Auto Update 2021/10/10 06:12:27

This commit is contained in:
motikan2010-bot 2021-10-10 06:12:27 +09:00
parent 17fb7945ad
commit 35e8ccbc26
24 changed files with 189 additions and 133 deletions

View file

@ -13,17 +13,17 @@
"description": "CVE-2007-2447 - Samba usermap script",
"fork": false,
"created_at": "2018-08-03T18:39:56Z",
"updated_at": "2021-08-14T20:31:07Z",
"updated_at": "2021-10-09T15:28:12Z",
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
"fork": false,
"created_at": "2021-09-04T04:01:56Z",
"updated_at": "2021-10-04T18:40:56Z",
"updated_at": "2021-10-09T19:48:00Z",
"pushed_at": "2021-09-28T16:14:13Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-08T15:17:19Z",
"updated_at": "2021-10-09T20:27:02Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1188,
"watchers_count": 1188,
"stargazers_count": 1189,
"watchers_count": 1189,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 264,
"watchers": 1188,
"watchers": 1189,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-08T15:17:19Z",
"updated_at": "2021-10-09T20:27:02Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1188,
"watchers_count": 1188,
"stargazers_count": 1189,
"watchers_count": 1189,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 264,
"watchers": 1188,
"watchers": 1189,
"score": 0
},
{

View file

@ -152,12 +152,12 @@
"pushed_at": "2017-07-22T07:13:28Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 22,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-08T15:17:19Z",
"updated_at": "2021-10-09T20:27:02Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1188,
"watchers_count": 1188,
"stargazers_count": 1189,
"watchers_count": 1189,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 264,
"watchers": 1188,
"watchers": 1189,
"score": 0
},
{

View file

@ -154,17 +154,17 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2021-10-05T17:05:46Z",
"updated_at": "2021-10-09T17:46:57Z",
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 81,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 239,
"watchers": 240,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-08T15:17:19Z",
"updated_at": "2021-10-09T20:27:02Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1188,
"watchers_count": 1188,
"stargazers_count": 1189,
"watchers_count": 1189,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 264,
"watchers": 1188,
"watchers": 1189,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-09T01:13:22Z",
"updated_at": "2021-10-09T20:26:51Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2909,
"watchers_count": 2909,
"forks_count": 853,
"stargazers_count": 2910,
"watchers_count": 2910,
"forks_count": 854,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 853,
"watchers": 2909,
"forks": 854,
"watchers": 2910,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-08T15:17:19Z",
"updated_at": "2021-10-09T20:27:02Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1188,
"watchers_count": 1188,
"stargazers_count": 1189,
"watchers_count": 1189,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 264,
"watchers": 1188,
"watchers": 1189,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-02-18T04:17:07Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 13,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 12,
"watchers": 29,
"score": 0
}

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-09T01:13:22Z",
"updated_at": "2021-10-09T20:26:51Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2909,
"watchers_count": 2909,
"forks_count": 853,
"stargazers_count": 2910,
"watchers_count": 2910,
"forks_count": 854,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 853,
"watchers": 2909,
"forks": 854,
"watchers": 2910,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-08T15:17:19Z",
"updated_at": "2021-10-09T20:27:02Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1188,
"watchers_count": 1188,
"stargazers_count": 1189,
"watchers_count": 1189,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 264,
"watchers": 1188,
"watchers": 1189,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Skyworth GN542VF Boa version 0.94.13 does not set the Secure flag for the session cookie in an HTTPS session",
"fork": false,
"created_at": "2021-01-14T09:55:59Z",
"updated_at": "2021-01-29T05:13:00Z",
"pushed_at": "2021-01-29T05:12:50Z",
"updated_at": "2021-10-09T16:35:12Z",
"pushed_at": "2021-10-09T16:34:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,8 +13,8 @@
"description": "SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 Cross Site Scripting (XSS) Vulnerability",
"fork": false,
"created_at": "2021-01-14T10:03:14Z",
"updated_at": "2021-01-29T05:12:25Z",
"pushed_at": "2021-01-29T05:12:14Z",
"updated_at": "2021-10-09T16:36:11Z",
"pushed_at": "2021-10-09T16:35:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,8 +13,8 @@
"description": "TOTOLINK-A702R-V1.0.0-B20161227.1023 Directory Indexing Vulnerability",
"fork": false,
"created_at": "2021-01-15T05:08:13Z",
"updated_at": "2021-06-28T08:15:06Z",
"pushed_at": "2021-06-28T08:14:38Z",
"updated_at": "2021-10-09T16:36:46Z",
"pushed_at": "2021-10-09T16:36:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-10-09T13:26:18Z",
"updated_at": "2021-10-09T20:28:53Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1404,
"watchers_count": 1404,
"stargazers_count": 1405,
"watchers_count": 1405,
"forks_count": 518,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 518,
"watchers": 1404,
"watchers": 1405,
"score": 0
},
{
@ -274,17 +274,17 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-10-09T13:56:24Z",
"updated_at": "2021-10-09T20:02:55Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 648,
"watchers_count": 648,
"forks_count": 171,
"stargazers_count": 649,
"watchers_count": 649,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 171,
"watchers": 648,
"forks": 172,
"watchers": 649,
"score": 0
},
{

View file

@ -1077,17 +1077,17 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
"updated_at": "2021-10-09T11:12:31Z",
"updated_at": "2021-10-09T20:31:12Z",
"pushed_at": "2021-10-08T09:13:56Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 82,
"watchers": 83,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
"fork": false,
"created_at": "2021-09-01T22:59:29Z",
"updated_at": "2021-10-09T11:12:46Z",
"updated_at": "2021-10-09T18:33:53Z",
"pushed_at": "2021-09-03T10:24:34Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 46,
"watchers": 47,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
"fork": false,
"created_at": "2021-09-16T02:11:36Z",
"updated_at": "2021-10-09T14:44:21Z",
"updated_at": "2021-10-09T15:26:17Z",
"pushed_at": "2021-09-16T10:39:04Z",
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 47,
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 169,
"forks": 48,
"watchers": 170,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-10-09T09:28:37Z",
"updated_at": "2021-10-09T20:28:10Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1265,
"watchers_count": 1265,
"forks_count": 398,
"stargazers_count": 1267,
"watchers_count": 1267,
"forks_count": 399,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 398,
"watchers": 1265,
"forks": 399,
"watchers": 1267,
"score": 0
},
{
@ -553,10 +553,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-10-09T11:06:39Z",
"updated_at": "2021-10-09T17:56:59Z",
"pushed_at": "2021-09-25T00:05:37Z",
"stargazers_count": 455,
"watchers_count": 455,
"stargazers_count": 456,
"watchers_count": 456,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -570,7 +570,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 455,
"watchers": 456,
"score": 0
},
{
@ -587,17 +587,17 @@
"description": "CVE-2021-40444 - Custom CAB templates from MakeCAB",
"fork": false,
"created_at": "2021-09-16T10:14:08Z",
"updated_at": "2021-10-09T02:07:52Z",
"updated_at": "2021-10-09T17:56:16Z",
"pushed_at": "2021-09-16T10:20:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -732,10 +732,10 @@
"description": null,
"fork": false,
"created_at": "2021-10-03T01:13:42Z",
"updated_at": "2021-10-09T12:56:33Z",
"updated_at": "2021-10-09T19:22:56Z",
"pushed_at": "2021-10-04T14:28:01Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -744,7 +744,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file which allows an unauthenticated user to execute arbitrary code via directory traversal",
"fork": false,
"created_at": "2021-10-07T17:19:12Z",
"updated_at": "2021-10-09T06:06:49Z",
"updated_at": "2021-10-09T15:23:04Z",
"pushed_at": "2021-10-09T06:06:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -244,20 +244,20 @@
},
{
"id": 414043746,
"name": "CVE-2021-41773",
"full_name": "Ls4ss\/CVE-2021-41773",
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"owner": {
"login": "Ls4ss",
"id": 25537761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
"html_url": "https:\/\/github.com\/Ls4ss"
},
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773",
"description": "Apache HTTP Server 2.4.49 - Path Traversal & RCE",
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2021-10-08T08:28:37Z",
"pushed_at": "2021-10-06T18:50:16Z",
"updated_at": "2021-10-09T20:16:28Z",
"pushed_at": "2021-10-09T19:37:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
@ -375,12 +375,12 @@
"pushed_at": "2021-10-06T05:48:55Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 8,
"score": 0
},
@ -398,17 +398,17 @@
"description": "CVE-2021-41773 playground",
"fork": false,
"created_at": "2021-10-06T07:17:05Z",
"updated_at": "2021-10-09T15:10:07Z",
"updated_at": "2021-10-09T21:14:50Z",
"pushed_at": "2021-10-07T17:56:38Z",
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 36,
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 133,
"forks": 37,
"watchers": 144,
"score": 0
},
{
@ -456,12 +456,12 @@
"pushed_at": "2021-10-06T14:15:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0
},
@ -980,8 +980,8 @@
"description": "This a simple poc for Apache\/2.4.49 Path Traversal Vulnerability",
"fork": false,
"created_at": "2021-10-08T01:13:33Z",
"updated_at": "2021-10-08T01:20:28Z",
"pushed_at": "2021-10-08T01:16:36Z",
"updated_at": "2021-10-09T18:24:28Z",
"pushed_at": "2021-10-09T18:24:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
@ -1139,13 +1139,13 @@
"html_url": "https:\/\/github.com\/im-hanzou"
},
"html_url": "https:\/\/github.com\/im-hanzou\/apachrot",
"description": "Apache CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
"description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
"fork": false,
"created_at": "2021-10-09T02:12:39Z",
"updated_at": "2021-10-09T04:14:16Z",
"pushed_at": "2021-10-09T02:29:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2021-10-09T18:40:37Z",
"pushed_at": "2021-10-09T18:39:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -1158,7 +1158,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -1202,17 +1202,17 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2021-10-09T13:41:40Z",
"updated_at": "2021-10-09T16:03:00Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 30,
"watchers": 32,
"score": 0
},
{
@ -1241,5 +1241,59 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 415357102,
"name": "CVE-2021-41773",
"full_name": "EagleTube\/CVE-2021-41773",
"owner": {
"login": "EagleTube",
"id": 87413459,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87413459?v=4",
"html_url": "https:\/\/github.com\/EagleTube"
},
"html_url": "https:\/\/github.com\/EagleTube\/CVE-2021-41773",
"description": "Apache 2.4.49 Path Traversal Vulnerability Checker ",
"fork": false,
"created_at": "2021-10-09T16:07:57Z",
"updated_at": "2021-10-09T16:32:11Z",
"pushed_at": "2021-10-09T16:32:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 415362322,
"name": "cve-2021-41773",
"full_name": "meicookies\/cve-2021-41773",
"owner": {
"login": "meicookies",
"id": 79348524,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79348524?v=4",
"html_url": "https:\/\/github.com\/meicookies"
},
"html_url": "https:\/\/github.com\/meicookies\/cve-2021-41773",
"description": "mass scan for apache 2.4.49\/2.4.50 ",
"fork": false,
"created_at": "2021-10-09T16:28:06Z",
"updated_at": "2021-10-09T20:40:25Z",
"pushed_at": "2021-10-09T16:40:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -2716,7 +2716,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [RyouYoo/CVE-2021-41773](https://github.com/RyouYoo/CVE-2021-41773)
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
- [Ls4ss/CVE-2021-41773](https://github.com/Ls4ss/CVE-2021-41773)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
- [TishcaTpx/cve-2021-41773-nse](https://github.com/TishcaTpx/cve-2021-41773-nse)
@ -2752,6 +2752,8 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [KAB8345/CVE-2021-41773](https://github.com/KAB8345/CVE-2021-41773)
- [inbug-team/CVE-2021-41773_CVE-2021-42013](https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013)
- [5gstudent/cve-2021-41773-and-cve-2021-42013](https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013)
- [EagleTube/CVE-2021-41773](https://github.com/EagleTube/CVE-2021-41773)
- [meicookies/cve-2021-41773](https://github.com/meicookies/cve-2021-41773)
### CVE-2021-42013 (2021-10-07)