diff --git a/2015/CVE-2015-1528.json b/2015/CVE-2015-1528.json
index 29da230d44..74662b08fa 100644
--- a/2015/CVE-2015-1528.json
+++ b/2015/CVE-2015-1528.json
@@ -13,17 +13,17 @@
"description": "I'll submit the poc after blackhat",
"fork": false,
"created_at": "2015-07-17T06:09:41Z",
- "updated_at": "2021-08-07T17:11:08Z",
+ "updated_at": "2021-10-12T02:18:56Z",
"pushed_at": "2015-08-30T19:24:32Z",
- "stargazers_count": 114,
- "watchers_count": 114,
+ "stargazers_count": 115,
+ "watchers_count": 115,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 78,
- "watchers": 114,
+ "watchers": 115,
"score": 0
},
{
diff --git a/2015/CVE-2015-3825.json b/2015/CVE-2015-3825.json
index 736a6a5f22..d7de7c79f2 100644
--- a/2015/CVE-2015-3825.json
+++ b/2015/CVE-2015-3825.json
@@ -13,17 +13,17 @@
"description": "This app verifies if your device is still vulnerable to CVE-2015-3825 \/ CVE-2015-3837, aka \"One Class to Rule Them All\", by checking if it contains the vulnerable conscrypt's OpenSSLX509Certificate class. A patch was released in August 2015 by Google.",
"fork": false,
"created_at": "2016-02-13T08:57:44Z",
- "updated_at": "2017-12-22T21:03:30Z",
+ "updated_at": "2021-10-12T02:19:42Z",
"pushed_at": "2016-02-13T09:16:01Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 1,
+ "watchers": 2,
"score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json
index 00c45b2190..ce3083dbdb 100644
--- a/2017/CVE-2017-10271.json
+++ b/2017/CVE-2017-10271.json
@@ -429,17 +429,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
- "updated_at": "2021-10-11T10:22:24Z",
+ "updated_at": "2021-10-11T23:54:48Z",
"pushed_at": "2020-10-01T20:20:41Z",
- "stargazers_count": 296,
- "watchers_count": 296,
+ "stargazers_count": 297,
+ "watchers_count": 297,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 105,
- "watchers": 296,
+ "watchers": 297,
"score": 0
},
{
diff --git a/2018/CVE-2018-12636.json b/2018/CVE-2018-12636.json
index 0d7888e073..1ed6c1edb0 100644
--- a/2018/CVE-2018-12636.json
+++ b/2018/CVE-2018-12636.json
@@ -2,14 +2,14 @@
{
"id": 390422057,
"name": "CVE-2018-12636_exploit",
- "full_name": "nth347\/CVE-2018-12636_exploit",
+ "full_name": "hungnt199\/CVE-2018-12636_exploit",
"owner": {
- "login": "nth347",
+ "login": "hungnt199",
"id": 20441996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
- "html_url": "https:\/\/github.com\/nth347"
+ "html_url": "https:\/\/github.com\/hungnt199"
},
- "html_url": "https:\/\/github.com\/nth347\/CVE-2018-12636_exploit",
+ "html_url": "https:\/\/github.com\/hungnt199\/CVE-2018-12636_exploit",
"description": "Exploit for CVE-2018-12636",
"fork": false,
"created_at": "2021-07-28T16:30:05Z",
diff --git a/2018/CVE-2018-3810.json b/2018/CVE-2018-3810.json
index 1d6157b250..6ffb7cd831 100644
--- a/2018/CVE-2018-3810.json
+++ b/2018/CVE-2018-3810.json
@@ -56,14 +56,14 @@
{
"id": 391018517,
"name": "CVE-2018-3810_exploit",
- "full_name": "nth347\/CVE-2018-3810_exploit",
+ "full_name": "hungnt199\/CVE-2018-3810_exploit",
"owner": {
- "login": "nth347",
+ "login": "hungnt199",
"id": 20441996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
- "html_url": "https:\/\/github.com\/nth347"
+ "html_url": "https:\/\/github.com\/hungnt199"
},
- "html_url": "https:\/\/github.com\/nth347\/CVE-2018-3810_exploit",
+ "html_url": "https:\/\/github.com\/hungnt199\/CVE-2018-3810_exploit",
"description": "Exploit for CVE-2018-3810",
"fork": false,
"created_at": "2021-07-30T10:06:04Z",
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index b1080d7fe2..1988c767b5 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1488,12 +1488,12 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 830,
"watchers_count": 830,
- "forks_count": 241,
+ "forks_count": 242,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 241,
+ "forks": 242,
"watchers": 830,
"score": 0
},
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index 93a5fce6b0..066dd94415 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -13,17 +13,17 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
- "updated_at": "2021-10-11T08:54:27Z",
+ "updated_at": "2021-10-12T03:14:22Z",
"pushed_at": "2019-11-12T18:53:14Z",
- "stargazers_count": 1678,
- "watchers_count": 1678,
+ "stargazers_count": 1679,
+ "watchers_count": 1679,
"forks_count": 251,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 251,
- "watchers": 1678,
+ "watchers": 1679,
"score": 0
},
{
diff --git a/2019/CVE-2019-15858.json b/2019/CVE-2019-15858.json
index 7d4abfd475..ca3c8e34e5 100644
--- a/2019/CVE-2019-15858.json
+++ b/2019/CVE-2019-15858.json
@@ -25,5 +25,35 @@
"forks": 6,
"watchers": 29,
"score": 0
+ },
+ {
+ "id": 416094403,
+ "name": "CVE-2019-15858",
+ "full_name": "oxctdev\/CVE-2019-15858",
+ "owner": {
+ "login": "oxctdev",
+ "id": 91846073,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
+ "html_url": "https:\/\/github.com\/oxctdev"
+ },
+ "html_url": "https:\/\/github.com\/oxctdev\/CVE-2019-15858",
+ "description": "Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)",
+ "fork": false,
+ "created_at": "2021-10-11T21:37:06Z",
+ "updated_at": "2021-10-11T21:42:30Z",
+ "pushed_at": "2021-10-11T21:41:51Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [
+ "cve-2019-15858",
+ "remote-code-execution"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json
index c4bd0bf560..a61f3a6a33 100644
--- a/2019/CVE-2019-2725.json
+++ b/2019/CVE-2019-2725.json
@@ -13,17 +13,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
- "updated_at": "2021-10-11T10:22:24Z",
+ "updated_at": "2021-10-11T23:54:48Z",
"pushed_at": "2020-10-01T20:20:41Z",
- "stargazers_count": 296,
- "watchers_count": 296,
+ "stargazers_count": 297,
+ "watchers_count": 297,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 105,
- "watchers": 296,
+ "watchers": 297,
"score": 0
},
{
diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json
index 9f938faa9e..a2553c193e 100644
--- a/2019/CVE-2019-7304.json
+++ b/2019/CVE-2019-7304.json
@@ -17,7 +17,7 @@
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 605,
"watchers_count": 605,
- "forks_count": 149,
+ "forks_count": 150,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -26,7 +26,7 @@
"security"
],
"visibility": "public",
- "forks": 149,
+ "forks": 150,
"watchers": 605,
"score": 0
},
diff --git a/2019/CVE-2019-9081.json b/2019/CVE-2019-9081.json
index 0b4788c4b4..be4af73cb3 100644
--- a/2019/CVE-2019-9081.json
+++ b/2019/CVE-2019-9081.json
@@ -2,14 +2,14 @@
{
"id": 368085499,
"name": "CVE-2019-9081_PoC",
- "full_name": "nth347\/CVE-2019-9081_PoC",
+ "full_name": "hungnt199\/CVE-2019-9081_PoC",
"owner": {
- "login": "nth347",
+ "login": "hungnt199",
"id": 20441996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
- "html_url": "https:\/\/github.com\/nth347"
+ "html_url": "https:\/\/github.com\/hungnt199"
},
- "html_url": "https:\/\/github.com\/nth347\/CVE-2019-9081_PoC",
+ "html_url": "https:\/\/github.com\/hungnt199\/CVE-2019-9081_PoC",
"description": "PoC for CVE-2019-9081",
"fork": false,
"created_at": "2021-05-17T06:54:05Z",
diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json
index f8e0320d58..f7f28de340 100644
--- a/2020/CVE-2020-15368.json
+++ b/2020/CVE-2020-15368.json
@@ -13,10 +13,10 @@
"description": "CVE-2020-15368",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
- "updated_at": "2021-10-11T18:09:27Z",
+ "updated_at": "2021-10-12T03:08:41Z",
"pushed_at": "2021-10-11T01:30:56Z",
- "stargazers_count": 294,
- "watchers_count": 294,
+ "stargazers_count": 295,
+ "watchers_count": 295,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 30,
- "watchers": 294,
+ "watchers": 295,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index 136f60678c..c482c7c05d 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -274,17 +274,17 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
- "updated_at": "2021-10-11T18:13:55Z",
+ "updated_at": "2021-10-12T00:03:52Z",
"pushed_at": "2021-07-05T08:54:06Z",
- "stargazers_count": 653,
- "watchers_count": 653,
+ "stargazers_count": 654,
+ "watchers_count": 654,
"forks_count": 173,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 173,
- "watchers": 653,
+ "watchers": 654,
"score": 0
},
{
diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json
index bb44cd5c04..5846d7b8be 100644
--- a/2021/CVE-2021-22005.json
+++ b/2021/CVE-2021-22005.json
@@ -98,12 +98,12 @@
"pushed_at": "2021-09-25T07:58:15Z",
"stargazers_count": 11,
"watchers_count": 11,
- "forks_count": 8,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 8,
+ "forks": 7,
"watchers": 11,
"score": 0
},
@@ -121,17 +121,17 @@
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
"fork": false,
"created_at": "2021-09-25T16:21:56Z",
- "updated_at": "2021-10-11T18:23:26Z",
+ "updated_at": "2021-10-12T01:51:06Z",
"pushed_at": "2021-10-02T03:17:45Z",
- "stargazers_count": 100,
- "watchers_count": 100,
+ "stargazers_count": 102,
+ "watchers_count": 102,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
- "watchers": 100,
+ "watchers": 102,
"score": 0
},
{
diff --git a/2021/CVE-2021-24085.json b/2021/CVE-2021-24085.json
index 87162b5cc8..e0fb9a8b21 100644
--- a/2021/CVE-2021-24085.json
+++ b/2021/CVE-2021-24085.json
@@ -17,12 +17,12 @@
"pushed_at": "2021-02-15T15:11:00Z",
"stargazers_count": 60,
"watchers_count": 60,
- "forks_count": 15,
+ "forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 15,
+ "forks": 16,
"watchers": 60,
"score": 0
}
diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json
index cec394177a..1318599063 100644
--- a/2021/CVE-2021-26084.json
+++ b/2021/CVE-2021-26084.json
@@ -98,12 +98,12 @@
"pushed_at": "2021-09-01T01:17:58Z",
"stargazers_count": 48,
"watchers_count": 48,
- "forks_count": 26,
+ "forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 26,
+ "forks": 25,
"watchers": 48,
"score": 0
},
@@ -152,12 +152,12 @@
"pushed_at": "2021-09-10T19:42:33Z",
"stargazers_count": 227,
"watchers_count": 227,
- "forks_count": 56,
+ "forks_count": 55,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 56,
+ "forks": 55,
"watchers": 227,
"score": 0
},
@@ -179,12 +179,12 @@
"pushed_at": "2021-09-01T10:27:12Z",
"stargazers_count": 50,
"watchers_count": 50,
- "forks_count": 21,
+ "forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 21,
+ "forks": 20,
"watchers": 50,
"score": 0
},
diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json
index 3eec617e4b..2b3551b99f 100644
--- a/2021/CVE-2021-30632.json
+++ b/2021/CVE-2021-30632.json
@@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-09-28T03:47:36Z",
- "updated_at": "2021-10-11T19:46:51Z",
+ "updated_at": "2021-10-12T01:51:32Z",
"pushed_at": "2021-09-29T02:20:40Z",
- "stargazers_count": 104,
- "watchers_count": 104,
+ "stargazers_count": 105,
+ "watchers_count": 105,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
- "watchers": 104,
+ "watchers": 105,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json
index 390a8b78a6..1c441cf658 100644
--- a/2021/CVE-2021-3129.json
+++ b/2021/CVE-2021-3129.json
@@ -110,14 +110,14 @@
{
"id": 333380316,
"name": "CVE-2021-3129_exploit",
- "full_name": "nth347\/CVE-2021-3129_exploit",
+ "full_name": "hungnt199\/CVE-2021-3129_exploit",
"owner": {
- "login": "nth347",
+ "login": "hungnt199",
"id": 20441996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
- "html_url": "https:\/\/github.com\/nth347"
+ "html_url": "https:\/\/github.com\/hungnt199"
},
- "html_url": "https:\/\/github.com\/nth347\/CVE-2021-3129_exploit",
+ "html_url": "https:\/\/github.com\/hungnt199\/CVE-2021-3129_exploit",
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
diff --git a/2021/CVE-2021-31796.json b/2021/CVE-2021-31796.json
index 015ef8a892..a57daa3719 100644
--- a/2021/CVE-2021-31796.json
+++ b/2021/CVE-2021-31796.json
@@ -17,12 +17,12 @@
"pushed_at": "2021-10-11T17:59:48Z",
"stargazers_count": 0,
"watchers_count": 0,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0
}
diff --git a/2021/CVE-2021-33044.json b/2021/CVE-2021-33044.json
new file mode 100644
index 0000000000..9e5937cc18
--- /dev/null
+++ b/2021/CVE-2021-33044.json
@@ -0,0 +1,29 @@
+[
+ {
+ "id": 416101106,
+ "name": "DahuaLoginBypass",
+ "full_name": "bp2008\/DahuaLoginBypass",
+ "owner": {
+ "login": "bp2008",
+ "id": 5639911,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5639911?v=4",
+ "html_url": "https:\/\/github.com\/bp2008"
+ },
+ "html_url": "https:\/\/github.com\/bp2008\/DahuaLoginBypass",
+ "description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
+ "fork": false,
+ "created_at": "2021-10-11T22:08:47Z",
+ "updated_at": "2021-10-11T22:24:50Z",
+ "pushed_at": "2021-10-11T22:24:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-33045.json b/2021/CVE-2021-33045.json
index a639af85f7..c8e5a5742e 100644
--- a/2021/CVE-2021-33045.json
+++ b/2021/CVE-2021-33045.json
@@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-11T15:11:48Z",
- "updated_at": "2021-10-11T15:24:14Z",
+ "updated_at": "2021-10-12T02:15:56Z",
"pushed_at": "2021-10-11T15:23:39Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index 757773ad56..b916e44e78 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
- "updated_at": "2021-10-11T20:42:57Z",
+ "updated_at": "2021-10-12T01:02:40Z",
"pushed_at": "2021-09-11T09:50:26Z",
- "stargazers_count": 1270,
- "watchers_count": 1270,
+ "stargazers_count": 1272,
+ "watchers_count": 1272,
"forks_count": 402,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 402,
- "watchers": 1270,
+ "watchers": 1272,
"score": 0
},
{
diff --git a/2021/CVE-2021-40870.json b/2021/CVE-2021-40870.json
index 0c0bcde0ae..f75f87babc 100644
--- a/2021/CVE-2021-40870.json
+++ b/2021/CVE-2021-40870.json
@@ -17,7 +17,7 @@
"pushed_at": "2021-10-09T06:06:47Z",
"stargazers_count": 7,
"watchers_count": 7,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -25,7 +25,7 @@
"remote-code-execution"
],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 7,
"score": 0
},
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 53befdcf5d..58e43b8237 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -229,17 +229,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-05T23:53:48Z",
- "updated_at": "2021-10-11T09:37:17Z",
+ "updated_at": "2021-10-12T02:54:17Z",
"pushed_at": "2021-10-06T15:37:23Z",
- "stargazers_count": 29,
- "watchers_count": 29,
- "forks_count": 14,
+ "stargazers_count": 30,
+ "watchers_count": 30,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 14,
- "watchers": 29,
+ "forks": 15,
+ "watchers": 30,
"score": 0
},
{
@@ -256,11 +256,11 @@
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
- "updated_at": "2021-10-11T16:21:48Z",
+ "updated_at": "2021-10-11T23:00:45Z",
"pushed_at": "2021-10-09T19:37:29Z",
- "stargazers_count": 10,
- "watchers_count": 10,
- "forks_count": 4,
+ "stargazers_count": 11,
+ "watchers_count": 11,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -272,8 +272,8 @@
"rce"
],
"visibility": "public",
- "forks": 4,
- "watchers": 10,
+ "forks": 5,
+ "watchers": 11,
"score": 0
},
{
@@ -722,16 +722,16 @@
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)",
"fork": false,
"created_at": "2021-10-06T23:32:30Z",
- "updated_at": "2021-10-10T18:37:54Z",
- "pushed_at": "2021-10-08T18:20:09Z",
+ "updated_at": "2021-10-12T02:59:06Z",
+ "pushed_at": "2021-10-12T02:59:04Z",
"stargazers_count": 3,
"watchers_count": 3,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 3,
"score": 0
},
@@ -1097,12 +1097,12 @@
"pushed_at": "2021-10-08T07:27:04Z",
"stargazers_count": 9,
"watchers_count": 9,
- "forks_count": 4,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 4,
+ "forks": 5,
"watchers": 9,
"score": 0
},
@@ -1147,8 +1147,8 @@
"description": "POC",
"fork": false,
"created_at": "2021-10-08T15:40:41Z",
- "updated_at": "2021-10-11T16:11:44Z",
- "pushed_at": "2021-10-10T22:26:26Z",
+ "updated_at": "2021-10-11T22:24:14Z",
+ "pushed_at": "2021-10-11T22:24:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
@@ -1234,17 +1234,17 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
- "updated_at": "2021-10-11T14:27:20Z",
+ "updated_at": "2021-10-12T02:03:22Z",
"pushed_at": "2021-10-09T03:49:21Z",
- "stargazers_count": 66,
- "watchers_count": 66,
- "forks_count": 21,
+ "stargazers_count": 69,
+ "watchers_count": 69,
+ "forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 21,
- "watchers": 66,
+ "forks": 22,
+ "watchers": 69,
"score": 0
},
{
@@ -1381,5 +1381,32 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 416132671,
+ "name": "CVE-2021-41773-PoC",
+ "full_name": "0xAlmighty\/CVE-2021-41773-PoC",
+ "owner": {
+ "login": "0xAlmighty",
+ "id": 58662599,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58662599?v=4",
+ "html_url": "https:\/\/github.com\/0xAlmighty"
+ },
+ "html_url": "https:\/\/github.com\/0xAlmighty\/CVE-2021-41773-PoC",
+ "description": "Path Traversal and RCE in Apache HTTP Server 2.4.49 ",
+ "fork": false,
+ "created_at": "2021-10-12T00:51:32Z",
+ "updated_at": "2021-10-12T00:53:01Z",
+ "pushed_at": "2021-10-12T00:52:59Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 891e99e276..a1d81d20cd 100644
--- a/README.md
+++ b/README.md
@@ -230,7 +230,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP)
-- [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit)
+- [hungnt199/CVE-2021-3129_exploit](https://github.com/hungnt199/CVE-2021-3129_exploit)
- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129)
- [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129)
- [simonlee-hello/CVE-2021-3129](https://github.com/simonlee-hello/CVE-2021-3129)
@@ -1950,6 +1950,14 @@ In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-fre
- [artsking/linux-4.1.15_CVE-2021-33034_withPatch](https://github.com/artsking/linux-4.1.15_CVE-2021-33034_withPatch)
+### CVE-2021-33044 (2021-09-15)
+
+
+The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
+
+
+- [bp2008/DahuaLoginBypass](https://github.com/bp2008/DahuaLoginBypass)
+
### CVE-2021-33045 (2021-09-15)
@@ -2783,6 +2791,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [cgddgc/CVE-2021-41773-42013](https://github.com/cgddgc/CVE-2021-41773-42013)
- [apapedulimu/Apachuk](https://github.com/apapedulimu/Apachuk)
- [scarmandef/CVE-2021-41773](https://github.com/scarmandef/CVE-2021-41773)
+- [0xAlmighty/CVE-2021-41773-PoC](https://github.com/0xAlmighty/CVE-2021-41773-PoC)
### CVE-2021-42013 (2021-10-07)
@@ -8876,7 +8885,7 @@ An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News m
The Illuminate component of Laravel Framework 5.7.x has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the PendingCommand class in PendingCommand.php.
-- [nth347/CVE-2019-9081_PoC](https://github.com/nth347/CVE-2019-9081_PoC)
+- [hungnt199/CVE-2019-9081_PoC](https://github.com/hungnt199/CVE-2019-9081_PoC)
### CVE-2019-9153 (2019-08-22)
@@ -10356,6 +10365,7 @@ admin/includes/class.import.snippet.php in the "Woody ad snippets" plu
- [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858)
+- [oxctdev/CVE-2019-15858](https://github.com/oxctdev/CVE-2019-15858)
### CVE-2019-15972 (2019-11-25)
@@ -11700,7 +11710,7 @@ Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plu
- [lucad93/CVE-2018-3810](https://github.com/lucad93/CVE-2018-3810)
- [cved-sources/cve-2018-3810](https://github.com/cved-sources/cve-2018-3810)
-- [nth347/CVE-2018-3810_exploit](https://github.com/nth347/CVE-2018-3810_exploit)
+- [hungnt199/CVE-2018-3810_exploit](https://github.com/hungnt199/CVE-2018-3810_exploit)
### CVE-2018-3811 (2018-01-01)
@@ -13317,7 +13327,7 @@ An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker c
The iThemes Security (better-wp-security) plugin before 7.0.3 for WordPress allows SQL Injection (by attackers with Admin privileges) via the logs page.
-- [nth347/CVE-2018-12636_exploit](https://github.com/nth347/CVE-2018-12636_exploit)
+- [hungnt199/CVE-2018-12636_exploit](https://github.com/hungnt199/CVE-2018-12636_exploit)
### CVE-2018-12798 (2018-07-20)