diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index 8e31d442d4..3e8a1fe5e9 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -13,17 +13,17 @@ "description": "CVE-2007-2447 - Samba usermap script", "fork": false, "created_at": "2018-08-03T18:39:56Z", - "updated_at": "2021-08-14T20:31:07Z", + "updated_at": "2021-10-09T15:28:12Z", "pushed_at": "2020-08-16T18:54:38Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "forks_count": 21, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 21, - "watchers": 27, + "watchers": 28, "score": 0 }, { diff --git a/2012/CVE-2012-2982.json b/2012/CVE-2012-2982.json index 790c7925de..85a0143be8 100644 --- a/2012/CVE-2012-2982.json +++ b/2012/CVE-2012-2982.json @@ -121,17 +121,17 @@ "description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution", "fork": false, "created_at": "2021-09-04T04:01:56Z", - "updated_at": "2021-10-04T18:40:56Z", + "updated_at": "2021-10-09T19:48:00Z", "pushed_at": "2021-09-28T16:14:13Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, - "watchers": 15, + "watchers": 16, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 367e61d7ef..d365d6f377 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-08T15:17:19Z", + "updated_at": "2021-10-09T20:27:02Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1188, - "watchers_count": 1188, + "stargazers_count": 1189, + "watchers_count": 1189, "forks_count": 264, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 264, - "watchers": 1188, + "watchers": 1189, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 558cf8f439..529d0a3d08 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-08T15:17:19Z", + "updated_at": "2021-10-09T20:27:02Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1188, - "watchers_count": 1188, + "stargazers_count": 1189, + "watchers_count": 1189, "forks_count": 264, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 264, - "watchers": 1188, + "watchers": 1189, "score": 0 }, { diff --git a/2016/CVE-2016-6662.json b/2016/CVE-2016-6662.json index 42136cca41..c7a26e196a 100644 --- a/2016/CVE-2016-6662.json +++ b/2016/CVE-2016-6662.json @@ -152,12 +152,12 @@ "pushed_at": "2017-07-22T07:13:28Z", "stargazers_count": 22, "watchers_count": 22, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 22, "score": 0 } diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 6e58455e05..73a6329977 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-08T15:17:19Z", + "updated_at": "2021-10-09T20:27:02Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1188, - "watchers_count": 1188, + "stargazers_count": 1189, + "watchers_count": 1189, "forks_count": 264, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 264, - "watchers": 1188, + "watchers": 1189, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 1d12d0722b..cf135bead5 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -154,17 +154,17 @@ "description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability", "fork": false, "created_at": "2017-06-05T16:25:57Z", - "updated_at": "2021-10-05T17:05:46Z", + "updated_at": "2021-10-09T17:46:57Z", "pushed_at": "2021-03-09T09:12:55Z", - "stargazers_count": 239, - "watchers_count": 239, + "stargazers_count": 240, + "watchers_count": 240, "forks_count": 81, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 81, - "watchers": 239, + "watchers": 240, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 37846d3ec8..ab41a5e230 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-08T15:17:19Z", + "updated_at": "2021-10-09T20:27:02Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1188, - "watchers_count": 1188, + "stargazers_count": 1189, + "watchers_count": 1189, "forks_count": 264, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 264, - "watchers": 1188, + "watchers": 1189, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 6f5a52d092..f50fa38631 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,11 +40,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-10-09T01:13:22Z", + "updated_at": "2021-10-09T20:26:51Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2909, - "watchers_count": 2909, - "forks_count": 853, + "stargazers_count": 2910, + "watchers_count": 2910, + "forks_count": 854, "allow_forking": true, "is_template": false, "topics": [ @@ -69,8 +69,8 @@ "webshell" ], "visibility": "public", - "forks": 853, - "watchers": 2909, + "forks": 854, + "watchers": 2910, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index f8025a1860..e741d30782 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-08T15:17:19Z", + "updated_at": "2021-10-09T20:27:02Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1188, - "watchers_count": 1188, + "stargazers_count": 1189, + "watchers_count": 1189, "forks_count": 264, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 264, - "watchers": 1188, + "watchers": 1189, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json index f175e2404f..784fba3d9d 100644 --- a/2020/CVE-2020-0041.json +++ b/2020/CVE-2020-0041.json @@ -44,12 +44,12 @@ "pushed_at": "2021-02-18T04:17:07Z", "stargazers_count": 29, "watchers_count": 29, - "forks_count": 13, + "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 13, + "forks": 12, "watchers": 29, "score": 0 } diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index cd9dda9fa1..17bae185e9 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,11 +13,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-10-09T01:13:22Z", + "updated_at": "2021-10-09T20:26:51Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2909, - "watchers_count": 2909, - "forks_count": 853, + "stargazers_count": 2910, + "watchers_count": 2910, + "forks_count": 854, "allow_forking": true, "is_template": false, "topics": [ @@ -42,8 +42,8 @@ "webshell" ], "visibility": "public", - "forks": 853, - "watchers": 2909, + "forks": 854, + "watchers": 2910, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 27329d47cc..a4cfecc7d0 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-10-08T15:17:19Z", + "updated_at": "2021-10-09T20:27:02Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1188, - "watchers_count": 1188, + "stargazers_count": 1189, + "watchers_count": 1189, "forks_count": 264, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 264, - "watchers": 1188, + "watchers": 1189, "score": 0 }, { diff --git a/2020/CVE-2020-26732.json b/2020/CVE-2020-26732.json index 6e2c2107a0..8d9f6739c6 100644 --- a/2020/CVE-2020-26732.json +++ b/2020/CVE-2020-26732.json @@ -13,8 +13,8 @@ "description": "Skyworth GN542VF Boa version 0.94.13 does not set the Secure flag for the session cookie in an HTTPS session", "fork": false, "created_at": "2021-01-14T09:55:59Z", - "updated_at": "2021-01-29T05:13:00Z", - "pushed_at": "2021-01-29T05:12:50Z", + "updated_at": "2021-10-09T16:35:12Z", + "pushed_at": "2021-10-09T16:34:47Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/2020/CVE-2020-26733.json b/2020/CVE-2020-26733.json index 0bdd594b23..882447051a 100644 --- a/2020/CVE-2020-26733.json +++ b/2020/CVE-2020-26733.json @@ -13,8 +13,8 @@ "description": "SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 Cross Site Scripting (XSS) Vulnerability", "fork": false, "created_at": "2021-01-14T10:03:14Z", - "updated_at": "2021-01-29T05:12:25Z", - "pushed_at": "2021-01-29T05:12:14Z", + "updated_at": "2021-10-09T16:36:11Z", + "pushed_at": "2021-10-09T16:35:46Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/2020/CVE-2020-27368.json b/2020/CVE-2020-27368.json index 24d9628f41..4619510422 100644 --- a/2020/CVE-2020-27368.json +++ b/2020/CVE-2020-27368.json @@ -13,8 +13,8 @@ "description": "TOTOLINK-A702R-V1.0.0-B20161227.1023 Directory Indexing Vulnerability", "fork": false, "created_at": "2021-01-15T05:08:13Z", - "updated_at": "2021-06-28T08:15:06Z", - "pushed_at": "2021-06-28T08:14:38Z", + "updated_at": "2021-10-09T16:36:46Z", + "pushed_at": "2021-10-09T16:36:31Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 0be8e71011..cffa25f66a 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -40,17 +40,17 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2021-10-09T13:26:18Z", + "updated_at": "2021-10-09T20:28:53Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1404, - "watchers_count": 1404, + "stargazers_count": 1405, + "watchers_count": 1405, "forks_count": 518, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 518, - "watchers": 1404, + "watchers": 1405, "score": 0 }, { @@ -274,17 +274,17 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2021-10-09T13:56:24Z", + "updated_at": "2021-10-09T20:02:55Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 648, - "watchers_count": 648, - "forks_count": 171, + "stargazers_count": 649, + "watchers_count": 649, + "forks_count": 172, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 171, - "watchers": 648, + "forks": 172, + "watchers": 649, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 1e2e88ef3f..72666e7c81 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -1077,17 +1077,17 @@ "description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.", "fork": false, "created_at": "2021-04-14T11:12:30Z", - "updated_at": "2021-10-09T11:12:31Z", + "updated_at": "2021-10-09T20:31:12Z", "pushed_at": "2021-10-08T09:13:56Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 19, - "watchers": 82, + "watchers": 83, "score": 0 }, { diff --git a/2021/CVE-2021-28663.json b/2021/CVE-2021-28663.json index 600a6e766f..f3ba69a803 100644 --- a/2021/CVE-2021-28663.json +++ b/2021/CVE-2021-28663.json @@ -13,17 +13,17 @@ "description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)", "fork": false, "created_at": "2021-09-01T22:59:29Z", - "updated_at": "2021-10-09T11:12:46Z", + "updated_at": "2021-10-09T18:33:53Z", "pushed_at": "2021-09-03T10:24:34Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, - "watchers": 46, + "watchers": 47, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json index 588705dd27..98cedd2ac7 100644 --- a/2021/CVE-2021-38647.json +++ b/2021/CVE-2021-38647.json @@ -67,17 +67,17 @@ "description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)", "fork": false, "created_at": "2021-09-16T02:11:36Z", - "updated_at": "2021-10-09T14:44:21Z", + "updated_at": "2021-10-09T15:26:17Z", "pushed_at": "2021-09-16T10:39:04Z", - "stargazers_count": 169, - "watchers_count": 169, - "forks_count": 47, + "stargazers_count": 170, + "watchers_count": 170, + "forks_count": 48, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 47, - "watchers": 169, + "forks": 48, + "watchers": 170, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 743ab96fcf..7afe893ddd 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -229,17 +229,17 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2021-10-09T09:28:37Z", + "updated_at": "2021-10-09T20:28:10Z", "pushed_at": "2021-09-11T09:50:26Z", - "stargazers_count": 1265, - "watchers_count": 1265, - "forks_count": 398, + "stargazers_count": 1267, + "watchers_count": 1267, + "forks_count": 399, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 398, - "watchers": 1265, + "forks": 399, + "watchers": 1267, "score": 0 }, { @@ -553,10 +553,10 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2021-10-09T11:06:39Z", + "updated_at": "2021-10-09T17:56:59Z", "pushed_at": "2021-09-25T00:05:37Z", - "stargazers_count": 455, - "watchers_count": 455, + "stargazers_count": 456, + "watchers_count": 456, "forks_count": 93, "allow_forking": true, "is_template": false, @@ -570,7 +570,7 @@ ], "visibility": "public", "forks": 93, - "watchers": 455, + "watchers": 456, "score": 0 }, { @@ -587,17 +587,17 @@ "description": "CVE-2021-40444 - Custom CAB templates from MakeCAB", "fork": false, "created_at": "2021-09-16T10:14:08Z", - "updated_at": "2021-10-09T02:07:52Z", + "updated_at": "2021-10-09T17:56:16Z", "pushed_at": "2021-09-16T10:20:10Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 8, + "watchers": 9, "score": 0 }, { @@ -732,10 +732,10 @@ "description": null, "fork": false, "created_at": "2021-10-03T01:13:42Z", - "updated_at": "2021-10-09T12:56:33Z", + "updated_at": "2021-10-09T19:22:56Z", "pushed_at": "2021-10-04T14:28:01Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -744,7 +744,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40870.json b/2021/CVE-2021-40870.json index 1fb535c169..5bf8889d51 100644 --- a/2021/CVE-2021-40870.json +++ b/2021/CVE-2021-40870.json @@ -13,10 +13,10 @@ "description": "Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file which allows an unauthenticated user to execute arbitrary code via directory traversal", "fork": false, "created_at": "2021-10-07T17:19:12Z", - "updated_at": "2021-10-09T06:06:49Z", + "updated_at": "2021-10-09T15:23:04Z", "pushed_at": "2021-10-09T06:06:47Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index d74ed3fed2..e161285a30 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -244,20 +244,20 @@ }, { "id": 414043746, - "name": "CVE-2021-41773", - "full_name": "Ls4ss\/CVE-2021-41773", + "name": "CVE-2021-41773_CVE-2021-42013", + "full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013", "owner": { "login": "Ls4ss", "id": 25537761, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4", "html_url": "https:\/\/github.com\/Ls4ss" }, - "html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773", - "description": "Apache HTTP Server 2.4.49 - Path Traversal & RCE", + "html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013", + "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-06T02:28:41Z", - "updated_at": "2021-10-08T08:28:37Z", - "pushed_at": "2021-10-06T18:50:16Z", + "updated_at": "2021-10-09T20:16:28Z", + "pushed_at": "2021-10-09T19:37:29Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 2, @@ -375,12 +375,12 @@ "pushed_at": "2021-10-06T05:48:55Z", "stargazers_count": 8, "watchers_count": 8, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 8, "score": 0 }, @@ -398,17 +398,17 @@ "description": "CVE-2021-41773 playground", "fork": false, "created_at": "2021-10-06T07:17:05Z", - "updated_at": "2021-10-09T15:10:07Z", + "updated_at": "2021-10-09T21:14:50Z", "pushed_at": "2021-10-07T17:56:38Z", - "stargazers_count": 133, - "watchers_count": 133, - "forks_count": 36, + "stargazers_count": 144, + "watchers_count": 144, + "forks_count": 37, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 36, - "watchers": 133, + "forks": 37, + "watchers": 144, "score": 0 }, { @@ -456,12 +456,12 @@ "pushed_at": "2021-10-06T14:15:45Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 0, "score": 0 }, @@ -980,8 +980,8 @@ "description": "This a simple poc for Apache\/2.4.49 Path Traversal Vulnerability", "fork": false, "created_at": "2021-10-08T01:13:33Z", - "updated_at": "2021-10-08T01:20:28Z", - "pushed_at": "2021-10-08T01:16:36Z", + "updated_at": "2021-10-09T18:24:28Z", + "pushed_at": "2021-10-09T18:24:26Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, @@ -1139,13 +1139,13 @@ "html_url": "https:\/\/github.com\/im-hanzou" }, "html_url": "https:\/\/github.com\/im-hanzou\/apachrot", - "description": "Apache CVE-2021-41773\/2021-42013 Mass Vulnerability Checker", + "description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker", "fork": false, "created_at": "2021-10-09T02:12:39Z", - "updated_at": "2021-10-09T04:14:16Z", - "pushed_at": "2021-10-09T02:29:49Z", - "stargazers_count": 1, - "watchers_count": 1, + "updated_at": "2021-10-09T18:40:37Z", + "pushed_at": "2021-10-09T18:39:20Z", + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -1158,7 +1158,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { @@ -1202,17 +1202,17 @@ "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "fork": false, "created_at": "2021-10-09T03:32:18Z", - "updated_at": "2021-10-09T13:41:40Z", + "updated_at": "2021-10-09T16:03:00Z", "pushed_at": "2021-10-09T03:49:21Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 32, + "watchers_count": 32, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, - "watchers": 30, + "watchers": 32, "score": 0 }, { @@ -1241,5 +1241,59 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 415357102, + "name": "CVE-2021-41773", + "full_name": "EagleTube\/CVE-2021-41773", + "owner": { + "login": "EagleTube", + "id": 87413459, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87413459?v=4", + "html_url": "https:\/\/github.com\/EagleTube" + }, + "html_url": "https:\/\/github.com\/EagleTube\/CVE-2021-41773", + "description": "Apache 2.4.49 Path Traversal Vulnerability Checker ", + "fork": false, + "created_at": "2021-10-09T16:07:57Z", + "updated_at": "2021-10-09T16:32:11Z", + "pushed_at": "2021-10-09T16:32:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 415362322, + "name": "cve-2021-41773", + "full_name": "meicookies\/cve-2021-41773", + "owner": { + "login": "meicookies", + "id": 79348524, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79348524?v=4", + "html_url": "https:\/\/github.com\/meicookies" + }, + "html_url": "https:\/\/github.com\/meicookies\/cve-2021-41773", + "description": "mass scan for apache 2.4.49\/2.4.50 ", + "fork": false, + "created_at": "2021-10-09T16:28:06Z", + "updated_at": "2021-10-09T20:40:25Z", + "pushed_at": "2021-10-09T16:40:02Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index f7fd0151cf..4bc3def596 100644 --- a/README.md +++ b/README.md @@ -2716,7 +2716,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [RyouYoo/CVE-2021-41773](https://github.com/RyouYoo/CVE-2021-41773) - [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773) - [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC) -- [Ls4ss/CVE-2021-41773](https://github.com/Ls4ss/CVE-2021-41773) +- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013) - [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773) - [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC) - [TishcaTpx/cve-2021-41773-nse](https://github.com/TishcaTpx/cve-2021-41773-nse) @@ -2752,6 +2752,8 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [KAB8345/CVE-2021-41773](https://github.com/KAB8345/CVE-2021-41773) - [inbug-team/CVE-2021-41773_CVE-2021-42013](https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013) - [5gstudent/cve-2021-41773-and-cve-2021-42013](https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013) +- [EagleTube/CVE-2021-41773](https://github.com/EagleTube/CVE-2021-41773) +- [meicookies/cve-2021-41773](https://github.com/meicookies/cve-2021-41773) ### CVE-2021-42013 (2021-10-07)