diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index f8e0320d58..f7f28de340 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -13,10 +13,10 @@ "description": "CVE-2020-15368", "fork": false, "created_at": "2021-06-29T04:38:24Z", - "updated_at": "2021-10-11T18:09:27Z", + "updated_at": "2021-10-12T03:08:41Z", "pushed_at": "2021-10-11T01:30:56Z", - "stargazers_count": 294, - "watchers_count": 294, + "stargazers_count": 295, + "watchers_count": 295, "forks_count": 30, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 30, - "watchers": 294, + "watchers": 295, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 136f60678c..c482c7c05d 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -274,17 +274,17 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-10-11T18:13:55Z", + "updated_at": "2021-10-12T00:03:52Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 653, - "watchers_count": 653, + "stargazers_count": 654, + "watchers_count": 654, "forks_count": 173, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 173, - "watchers": 653, + "watchers": 654, "score": 0 }, { diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index bb44cd5c04..5846d7b8be 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -98,12 +98,12 @@ "pushed_at": "2021-09-25T07:58:15Z", "stargazers_count": 11, "watchers_count": 11, - "forks_count": 8, + "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 7, "watchers": 11, "score": 0 }, @@ -121,17 +121,17 @@ "description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE", "fork": false, "created_at": "2021-09-25T16:21:56Z", - "updated_at": "2021-10-11T18:23:26Z", + "updated_at": "2021-10-12T01:51:06Z", "pushed_at": "2021-10-02T03:17:45Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 102, + "watchers_count": 102, "forks_count": 27, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 27, - "watchers": 100, + "watchers": 102, "score": 0 }, { diff --git a/2021/CVE-2021-24085.json b/2021/CVE-2021-24085.json index 87162b5cc8..e0fb9a8b21 100644 --- a/2021/CVE-2021-24085.json +++ b/2021/CVE-2021-24085.json @@ -17,12 +17,12 @@ "pushed_at": "2021-02-15T15:11:00Z", "stargazers_count": 60, "watchers_count": 60, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 15, + "forks": 16, "watchers": 60, "score": 0 } diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index cec394177a..1318599063 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -98,12 +98,12 @@ "pushed_at": "2021-09-01T01:17:58Z", "stargazers_count": 48, "watchers_count": 48, - "forks_count": 26, + "forks_count": 25, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 26, + "forks": 25, "watchers": 48, "score": 0 }, @@ -152,12 +152,12 @@ "pushed_at": "2021-09-10T19:42:33Z", "stargazers_count": 227, "watchers_count": 227, - "forks_count": 56, + "forks_count": 55, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 56, + "forks": 55, "watchers": 227, "score": 0 }, @@ -179,12 +179,12 @@ "pushed_at": "2021-09-01T10:27:12Z", "stargazers_count": 50, "watchers_count": 50, - "forks_count": 21, + "forks_count": 20, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 21, + "forks": 20, "watchers": 50, "score": 0 }, diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json index 3eec617e4b..2b3551b99f 100644 --- a/2021/CVE-2021-30632.json +++ b/2021/CVE-2021-30632.json @@ -40,17 +40,17 @@ "description": null, "fork": false, "created_at": "2021-09-28T03:47:36Z", - "updated_at": "2021-10-11T19:46:51Z", + "updated_at": "2021-10-12T01:51:32Z", "pushed_at": "2021-09-29T02:20:40Z", - "stargazers_count": 104, - "watchers_count": 104, + "stargazers_count": 105, + "watchers_count": 105, "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 22, - "watchers": 104, + "watchers": 105, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 390a8b78a6..1c441cf658 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -110,14 +110,14 @@ { "id": 333380316, "name": "CVE-2021-3129_exploit", - "full_name": "nth347\/CVE-2021-3129_exploit", + "full_name": "hungnt199\/CVE-2021-3129_exploit", "owner": { - "login": "nth347", + "login": "hungnt199", "id": 20441996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4", - "html_url": "https:\/\/github.com\/nth347" + "html_url": "https:\/\/github.com\/hungnt199" }, - "html_url": "https:\/\/github.com\/nth347\/CVE-2021-3129_exploit", + "html_url": "https:\/\/github.com\/hungnt199\/CVE-2021-3129_exploit", "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-27T10:16:35Z", diff --git a/2021/CVE-2021-31796.json b/2021/CVE-2021-31796.json index 015ef8a892..a57daa3719 100644 --- a/2021/CVE-2021-31796.json +++ b/2021/CVE-2021-31796.json @@ -17,12 +17,12 @@ "pushed_at": "2021-10-11T17:59:48Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2021/CVE-2021-33044.json b/2021/CVE-2021-33044.json new file mode 100644 index 0000000000..9e5937cc18 --- /dev/null +++ b/2021/CVE-2021-33044.json @@ -0,0 +1,29 @@ +[ + { + "id": 416101106, + "name": "DahuaLoginBypass", + "full_name": "bp2008\/DahuaLoginBypass", + "owner": { + "login": "bp2008", + "id": 5639911, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5639911?v=4", + "html_url": "https:\/\/github.com\/bp2008" + }, + "html_url": "https:\/\/github.com\/bp2008\/DahuaLoginBypass", + "description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.", + "fork": false, + "created_at": "2021-10-11T22:08:47Z", + "updated_at": "2021-10-11T22:24:50Z", + "pushed_at": "2021-10-11T22:24:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-33045.json b/2021/CVE-2021-33045.json index a639af85f7..c8e5a5742e 100644 --- a/2021/CVE-2021-33045.json +++ b/2021/CVE-2021-33045.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-10-11T15:11:48Z", - "updated_at": "2021-10-11T15:24:14Z", + "updated_at": "2021-10-12T02:15:56Z", "pushed_at": "2021-10-11T15:23:39Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 757773ad56..b916e44e78 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -229,17 +229,17 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2021-10-11T20:42:57Z", + "updated_at": "2021-10-12T01:02:40Z", "pushed_at": "2021-09-11T09:50:26Z", - "stargazers_count": 1270, - "watchers_count": 1270, + "stargazers_count": 1272, + "watchers_count": 1272, "forks_count": 402, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 402, - "watchers": 1270, + "watchers": 1272, "score": 0 }, { diff --git a/2021/CVE-2021-40870.json b/2021/CVE-2021-40870.json index 0c0bcde0ae..f75f87babc 100644 --- a/2021/CVE-2021-40870.json +++ b/2021/CVE-2021-40870.json @@ -17,7 +17,7 @@ "pushed_at": "2021-10-09T06:06:47Z", "stargazers_count": 7, "watchers_count": 7, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ @@ -25,7 +25,7 @@ "remote-code-execution" ], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 7, "score": 0 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 53befdcf5d..58e43b8237 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -229,17 +229,17 @@ "description": null, "fork": false, "created_at": "2021-10-05T23:53:48Z", - "updated_at": "2021-10-11T09:37:17Z", + "updated_at": "2021-10-12T02:54:17Z", "pushed_at": "2021-10-06T15:37:23Z", - "stargazers_count": 29, - "watchers_count": 29, - "forks_count": 14, + "stargazers_count": 30, + "watchers_count": 30, + "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 29, + "forks": 15, + "watchers": 30, "score": 0 }, { @@ -256,11 +256,11 @@ "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-06T02:28:41Z", - "updated_at": "2021-10-11T16:21:48Z", + "updated_at": "2021-10-11T23:00:45Z", "pushed_at": "2021-10-09T19:37:29Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 4, + "stargazers_count": 11, + "watchers_count": 11, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [ @@ -272,8 +272,8 @@ "rce" ], "visibility": "public", - "forks": 4, - "watchers": 10, + "forks": 5, + "watchers": 11, "score": 0 }, { @@ -722,16 +722,16 @@ "description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)", "fork": false, "created_at": "2021-10-06T23:32:30Z", - "updated_at": "2021-10-10T18:37:54Z", - "pushed_at": "2021-10-08T18:20:09Z", + "updated_at": "2021-10-12T02:59:06Z", + "pushed_at": "2021-10-12T02:59:04Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 3, "score": 0 }, @@ -1097,12 +1097,12 @@ "pushed_at": "2021-10-08T07:27:04Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 9, "score": 0 }, @@ -1147,8 +1147,8 @@ "description": "POC", "fork": false, "created_at": "2021-10-08T15:40:41Z", - "updated_at": "2021-10-11T16:11:44Z", - "pushed_at": "2021-10-10T22:26:26Z", + "updated_at": "2021-10-11T22:24:14Z", + "pushed_at": "2021-10-11T22:24:12Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, @@ -1234,17 +1234,17 @@ "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "fork": false, "created_at": "2021-10-09T03:32:18Z", - "updated_at": "2021-10-11T14:27:20Z", + "updated_at": "2021-10-12T02:03:22Z", "pushed_at": "2021-10-09T03:49:21Z", - "stargazers_count": 66, - "watchers_count": 66, - "forks_count": 21, + "stargazers_count": 69, + "watchers_count": 69, + "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 21, - "watchers": 66, + "forks": 22, + "watchers": 69, "score": 0 }, { @@ -1381,5 +1381,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 416132671, + "name": "CVE-2021-41773-PoC", + "full_name": "0xAlmighty\/CVE-2021-41773-PoC", + "owner": { + "login": "0xAlmighty", + "id": 58662599, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58662599?v=4", + "html_url": "https:\/\/github.com\/0xAlmighty" + }, + "html_url": "https:\/\/github.com\/0xAlmighty\/CVE-2021-41773-PoC", + "description": "Path Traversal and RCE in Apache HTTP Server 2.4.49 ", + "fork": false, + "created_at": "2021-10-12T00:51:32Z", + "updated_at": "2021-10-12T00:53:01Z", + "pushed_at": "2021-10-12T00:52:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 891e99e276..a1d81d20cd 100644 --- a/README.md +++ b/README.md @@ -230,7 +230,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic - [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129) - [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP) - [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP) -- [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit) +- [hungnt199/CVE-2021-3129_exploit](https://github.com/hungnt199/CVE-2021-3129_exploit) - [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129) - [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129) - [simonlee-hello/CVE-2021-3129](https://github.com/simonlee-hello/CVE-2021-3129) @@ -1950,6 +1950,14 @@ In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-fre - [artsking/linux-4.1.15_CVE-2021-33034_withPatch](https://github.com/artsking/linux-4.1.15_CVE-2021-33034_withPatch) +### CVE-2021-33044 (2021-09-15) + + +The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. + + +- [bp2008/DahuaLoginBypass](https://github.com/bp2008/DahuaLoginBypass) + ### CVE-2021-33045 (2021-09-15) @@ -2783,6 +2791,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [cgddgc/CVE-2021-41773-42013](https://github.com/cgddgc/CVE-2021-41773-42013) - [apapedulimu/Apachuk](https://github.com/apapedulimu/Apachuk) - [scarmandef/CVE-2021-41773](https://github.com/scarmandef/CVE-2021-41773) +- [0xAlmighty/CVE-2021-41773-PoC](https://github.com/0xAlmighty/CVE-2021-41773-PoC) ### CVE-2021-42013 (2021-10-07) @@ -8876,7 +8885,7 @@ An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News m The Illuminate component of Laravel Framework 5.7.x has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the PendingCommand class in PendingCommand.php. -- [nth347/CVE-2019-9081_PoC](https://github.com/nth347/CVE-2019-9081_PoC) +- [hungnt199/CVE-2019-9081_PoC](https://github.com/hungnt199/CVE-2019-9081_PoC) ### CVE-2019-9153 (2019-08-22) @@ -10356,6 +10365,7 @@ admin/includes/class.import.snippet.php in the "Woody ad snippets" plu - [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858) +- [oxctdev/CVE-2019-15858](https://github.com/oxctdev/CVE-2019-15858) ### CVE-2019-15972 (2019-11-25) @@ -11700,7 +11710,7 @@ Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plu - [lucad93/CVE-2018-3810](https://github.com/lucad93/CVE-2018-3810) - [cved-sources/cve-2018-3810](https://github.com/cved-sources/cve-2018-3810) -- [nth347/CVE-2018-3810_exploit](https://github.com/nth347/CVE-2018-3810_exploit) +- [hungnt199/CVE-2018-3810_exploit](https://github.com/hungnt199/CVE-2018-3810_exploit) ### CVE-2018-3811 (2018-01-01) @@ -13317,7 +13327,7 @@ An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker c The iThemes Security (better-wp-security) plugin before 7.0.3 for WordPress allows SQL Injection (by attackers with Admin privileges) via the logs page. -- [nth347/CVE-2018-12636_exploit](https://github.com/nth347/CVE-2018-12636_exploit) +- [hungnt199/CVE-2018-12636_exploit](https://github.com/hungnt199/CVE-2018-12636_exploit) ### CVE-2018-12798 (2018-07-20)