diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 5ac2de0341..e452f9fba1 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-15T14:38:06Z", + "updated_at": "2021-12-16T12:01:28Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1239, - "watchers_count": 1239, + "stargazers_count": 1240, + "watchers_count": 1240, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1239, + "watchers": 1240, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index ff5c41cdd7..51d36f28aa 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-15T14:38:06Z", + "updated_at": "2021-12-16T12:01:28Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1239, - "watchers_count": 1239, + "stargazers_count": 1240, + "watchers_count": 1240, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1239, + "watchers": 1240, "score": 0 }, { diff --git a/2017/CVE-2017-12636.json b/2017/CVE-2017-12636.json index fd3505af6e..035ab094b9 100644 --- a/2017/CVE-2017-12636.json +++ b/2017/CVE-2017-12636.json @@ -40,17 +40,17 @@ "description": "CVE-2017-12636|exploit Couchdb ", "fork": false, "created_at": "2020-03-23T10:11:04Z", - "updated_at": "2021-11-01T08:49:37Z", + "updated_at": "2021-12-16T10:13:27Z", "pushed_at": "2020-03-23T10:15:21Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 3, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 498eac1e0e..99a37da9ea 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-15T14:38:06Z", + "updated_at": "2021-12-16T12:01:28Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1239, - "watchers_count": 1239, + "stargazers_count": 1240, + "watchers_count": 1240, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1239, + "watchers": 1240, "score": 0 }, { diff --git a/2017/CVE-2017-5645.json b/2017/CVE-2017-5645.json index e1f2a2894f..7a06f8f0b3 100644 --- a/2017/CVE-2017-5645.json +++ b/2017/CVE-2017-5645.json @@ -40,7 +40,7 @@ "description": "A simple and harmless example implementation of CVE-2017-5645. ", "fork": false, "created_at": "2021-12-11T10:35:02Z", - "updated_at": "2021-12-15T14:48:52Z", + "updated_at": "2021-12-16T10:58:33Z", "pushed_at": "2021-12-15T14:45:48Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2017/CVE-2017-8890.json b/2017/CVE-2017-8890.json index 79fcfa5505..b8bd7c1bb2 100644 --- a/2017/CVE-2017-8890.json +++ b/2017/CVE-2017-8890.json @@ -44,12 +44,12 @@ "pushed_at": "2019-05-09T07:07:25Z", "stargazers_count": 31, "watchers_count": 31, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 13, + "forks": 14, "watchers": 31, "score": 0 }, diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json index 75d687bc65..58366082ee 100644 --- a/2018/CVE-2018-13379.json +++ b/2018/CVE-2018-13379.json @@ -13,17 +13,17 @@ "description": "CVE-2018-13379", "fork": false, "created_at": "2019-08-11T09:44:37Z", - "updated_at": "2021-12-05T05:40:24Z", + "updated_at": "2021-12-16T07:20:44Z", "pushed_at": "2019-08-14T08:40:25Z", - "stargazers_count": 239, - "watchers_count": 239, + "stargazers_count": 240, + "watchers_count": 240, "forks_count": 83, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 83, - "watchers": 239, + "watchers": 240, "score": 0 }, { diff --git a/2018/CVE-2018-15961.json b/2018/CVE-2018-15961.json index 7cf07f70f9..b527c0134b 100644 --- a/2018/CVE-2018-15961.json +++ b/2018/CVE-2018-15961.json @@ -116,14 +116,14 @@ { "id": 413221283, "name": "CVE-2018-15961", - "full_name": "oxctdev\/CVE-2018-15961", + "full_name": "onsecuredev\/CVE-2018-15961", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2018-15961", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2018-15961", "description": "CVE-2018-15961 — ᴀᴅᴏʙᴇ ᴄᴏʟᴅғᴜsɪᴏɴ (ʀᴄᴇ) ", "fork": false, "created_at": "2021-10-03T23:31:47Z", diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 62987eb0cb..5b563d2144 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-15T14:38:06Z", + "updated_at": "2021-12-16T12:01:28Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1239, - "watchers_count": 1239, + "stargazers_count": 1240, + "watchers_count": 1240, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1239, + "watchers": 1240, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index a87e7fab64..ef405c0d32 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1223,12 +1223,12 @@ "pushed_at": "2020-12-06T04:48:38Z", "stargazers_count": 1162, "watchers_count": 1162, - "forks_count": 411, + "forks_count": 412, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 411, + "forks": 412, "watchers": 1162, "score": 0 }, @@ -2888,17 +2888,17 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2021-12-15T14:38:09Z", + "updated_at": "2021-12-16T09:51:36Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 243, - "watchers_count": 243, + "stargazers_count": 244, + "watchers_count": 244, "forks_count": 64, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 64, - "watchers": 243, + "watchers": 244, "score": 0 }, { diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 5e8168d7f1..db8ee01963 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -410,6 +410,33 @@ "watchers": 0, "score": 0 }, + { + "id": 349491080, + "name": "WhatsAppHACK-RCE", + "full_name": "kal1gh0st\/WhatsAppHACK-RCE", + "owner": { + "login": "kal1gh0st", + "id": 56889513, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4", + "html_url": "https:\/\/github.com\/kal1gh0st" + }, + "html_url": "https:\/\/github.com\/kal1gh0st\/WhatsAppHACK-RCE", + "description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/", + "fork": false, + "created_at": "2021-03-19T16:41:31Z", + "updated_at": "2021-12-15T00:43:34Z", + "pushed_at": "2021-11-17T14:40:14Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0 + }, { "id": 382906478, "name": "CVE-2019-11932", diff --git a/2019/CVE-2019-12725.json b/2019/CVE-2019-12725.json index eac28685e8..bc48ff5db8 100644 --- a/2019/CVE-2019-12725.json +++ b/2019/CVE-2019-12725.json @@ -40,7 +40,7 @@ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "fork": false, "created_at": "2021-05-22T05:06:33Z", - "updated_at": "2021-12-07T02:34:30Z", + "updated_at": "2021-12-16T07:46:32Z", "pushed_at": "2021-11-21T10:34:06Z", "stargazers_count": 41, "watchers_count": 41, diff --git a/2019/CVE-2019-15858.json b/2019/CVE-2019-15858.json index 9173363a63..d4f078452e 100644 --- a/2019/CVE-2019-15858.json +++ b/2019/CVE-2019-15858.json @@ -29,14 +29,14 @@ { "id": 416094403, "name": "CVE-2019-15858", - "full_name": "oxctdev\/CVE-2019-15858", + "full_name": "onsecuredev\/CVE-2019-15858", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2019-15858", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2019-15858", "description": "Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)", "fork": false, "created_at": "2021-10-11T21:37:06Z", diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 89523036ce..04f7e40434 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,10 +40,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-12-16T03:13:56Z", + "updated_at": "2021-12-16T08:01:44Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3046, - "watchers_count": 3046, + "stargazers_count": 3048, + "watchers_count": 3048, "forks_count": 903, "allow_forking": true, "is_template": false, @@ -70,7 +70,7 @@ ], "visibility": "public", "forks": 903, - "watchers": 3046, + "watchers": 3048, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 5230e24254..495d1bbf2a 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-15T14:38:06Z", + "updated_at": "2021-12-16T12:01:28Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1239, - "watchers_count": 1239, + "stargazers_count": 1240, + "watchers_count": 1240, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1239, + "watchers": 1240, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index abf93b4e92..367307a83f 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -209,17 +209,17 @@ "description": "This project is used for scanning cve-2020-0796 SMB vulnerability", "fork": false, "created_at": "2020-03-12T02:20:07Z", - "updated_at": "2021-12-05T20:38:36Z", + "updated_at": "2021-12-16T08:58:19Z", "pushed_at": "2020-03-12T02:49:10Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, - "watchers": 11, + "watchers": 12, "score": 0 }, { @@ -1018,10 +1018,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-12-15T14:38:45Z", + "updated_at": "2021-12-16T07:59:13Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1169, - "watchers_count": 1169, + "stargazers_count": 1170, + "watchers_count": 1170, "forks_count": 367, "allow_forking": true, "is_template": false, @@ -1034,7 +1034,7 @@ ], "visibility": "public", "forks": 367, - "watchers": 1169, + "watchers": 1170, "score": 0 }, { @@ -1337,7 +1337,7 @@ "pushed_at": "2020-06-09T20:46:45Z", "stargazers_count": 434, "watchers_count": 434, - "forks_count": 141, + "forks_count": 142, "allow_forking": true, "is_template": false, "topics": [ @@ -1348,7 +1348,7 @@ "smbghost" ], "visibility": "public", - "forks": 141, + "forks": 142, "watchers": 434, "score": 0 }, @@ -1986,14 +1986,14 @@ { "id": 415205467, "name": "CVE-2020-0796", - "full_name": "oxctdev\/CVE-2020-0796", + "full_name": "onsecuredev\/CVE-2020-0796", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2020-0796", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2020-0796", "description": "Remote Code Execution POC for CVE-2020-0796", "fork": false, "created_at": "2021-10-09T04:52:55Z", diff --git a/2020/CVE-2020-13935.json b/2020/CVE-2020-13935.json index 7c54c18798..a91d9cba98 100644 --- a/2020/CVE-2020-13935.json +++ b/2020/CVE-2020-13935.json @@ -13,17 +13,17 @@ "description": "Exploit for WebSocket Vulnerability in Apache Tomcat", "fork": false, "created_at": "2020-11-02T14:48:55Z", - "updated_at": "2021-12-15T14:40:44Z", + "updated_at": "2021-12-16T09:58:57Z", "pushed_at": "2020-11-02T14:51:48Z", - "stargazers_count": 141, - "watchers_count": 141, + "stargazers_count": 142, + "watchers_count": 142, "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 33, - "watchers": 141, + "watchers": 142, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index ab17d2d515..74fc9c9dbc 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-12-16T03:13:56Z", + "updated_at": "2021-12-16T08:01:44Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3046, - "watchers_count": 3046, + "stargazers_count": 3048, + "watchers_count": 3048, "forks_count": 903, "allow_forking": true, "is_template": false, @@ -43,7 +43,7 @@ ], "visibility": "public", "forks": 903, - "watchers": 3046, + "watchers": 3048, "score": 0 }, { @@ -141,17 +141,17 @@ "description": "CVE-2020-14882 Weblogic-Exp", "fork": false, "created_at": "2020-10-29T06:30:30Z", - "updated_at": "2021-03-14T05:03:17Z", + "updated_at": "2021-12-16T10:13:26Z", "pushed_at": "2020-10-29T06:36:01Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, - "watchers": 13, + "watchers": 14, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 8deff89b24..f919fbe945 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -13,17 +13,17 @@ "description": "[CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)", "fork": false, "created_at": "2020-11-09T15:26:28Z", - "updated_at": "2021-12-06T03:09:25Z", + "updated_at": "2021-12-16T07:46:11Z", "pushed_at": "2020-11-09T17:21:45Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 0481152329..5b283c658a 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -364,10 +364,10 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2021-12-15T14:38:24Z", + "updated_at": "2021-12-16T08:07:58Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 221, - "watchers_count": 221, + "stargazers_count": 222, + "watchers_count": 222, "forks_count": 85, "allow_forking": true, "is_template": false, @@ -380,7 +380,7 @@ ], "visibility": "public", "forks": 85, - "watchers": 221, + "watchers": 222, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 047006b6fa..9f6fa76b4c 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-15T14:38:06Z", + "updated_at": "2021-12-16T12:01:28Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1239, - "watchers_count": 1239, + "stargazers_count": 1240, + "watchers_count": 1240, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1239, + "watchers": 1240, "score": 0 }, { @@ -173,17 +173,17 @@ "description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。", "fork": false, "created_at": "2020-05-16T03:01:32Z", - "updated_at": "2021-12-15T14:39:19Z", + "updated_at": "2021-12-16T09:23:09Z", "pushed_at": "2020-05-17T12:07:01Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "forks_count": 23, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 23, - "watchers": 63, + "watchers": 64, "score": 0 }, { diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index 5078f3cd39..278375fa92 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -435,17 +435,17 @@ "description": "simple bash script of CVE-2020-3452 Cisco ASA \/ Firepower Read-Only Path Traversal Vulnerability checker ", "fork": false, "created_at": "2021-02-04T16:50:27Z", - "updated_at": "2021-02-11T04:34:46Z", + "updated_at": "2021-12-16T09:46:15Z", "pushed_at": "2021-02-04T17:38:25Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2020/CVE-2020-36179.json b/2020/CVE-2020-36179.json index a1257a9293..382c734e1b 100644 --- a/2020/CVE-2020-36179.json +++ b/2020/CVE-2020-36179.json @@ -13,10 +13,10 @@ "description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE", "fork": false, "created_at": "2021-01-10T06:47:49Z", - "updated_at": "2021-12-14T06:13:22Z", + "updated_at": "2021-12-16T09:47:42Z", "pushed_at": "2021-01-10T06:48:53Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "forks_count": 8, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 70, + "watchers": 71, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json index 48562b3313..2d5732a639 100644 --- a/2020/CVE-2020-8554.json +++ b/2020/CVE-2020-8554.json @@ -13,17 +13,17 @@ "description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs", "fork": false, "created_at": "2020-12-01T16:58:39Z", - "updated_at": "2021-11-19T20:50:02Z", + "updated_at": "2021-12-16T10:30:25Z", "pushed_at": "2021-11-19T20:50:40Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 1ea3902abd..bf267fef7f 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,17 +13,17 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2021-12-15T14:41:35Z", + "updated_at": "2021-12-16T09:50:16Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 348, - "watchers_count": 348, + "stargazers_count": 349, + "watchers_count": 349, "forks_count": 93, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 93, - "watchers": 348, + "watchers": 349, "score": 0 }, { @@ -40,17 +40,17 @@ "description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发", "fork": false, "created_at": "2021-03-08T05:07:15Z", - "updated_at": "2021-12-16T01:35:42Z", + "updated_at": "2021-12-16T09:50:21Z", "pushed_at": "2021-03-08T11:41:19Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 23, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 23, - "watchers": 46, + "watchers": 47, "score": 0 }, { diff --git a/2021/CVE-2021-20837.json b/2021/CVE-2021-20837.json index 291c95caf3..de51a709f0 100644 --- a/2021/CVE-2021-20837.json +++ b/2021/CVE-2021-20837.json @@ -29,14 +29,14 @@ { "id": 422835153, "name": "CVE-2021-20837", - "full_name": "oxctdev\/CVE-2021-20837", + "full_name": "onsecuredev\/CVE-2021-20837", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-20837", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-20837", "description": "XMLRPC - RCE in MovableTypePoC", "fork": false, "created_at": "2021-10-30T09:15:56Z", diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index e63ee6f8b8..a01cde5508 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -13,17 +13,17 @@ "description": "Exploit to SYSTEM for CVE-2021-21551", "fork": false, "created_at": "2021-05-13T13:23:38Z", - "updated_at": "2021-12-15T14:42:08Z", + "updated_at": "2021-12-16T10:11:55Z", "pushed_at": "2021-05-20T20:33:09Z", - "stargazers_count": 231, - "watchers_count": 231, + "stargazers_count": 232, + "watchers_count": 232, "forks_count": 40, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 40, - "watchers": 231, + "watchers": 232, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 5320b331b6..d6e6f78860 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -84,18 +84,18 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2021-12-15T14:41:32Z", - "pushed_at": "2021-12-12T10:17:47Z", + "updated_at": "2021-12-16T07:35:11Z", + "pushed_at": "2021-12-16T07:35:08Z", "stargazers_count": 330, "watchers_count": 330, - "forks_count": 126, + "forks_count": 127, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-21972" ], "visibility": "public", - "forks": 126, + "forks": 127, "watchers": 330, "score": 0 }, @@ -700,14 +700,14 @@ { "id": 413216838, "name": "CVE-2021-21972", - "full_name": "oxctdev\/CVE-2021-21972", + "full_name": "onsecuredev\/CVE-2021-21972", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-21972", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-21972", "description": "CVE-2021-21972 – ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)", "fork": false, "created_at": "2021-10-03T23:03:11Z", diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 86818054f9..deaff694a0 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -155,17 +155,17 @@ "description": "cve-2021-21985 exploit", "fork": false, "created_at": "2021-06-03T12:17:06Z", - "updated_at": "2021-12-15T14:42:17Z", - "pushed_at": "2021-06-07T01:44:03Z", - "stargazers_count": 76, - "watchers_count": 76, - "forks_count": 23, + "updated_at": "2021-12-16T08:36:57Z", + "pushed_at": "2021-12-16T08:25:02Z", + "stargazers_count": 80, + "watchers_count": 80, + "forks_count": 25, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 23, - "watchers": 76, + "forks": 25, + "watchers": 80, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 38c97a023d..1b6549241a 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -422,17 +422,17 @@ "description": null, "fork": false, "created_at": "2021-11-09T18:19:43Z", - "updated_at": "2021-12-06T14:45:29Z", + "updated_at": "2021-12-16T09:46:07Z", "pushed_at": "2021-11-12T07:40:09Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2021/CVE-2021-22893.json b/2021/CVE-2021-22893.json index 2d5477972d..a6984e4a10 100644 --- a/2021/CVE-2021-22893.json +++ b/2021/CVE-2021-22893.json @@ -56,14 +56,14 @@ { "id": 413204436, "name": "CVE-2021-22893", - "full_name": "oxctdev\/CVE-2021-22893", + "full_name": "onsecuredev\/CVE-2021-22893", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-22893", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-22893", "description": "Proof On Concept — Pulse Secure CVE-2021-22893", "fork": false, "created_at": "2021-10-03T21:46:58Z", diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 2b398ff8c7..c84a357f9b 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -150,11 +150,11 @@ "description": "CVE-2021-22986 & F5 BIG-IP RCE", "fork": false, "created_at": "2021-03-22T07:13:50Z", - "updated_at": "2021-12-15T14:41:43Z", + "updated_at": "2021-12-16T06:27:44Z", "pushed_at": "2021-04-03T12:56:37Z", - "stargazers_count": 65, - "watchers_count": 65, - "forks_count": 23, + "stargazers_count": 66, + "watchers_count": 66, + "forks_count": 24, "allow_forking": true, "is_template": false, "topics": [ @@ -162,8 +162,8 @@ "f5-bigip" ], "visibility": "public", - "forks": 23, - "watchers": 65, + "forks": 24, + "watchers": 66, "score": 0 }, { diff --git a/2021/CVE-2021-23758.json b/2021/CVE-2021-23758.json index 02d1c84214..b27329e8b7 100644 --- a/2021/CVE-2021-23758.json +++ b/2021/CVE-2021-23758.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-12-15T15:40:45Z", - "updated_at": "2021-12-16T06:08:32Z", + "updated_at": "2021-12-16T08:14:55Z", "pushed_at": "2021-12-15T16:37:09Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 44a6e2c38e..f05c5ab93e 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -202,17 +202,17 @@ "description": "CVE-2021-26084 Remote Code Execution on Confluence Servers", "fork": false, "created_at": "2021-09-01T09:50:26Z", - "updated_at": "2021-12-15T14:42:53Z", + "updated_at": "2021-12-16T08:55:37Z", "pushed_at": "2021-09-02T07:36:51Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 25, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 25, - "watchers": 42, + "watchers": 43, "score": 0 }, { @@ -634,8 +634,8 @@ "description": "asjhdsajdlksavksapfoka", "fork": false, "created_at": "2021-09-06T06:55:15Z", - "updated_at": "2021-09-06T06:58:34Z", - "pushed_at": "2021-09-06T06:58:31Z", + "updated_at": "2021-12-16T07:12:52Z", + "pushed_at": "2021-12-16T07:12:50Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, @@ -866,14 +866,14 @@ { "id": 414400971, "name": "CVE-2021-26084", - "full_name": "oxctdev\/CVE-2021-26084", + "full_name": "onsecuredev\/CVE-2021-26084", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-26084", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-26084", "description": "CVE-2021-26084 - Confluence Server Webwork OGNL injection ", "fork": false, "created_at": "2021-10-06T23:24:24Z", diff --git a/2021/CVE-2021-27651.json b/2021/CVE-2021-27651.json index c3e559cd7d..f446e2ff0a 100644 --- a/2021/CVE-2021-27651.json +++ b/2021/CVE-2021-27651.json @@ -56,14 +56,14 @@ { "id": 414009465, "name": "CVE-2021-27651", - "full_name": "oxctdev\/CVE-2021-27651", + "full_name": "onsecuredev\/CVE-2021-27651", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-27651", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-27651", "description": "bypass all stages of the password reset flow", "fork": false, "created_at": "2021-10-05T23:33:50Z", diff --git a/2021/CVE-2021-30573.json b/2021/CVE-2021-30573.json index 9ce56924ec..70f02aa526 100644 --- a/2021/CVE-2021-30573.json +++ b/2021/CVE-2021-30573.json @@ -29,14 +29,14 @@ { "id": 421034424, "name": "CVE-2021-30573", - "full_name": "oxctdev\/CVE-2021-30573", + "full_name": "onsecuredev\/CVE-2021-30573", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-30573", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-30573", "description": "Google Chrome Vulnerabilities CVE-2021-30573", "fork": false, "created_at": "2021-10-25T13:25:23Z", diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 126e96ace0..240118881f 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -179,17 +179,17 @@ "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "fork": false, "created_at": "2021-02-18T05:42:13Z", - "updated_at": "2021-12-15T14:41:29Z", + "updated_at": "2021-12-16T09:44:24Z", "pushed_at": "2021-12-14T05:12:17Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 62, + "watchers_count": 62, "forks_count": 31, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 31, - "watchers": 60, + "watchers": 62, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index a8b553ba59..3ced3e964d 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -519,6 +519,33 @@ "watchers": 3, "score": 0 }, + { + "id": 334697314, + "name": "CVE-2021-3156", + "full_name": "kal1gh0st\/CVE-2021-3156", + "owner": { + "login": "kal1gh0st", + "id": 56889513, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4", + "html_url": "https:\/\/github.com\/kal1gh0st" + }, + "html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-3156", + "description": "Description Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via \"sudoedit -s\" and a command-line argument that ends with a single backslash character. ", + "fork": false, + "created_at": "2021-01-31T16:10:11Z", + "updated_at": "2021-12-15T00:43:34Z", + "pushed_at": "2021-05-04T14:41:30Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0 + }, { "id": 334775019, "name": "docker-CVE-2021-3156", @@ -1131,17 +1158,17 @@ "description": "CVE-2021-3156 - Sudo Baron Samedit", "fork": false, "created_at": "2021-04-29T06:29:26Z", - "updated_at": "2021-12-15T02:41:22Z", + "updated_at": "2021-12-16T11:58:24Z", "pushed_at": "2021-08-11T15:52:19Z", - "stargazers_count": 112, - "watchers_count": 112, + "stargazers_count": 113, + "watchers_count": 113, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 112, + "watchers": 113, "score": 0 }, { diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index b6521f34aa..0086b8d9ea 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -40,17 +40,17 @@ "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", - "updated_at": "2021-12-15T14:43:17Z", + "updated_at": "2021-12-16T09:58:26Z", "pushed_at": "2021-10-28T06:37:37Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "forks_count": 30, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 30, - "watchers": 71, + "watchers": 72, "score": 0 }, { diff --git a/2021/CVE-2021-36749.json b/2021/CVE-2021-36749.json index 16b232c564..86267f504a 100644 --- a/2021/CVE-2021-36749.json +++ b/2021/CVE-2021-36749.json @@ -13,7 +13,7 @@ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "fork": false, "created_at": "2021-05-22T05:06:33Z", - "updated_at": "2021-12-07T02:34:30Z", + "updated_at": "2021-12-16T07:46:32Z", "pushed_at": "2021-11-21T10:34:06Z", "stargazers_count": 41, "watchers_count": 41, diff --git a/2021/CVE-2021-38001.json b/2021/CVE-2021-38001.json index a658211a26..ec1cacfa48 100644 --- a/2021/CVE-2021-38001.json +++ b/2021/CVE-2021-38001.json @@ -40,17 +40,17 @@ "description": null, "fork": false, "created_at": "2021-11-05T03:18:46Z", - "updated_at": "2021-12-15T14:43:20Z", + "updated_at": "2021-12-16T07:00:09Z", "pushed_at": "2021-11-05T03:17:58Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 13, - "watchers": 22, + "watchers": 23, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-38314.json b/2021/CVE-2021-38314.json index 46c2b91538..5bca9240a0 100644 --- a/2021/CVE-2021-38314.json +++ b/2021/CVE-2021-38314.json @@ -2,14 +2,14 @@ { "id": 434961092, "name": "CVE-2021-38314", - "full_name": "oxctdev\/CVE-2021-38314", + "full_name": "onsecuredev\/CVE-2021-38314", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-38314", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-38314", "description": " Unauthenticated Sensitive Information Disclosure (CVE-2021–38314).", "fork": false, "created_at": "2021-12-04T17:08:05Z", diff --git a/2021/CVE-2021-39115.json b/2021/CVE-2021-39115.json index b58e52850c..edbbb71855 100644 --- a/2021/CVE-2021-39115.json +++ b/2021/CVE-2021-39115.json @@ -17,12 +17,12 @@ "pushed_at": "2021-09-09T03:58:32Z", "stargazers_count": 45, "watchers_count": 45, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 13, + "forks": 14, "watchers": 45, "score": 0 } diff --git a/2021/CVE-2021-39685.json b/2021/CVE-2021-39685.json index 1b5442adb8..d5bb80a288 100644 --- a/2021/CVE-2021-39685.json +++ b/2021/CVE-2021-39685.json @@ -13,17 +13,17 @@ "description": "CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability", "fork": false, "created_at": "2021-12-15T14:28:00Z", - "updated_at": "2021-12-16T02:53:12Z", + "updated_at": "2021-12-16T09:21:26Z", "pushed_at": "2021-12-15T20:23:59Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index a201e1a07e..37d0ac71b2 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -557,7 +557,7 @@ "pushed_at": "2021-10-12T23:05:07Z", "stargazers_count": 519, "watchers_count": 519, - "forks_count": 116, + "forks_count": 117, "allow_forking": true, "is_template": false, "topics": [ @@ -569,7 +569,7 @@ "remote-code-execution" ], "visibility": "public", - "forks": 116, + "forks": 117, "watchers": 519, "score": 0 }, @@ -644,17 +644,44 @@ "description": "Modified code so that we don´t need to rely on CAB archives", "fork": false, "created_at": "2021-09-19T19:46:28Z", - "updated_at": "2021-12-15T00:43:05Z", + "updated_at": "2021-12-16T10:11:56Z", "pushed_at": "2021-09-22T20:07:51Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, - "watchers": 71, + "watchers": 72, + "score": 0 + }, + { + "id": 409931314, + "name": "CVE-2021-40444_CAB_archives", + "full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives", + "owner": { + "login": "kal1gh0st", + "id": 56889513, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4", + "html_url": "https:\/\/github.com\/kal1gh0st" + }, + "html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives", + "description": "CVE 2021 40444 Windows Exploit services.dll", + "fork": false, + "created_at": "2021-09-24T10:59:34Z", + "updated_at": "2021-12-15T00:43:34Z", + "pushed_at": "2021-10-21T09:46:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, "score": 0 }, { diff --git a/2021/CVE-2021-40870.json b/2021/CVE-2021-40870.json index 61f9d54dfa..39746bdfbe 100644 --- a/2021/CVE-2021-40870.json +++ b/2021/CVE-2021-40870.json @@ -32,14 +32,14 @@ { "id": 414763941, "name": "CVE-2021-40870", - "full_name": "oxctdev\/CVE-2021-40870", + "full_name": "onsecuredev\/CVE-2021-40870", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-40870", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-40870", "description": "Aviatrix allows an authenticated user to execute arbitrary code", "fork": false, "created_at": "2021-10-07T21:34:00Z", diff --git a/2021/CVE-2021-41653.json b/2021/CVE-2021-41653.json index 495fdfc5cd..8a5eba26a9 100644 --- a/2021/CVE-2021-41653.json +++ b/2021/CVE-2021-41653.json @@ -13,17 +13,17 @@ "description": "TP-Link TL-WR840N EU v5 Remote Code Execution", "fork": false, "created_at": "2021-11-28T01:15:36Z", - "updated_at": "2021-12-14T03:53:44Z", + "updated_at": "2021-12-16T09:00:42Z", "pushed_at": "2021-12-12T09:02:28Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 1cc2a26572..37012c0557 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -744,14 +744,14 @@ { "id": 414410579, "name": "CVE-2021-41773", - "full_name": "oxctdev\/CVE-2021-41773", + "full_name": "onsecuredev\/CVE-2021-41773", "owner": { - "login": "oxctdev", + "login": "onsecuredev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/oxctdev" + "html_url": "https:\/\/github.com\/onsecuredev" }, - "html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-41773", + "html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-41773", "description": "Apache HTTPd (2.4.49) – Local File Disclosure (LFI)", "fork": false, "created_at": "2021-10-07T00:14:40Z", @@ -1263,17 +1263,17 @@ "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "fork": false, "created_at": "2021-10-09T03:32:18Z", - "updated_at": "2021-12-15T14:43:09Z", + "updated_at": "2021-12-16T06:21:05Z", "pushed_at": "2021-10-09T03:49:21Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "forks_count": 39, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 39, - "watchers": 117, + "watchers": 118, "score": 0 }, { diff --git a/2021/CVE-2021-41962.json b/2021/CVE-2021-41962.json new file mode 100644 index 0000000000..2e6b35f2fe --- /dev/null +++ b/2021/CVE-2021-41962.json @@ -0,0 +1,29 @@ +[ + { + "id": 438955513, + "name": "-CVE-2021-41962", + "full_name": "lohyt\/-CVE-2021-41962", + "owner": { + "login": "lohyt", + "id": 11375930, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11375930?v=4", + "html_url": "https:\/\/github.com\/lohyt" + }, + "html_url": "https:\/\/github.com\/lohyt\/-CVE-2021-41962", + "description": "Stored XSS found in Vehicle Service Management System 1.0 application in Sourcecodester.", + "fork": false, + "created_at": "2021-12-16T10:52:13Z", + "updated_at": "2021-12-16T10:59:21Z", + "pushed_at": "2021-12-16T10:59:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index c8dd25cf98..35981ab2d3 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,11 +13,11 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2021-12-16T06:10:56Z", + "updated_at": "2021-12-16T09:59:00Z", "pushed_at": "2021-12-11T15:43:11Z", - "stargazers_count": 528, - "watchers_count": 528, - "forks_count": 102, + "stargazers_count": 535, + "watchers_count": 535, + "forks_count": 105, "allow_forking": true, "is_template": false, "topics": [ @@ -27,8 +27,8 @@ "s4u2self" ], "visibility": "public", - "forks": 102, - "watchers": 528, + "forks": 105, + "watchers": 535, "score": 0 }, { @@ -45,17 +45,17 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2021-12-16T05:11:36Z", + "updated_at": "2021-12-16T09:38:42Z", "pushed_at": "2021-12-15T11:17:41Z", - "stargazers_count": 93, - "watchers_count": 93, - "forks_count": 14, + "stargazers_count": 96, + "watchers_count": 96, + "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 93, + "forks": 15, + "watchers": 96, "score": 0 }, { @@ -99,17 +99,17 @@ "description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)", "fork": false, "created_at": "2021-12-13T23:15:05Z", - "updated_at": "2021-12-16T05:41:11Z", + "updated_at": "2021-12-16T10:57:23Z", "pushed_at": "2021-12-13T23:15:47Z", - "stargazers_count": 117, - "watchers_count": 117, - "forks_count": 15, + "stargazers_count": 124, + "watchers_count": 124, + "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 15, - "watchers": 117, + "forks": 16, + "watchers": 124, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index a634301059..1397b0fb77 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,17 +13,17 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2021-12-16T03:59:58Z", - "pushed_at": "2021-12-12T10:50:54Z", - "stargazers_count": 871, - "watchers_count": 871, - "forks_count": 223, + "updated_at": "2021-12-16T11:02:46Z", + "pushed_at": "2021-12-16T09:50:15Z", + "stargazers_count": 873, + "watchers_count": 873, + "forks_count": 224, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 223, - "watchers": 871, + "forks": 224, + "watchers": 873, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 18e40c1b19..d8cc878554 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -67,17 +67,17 @@ "description": "Grafana Unauthorized arbitrary file reading vulnerability", "fork": false, "created_at": "2021-12-07T09:02:16Z", - "updated_at": "2021-12-15T14:43:29Z", + "updated_at": "2021-12-16T10:23:39Z", "pushed_at": "2021-12-09T03:16:21Z", - "stargazers_count": 220, - "watchers_count": 220, - "forks_count": 56, + "stargazers_count": 221, + "watchers_count": 221, + "forks_count": 57, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 56, - "watchers": 220, + "forks": 57, + "watchers": 221, "score": 0 }, { @@ -214,17 +214,17 @@ "description": "grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL", "fork": false, "created_at": "2021-12-08T03:43:31Z", - "updated_at": "2021-12-11T11:31:22Z", + "updated_at": "2021-12-16T09:24:16Z", "pushed_at": "2021-12-08T07:04:13Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 62335957e3..e6121b6764 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -13,8 +13,8 @@ "description": "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2", "fork": false, "created_at": "2021-12-09T21:49:33Z", - "updated_at": "2021-12-14T04:22:35Z", - "pushed_at": "2021-12-09T22:29:54Z", + "updated_at": "2021-12-16T11:56:23Z", + "pushed_at": "2021-12-16T11:56:20Z", "stargazers_count": 13, "watchers_count": 13, "forks_count": 0, @@ -94,17 +94,17 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2021-12-16T04:51:47Z", + "updated_at": "2021-12-16T12:13:00Z", "pushed_at": "2021-12-14T15:30:16Z", - "stargazers_count": 209, - "watchers_count": 209, - "forks_count": 52, + "stargazers_count": 215, + "watchers_count": 215, + "forks_count": 54, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 52, - "watchers": 209, + "forks": 54, + "watchers": 215, "score": 0 }, { @@ -121,11 +121,11 @@ "description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information", "fork": false, "created_at": "2021-12-10T06:15:38Z", - "updated_at": "2021-12-16T01:33:51Z", + "updated_at": "2021-12-16T07:39:32Z", "pushed_at": "2021-12-16T01:33:48Z", - "stargazers_count": 161, - "watchers_count": 161, - "forks_count": 27, + "stargazers_count": 162, + "watchers_count": 162, + "forks_count": 29, "allow_forking": true, "is_template": false, "topics": [ @@ -138,8 +138,8 @@ "minecraft" ], "visibility": "public", - "forks": 27, - "watchers": 161, + "forks": 29, + "watchers": 162, "score": 0 }, { @@ -156,10 +156,10 @@ "description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.", "fork": false, "created_at": "2021-12-10T06:42:37Z", - "updated_at": "2021-12-15T14:43:30Z", + "updated_at": "2021-12-16T09:28:47Z", "pushed_at": "2021-12-11T02:49:41Z", - "stargazers_count": 84, - "watchers_count": 84, + "stargazers_count": 85, + "watchers_count": 85, "forks_count": 14, "allow_forking": true, "is_template": false, @@ -179,7 +179,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 84, + "watchers": 85, "score": 0 }, { @@ -196,17 +196,17 @@ "description": "Apache Log4j 2 a remote code execution vulnerability via the ldap JNDI parser.", "fork": false, "created_at": "2021-12-10T06:59:10Z", - "updated_at": "2021-12-10T07:07:27Z", + "updated_at": "2021-12-16T07:08:38Z", "pushed_at": "2021-12-10T07:07:25Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -390,17 +390,17 @@ "description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2021-12-16T06:10:02Z", + "updated_at": "2021-12-16T09:39:39Z", "pushed_at": "2021-12-14T17:09:31Z", - "stargazers_count": 703, - "watchers_count": 703, - "forks_count": 240, + "stargazers_count": 711, + "watchers_count": 711, + "forks_count": 250, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 240, - "watchers": 703, + "forks": 250, + "watchers": 711, "score": 0 }, { @@ -417,10 +417,10 @@ "description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.", "fork": false, "created_at": "2021-12-10T14:22:49Z", - "updated_at": "2021-12-16T00:08:57Z", + "updated_at": "2021-12-16T11:14:24Z", "pushed_at": "2021-12-14T15:16:15Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 103, + "watchers_count": 103, "forks_count": 26, "allow_forking": true, "is_template": false, @@ -434,7 +434,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 100, + "watchers": 103, "score": 0 }, { @@ -478,7 +478,7 @@ "description": "Patch Pulsar Docker images with Log4J 2.16.0 update to mitigate CVE-2021-44228", "fork": false, "created_at": "2021-12-10T15:46:49Z", - "updated_at": "2021-12-15T07:42:01Z", + "updated_at": "2021-12-16T09:03:01Z", "pushed_at": "2021-12-15T06:39:23Z", "stargazers_count": 1, "watchers_count": 1, @@ -598,17 +598,17 @@ "description": "Hashes for vulnerable LOG4J versions", "fork": false, "created_at": "2021-12-10T18:06:06Z", - "updated_at": "2021-12-16T06:07:58Z", + "updated_at": "2021-12-16T11:49:30Z", "pushed_at": "2021-12-15T18:25:56Z", - "stargazers_count": 119, - "watchers_count": 119, + "stargazers_count": 122, + "watchers_count": 122, "forks_count": 24, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 24, - "watchers": 119, + "watchers": 122, "score": 0 }, { @@ -713,17 +713,17 @@ "description": "log4shell sample application (CVE-2021-44228)", "fork": false, "created_at": "2021-12-10T21:13:46Z", - "updated_at": "2021-12-15T05:36:33Z", + "updated_at": "2021-12-16T09:58:36Z", "pushed_at": "2021-12-10T21:15:23Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 3, + "watchers": 4, "score": 0 }, { @@ -767,17 +767,17 @@ "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading", "fork": false, "created_at": "2021-12-10T21:46:18Z", - "updated_at": "2021-12-15T20:51:45Z", + "updated_at": "2021-12-16T11:25:18Z", "pushed_at": "2021-12-13T22:27:25Z", - "stargazers_count": 104, - "watchers_count": 104, - "forks_count": 40, + "stargazers_count": 108, + "watchers_count": 108, + "forks_count": 42, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 40, - "watchers": 104, + "forks": 42, + "watchers": 108, "score": 0 }, { @@ -855,11 +855,11 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2021-12-16T04:35:20Z", + "updated_at": "2021-12-16T11:53:32Z", "pushed_at": "2021-12-15T18:14:11Z", - "stargazers_count": 428, - "watchers_count": 428, - "forks_count": 62, + "stargazers_count": 434, + "watchers_count": 434, + "forks_count": 64, "allow_forking": true, "is_template": false, "topics": [ @@ -882,8 +882,8 @@ "writeups" ], "visibility": "public", - "forks": 62, - "watchers": 428, + "forks": 64, + "watchers": 434, "score": 0 }, { @@ -900,11 +900,11 @@ "description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2021-12-16T06:03:55Z", - "pushed_at": "2021-12-16T05:06:36Z", - "stargazers_count": 298, - "watchers_count": 298, - "forks_count": 59, + "updated_at": "2021-12-16T12:00:19Z", + "pushed_at": "2021-12-16T09:15:49Z", + "stargazers_count": 328, + "watchers_count": 328, + "forks_count": 67, "allow_forking": true, "is_template": false, "topics": [ @@ -914,8 +914,8 @@ "security" ], "visibility": "public", - "forks": 59, - "watchers": 298, + "forks": 67, + "watchers": 328, "score": 0 }, { @@ -959,10 +959,10 @@ "description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam", "fork": false, "created_at": "2021-12-10T23:35:31Z", - "updated_at": "2021-12-15T23:54:10Z", + "updated_at": "2021-12-16T08:19:59Z", "pushed_at": "2021-12-14T13:43:35Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -974,7 +974,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 44, + "watchers": 45, "score": 0 }, { @@ -1226,11 +1226,11 @@ "description": "CVE-2021-44228 log4j2 RCE Burp Suite Passive Scanner,can customize the ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2021-12-16T06:08:33Z", - "pushed_at": "2021-12-16T05:50:29Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 5, + "updated_at": "2021-12-16T11:52:00Z", + "pushed_at": "2021-12-16T08:20:44Z", + "stargazers_count": 20, + "watchers_count": 20, + "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [ @@ -1239,8 +1239,8 @@ "log4j2" ], "visibility": "public", - "forks": 5, - "watchers": 3, + "forks": 11, + "watchers": 20, "score": 0 }, { @@ -1365,11 +1365,11 @@ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:18:46Z", - "updated_at": "2021-12-16T06:09:49Z", - "pushed_at": "2021-12-16T00:39:32Z", - "stargazers_count": 325, - "watchers_count": 325, - "forks_count": 78, + "updated_at": "2021-12-16T11:45:09Z", + "pushed_at": "2021-12-16T09:31:14Z", + "stargazers_count": 357, + "watchers_count": 357, + "forks_count": 83, "allow_forking": true, "is_template": false, "topics": [ @@ -1380,8 +1380,8 @@ "scanner" ], "visibility": "public", - "forks": 78, - "watchers": 325, + "forks": 83, + "watchers": 357, "score": 0 }, { @@ -1934,17 +1934,17 @@ "description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.", "fork": false, "created_at": "2021-12-12T01:24:51Z", - "updated_at": "2021-12-16T06:04:08Z", - "pushed_at": "2021-12-16T06:04:04Z", - "stargazers_count": 324, - "watchers_count": 324, - "forks_count": 41, + "updated_at": "2021-12-16T11:43:31Z", + "pushed_at": "2021-12-16T07:13:49Z", + "stargazers_count": 340, + "watchers_count": 340, + "forks_count": 43, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 41, - "watchers": 324, + "forks": 43, + "watchers": 340, "score": 0 }, { @@ -1961,11 +1961,11 @@ "description": "An All-In-One Pure Python PoC for CVE-2021-44228", "fork": false, "created_at": "2021-12-12T02:57:49Z", - "updated_at": "2021-12-16T05:31:31Z", + "updated_at": "2021-12-16T11:06:59Z", "pushed_at": "2021-12-13T04:29:28Z", - "stargazers_count": 145, - "watchers_count": 145, - "forks_count": 23, + "stargazers_count": 155, + "watchers_count": 155, + "forks_count": 25, "allow_forking": true, "is_template": false, "topics": [ @@ -1976,8 +1976,8 @@ "rce" ], "visibility": "public", - "forks": 23, - "watchers": 145, + "forks": 25, + "watchers": 155, "score": 0 }, { @@ -1994,17 +1994,17 @@ "description": null, "fork": false, "created_at": "2021-12-12T02:59:54Z", - "updated_at": "2021-12-15T13:52:38Z", + "updated_at": "2021-12-16T10:31:08Z", "pushed_at": "2021-12-15T10:19:51Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 35, + "watchers_count": 35, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 33, + "watchers": 35, "score": 0 }, { @@ -2379,6 +2379,40 @@ "watchers": 43, "score": 0 }, + { + "id": 437526168, + "name": "Log4JShell-Bytecode-Detector", + "full_name": "CodeShield-Security\/Log4JShell-Bytecode-Detector", + "owner": { + "login": "CodeShield-Security", + "id": 60257643, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60257643?v=4", + "html_url": "https:\/\/github.com\/CodeShield-Security" + }, + "html_url": "https:\/\/github.com\/CodeShield-Security\/Log4JShell-Bytecode-Detector", + "description": "Local Bytecode Scanner for Log4JShell Vulnerability (CVE-2021-44228)", + "fork": false, + "created_at": "2021-12-12T11:28:34Z", + "updated_at": "2021-12-16T12:04:44Z", + "pushed_at": "2021-12-16T12:04:41Z", + "stargazers_count": 27, + "watchers_count": 27, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "topics": [ + "bytecode", + "cve-2021-44228", + "log4j2", + "log4jshell", + "scanner", + "security" + ], + "visibility": "public", + "forks": 2, + "watchers": 27, + "score": 0 + }, { "id": 437526871, "name": "log4j-poc", @@ -2555,17 +2589,17 @@ "description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script", "fork": false, "created_at": "2021-12-12T13:45:08Z", - "updated_at": "2021-12-15T19:42:19Z", + "updated_at": "2021-12-16T11:57:25Z", "pushed_at": "2021-12-15T08:14:56Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 30, + "watchers_count": 30, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 26, + "watchers": 30, "score": 0 }, { @@ -2609,8 +2643,8 @@ "description": "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability ", "fork": false, "created_at": "2021-12-12T14:05:05Z", - "updated_at": "2021-12-15T22:19:53Z", - "pushed_at": "2021-12-15T21:19:02Z", + "updated_at": "2021-12-16T08:58:15Z", + "pushed_at": "2021-12-16T08:58:12Z", "stargazers_count": 39, "watchers_count": 39, "forks_count": 4, @@ -2640,8 +2674,8 @@ "description": "Known IoCs for log4j framework vulnerability ", "fork": false, "created_at": "2021-12-12T14:27:28Z", - "updated_at": "2021-12-15T21:01:20Z", - "pushed_at": "2021-12-15T21:01:18Z", + "updated_at": "2021-12-16T07:43:12Z", + "pushed_at": "2021-12-16T07:43:11Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, @@ -2694,17 +2728,17 @@ "description": null, "fork": false, "created_at": "2021-12-12T15:00:04Z", - "updated_at": "2021-12-14T15:20:24Z", + "updated_at": "2021-12-16T06:25:13Z", "pushed_at": "2021-12-12T16:03:21Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0 }, { @@ -2721,17 +2755,17 @@ "description": "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability.", "fork": false, "created_at": "2021-12-12T15:29:20Z", - "updated_at": "2021-12-16T06:11:12Z", + "updated_at": "2021-12-16T09:31:48Z", "pushed_at": "2021-12-15T01:08:54Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 50, + "watchers": 51, "score": 0 }, { @@ -2748,11 +2782,11 @@ "description": "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.", "fork": false, "created_at": "2021-12-12T15:30:55Z", - "updated_at": "2021-12-16T03:52:03Z", - "pushed_at": "2021-12-16T03:44:43Z", - "stargazers_count": 21, - "watchers_count": 21, - "forks_count": 2, + "updated_at": "2021-12-16T10:47:14Z", + "pushed_at": "2021-12-16T10:47:11Z", + "stargazers_count": 22, + "watchers_count": 22, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ @@ -2760,8 +2794,8 @@ "log4jshell" ], "visibility": "public", - "forks": 2, - "watchers": 21, + "forks": 3, + "watchers": 22, "score": 0 }, { @@ -3044,17 +3078,17 @@ "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T22:52:02Z", - "updated_at": "2021-12-16T05:22:49Z", + "updated_at": "2021-12-16T12:12:40Z", "pushed_at": "2021-12-15T14:27:59Z", - "stargazers_count": 183, - "watchers_count": 183, - "forks_count": 27, + "stargazers_count": 192, + "watchers_count": 192, + "forks_count": 29, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 27, - "watchers": 183, + "forks": 29, + "watchers": 192, "score": 0 }, { @@ -3357,17 +3391,17 @@ "description": "OpenIOC rules to facilitate hunting for indicators of compromise", "fork": false, "created_at": "2021-12-13T03:55:32Z", - "updated_at": "2021-12-15T21:55:41Z", + "updated_at": "2021-12-16T10:38:01Z", "pushed_at": "2021-12-15T21:55:40Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 }, { @@ -3384,17 +3418,17 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2021-12-16T06:09:39Z", - "pushed_at": "2021-12-16T05:40:27Z", - "stargazers_count": 1432, - "watchers_count": 1432, - "forks_count": 315, + "updated_at": "2021-12-16T12:08:55Z", + "pushed_at": "2021-12-16T11:57:03Z", + "stargazers_count": 1530, + "watchers_count": 1530, + "forks_count": 333, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 315, - "watchers": 1432, + "forks": 333, + "watchers": 1530, "score": 0 }, { @@ -3411,17 +3445,17 @@ "description": "a fast check, if your server could be vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-13T04:14:18Z", - "updated_at": "2021-12-16T05:25:36Z", + "updated_at": "2021-12-16T11:32:38Z", "pushed_at": "2021-12-15T13:54:41Z", - "stargazers_count": 83, - "watchers_count": 83, - "forks_count": 35, + "stargazers_count": 95, + "watchers_count": 95, + "forks_count": 39, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 35, - "watchers": 83, + "forks": 39, + "watchers": 95, "score": 0 }, { @@ -3438,26 +3472,28 @@ "description": "Scanner to detect vulnerable log4j versions on your file-system or to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-13T06:09:04Z", - "updated_at": "2021-12-16T00:52:19Z", - "pushed_at": "2021-12-16T00:28:25Z", - "stargazers_count": 4, - "watchers_count": 4, + "updated_at": "2021-12-16T11:21:09Z", + "pushed_at": "2021-12-16T10:11:26Z", + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ + "blue-team", "cve-2021-44228", "jni", "log4j", "log4shell", "rce", + "red-team", "scanner", "vulnerability", "waf-bypass" ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 }, { @@ -3864,15 +3900,15 @@ "fork": false, "created_at": "2021-12-13T11:06:46Z", "updated_at": "2021-12-15T16:34:22Z", - "pushed_at": "2021-12-15T16:14:29Z", + "pushed_at": "2021-12-16T06:53:21Z", "stargazers_count": 34, "watchers_count": 34, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 11, "watchers": 34, "score": 0 }, @@ -4362,17 +4398,17 @@ "description": "Log4j", "fork": false, "created_at": "2021-12-13T17:25:52Z", - "updated_at": "2021-12-16T04:55:03Z", + "updated_at": "2021-12-16T08:41:40Z", "pushed_at": "2021-12-16T05:59:01Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0 }, { @@ -4565,8 +4601,8 @@ "description": "Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)", "fork": false, "created_at": "2021-12-13T20:17:14Z", - "updated_at": "2021-12-16T05:53:51Z", - "pushed_at": "2021-12-15T13:56:33Z", + "updated_at": "2021-12-16T12:01:45Z", + "pushed_at": "2021-12-16T12:01:42Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, @@ -4742,17 +4778,17 @@ "description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs", "fork": false, "created_at": "2021-12-13T21:39:51Z", - "updated_at": "2021-12-15T20:11:47Z", + "updated_at": "2021-12-16T12:03:27Z", "pushed_at": "2021-12-15T09:51:01Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 0, + "stargazers_count": 13, + "watchers_count": 13, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 4, + "forks": 3, + "watchers": 13, "score": 0 }, { @@ -4769,11 +4805,11 @@ "description": "Tool that checks whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046", "fork": false, "created_at": "2021-12-13T21:47:41Z", - "updated_at": "2021-12-16T05:59:09Z", - "pushed_at": "2021-12-15T20:50:31Z", - "stargazers_count": 11, - "watchers_count": 11, - "forks_count": 3, + "updated_at": "2021-12-16T10:37:15Z", + "pushed_at": "2021-12-16T08:56:09Z", + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [ @@ -4786,8 +4822,8 @@ "log4shell" ], "visibility": "public", - "forks": 3, - "watchers": 11, + "forks": 5, + "watchers": 14, "score": 0 }, { @@ -5052,17 +5088,17 @@ "description": "Log4j2 CVE-2021-44228 revshell", "fork": false, "created_at": "2021-12-14T05:24:52Z", - "updated_at": "2021-12-15T19:44:31Z", + "updated_at": "2021-12-16T11:37:40Z", "pushed_at": "2021-12-15T19:44:28Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 1, + "forks": 1, + "watchers": 5, "score": 0 }, { @@ -5139,11 +5175,11 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2021-12-16T05:49:03Z", + "updated_at": "2021-12-16T11:46:51Z", "pushed_at": "2021-12-14T16:55:19Z", - "stargazers_count": 75, - "watchers_count": 75, - "forks_count": 11, + "stargazers_count": 87, + "watchers_count": 87, + "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [ @@ -5154,8 +5190,8 @@ "vulnerability-scanners" ], "visibility": "public", - "forks": 11, - "watchers": 75, + "forks": 12, + "watchers": 87, "score": 0 }, { @@ -5226,8 +5262,8 @@ "description": "log4j (CVE-2021-44228) Spring-boot web application with vulnerabilities", "fork": false, "created_at": "2021-12-14T08:21:11Z", - "updated_at": "2021-12-16T04:02:16Z", - "pushed_at": "2021-12-16T04:02:14Z", + "updated_at": "2021-12-16T08:39:20Z", + "pushed_at": "2021-12-16T08:39:17Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -5317,12 +5353,12 @@ "pushed_at": "2021-12-14T09:35:48Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 }, @@ -5337,14 +5373,14 @@ "html_url": "https:\/\/github.com\/fox-it" }, "html_url": "https:\/\/github.com\/fox-it\/log4j-finder", - "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228)", + "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228 & CVE-2021-45046)", "fork": false, "created_at": "2021-12-14T10:04:42Z", - "updated_at": "2021-12-16T06:08:47Z", + "updated_at": "2021-12-16T12:07:22Z", "pushed_at": "2021-12-15T22:52:09Z", - "stargazers_count": 49, - "watchers_count": 49, - "forks_count": 17, + "stargazers_count": 65, + "watchers_count": 65, + "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [ @@ -5356,8 +5392,8 @@ "log4shell" ], "visibility": "public", - "forks": 17, - "watchers": 49, + "forks": 22, + "watchers": 65, "score": 0 }, { @@ -5374,17 +5410,17 @@ "description": null, "fork": false, "created_at": "2021-12-14T12:37:23Z", - "updated_at": "2021-12-16T06:09:24Z", + "updated_at": "2021-12-16T06:23:26Z", "pushed_at": "2021-12-14T12:49:56Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 4, + "stargazers_count": 21, + "watchers_count": 21, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 20, + "forks": 5, + "watchers": 21, "score": 0 }, { @@ -5522,6 +5558,33 @@ "watchers": 0, "score": 0 }, + { + "id": 438302340, + "name": "CVE-2021-44228", + "full_name": "roswellit\/CVE-2021-44228", + "owner": { + "login": "roswellit", + "id": 58468963, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58468963?v=4", + "html_url": "https:\/\/github.com\/roswellit" + }, + "html_url": "https:\/\/github.com\/roswellit\/CVE-2021-44228", + "description": "Log4Shell Enumeration, Mitigation and Attack Detection Tool", + "fork": false, + "created_at": "2021-12-14T15:22:50Z", + "updated_at": "2021-12-16T10:37:41Z", + "pushed_at": "2021-12-14T15:34:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 438328048, "name": "CVE-2021-44228", @@ -5590,17 +5653,17 @@ "description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-14T18:08:45Z", - "updated_at": "2021-12-16T06:10:51Z", + "updated_at": "2021-12-16T06:59:22Z", "pushed_at": "2021-12-15T23:40:20Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, - "watchers": 49, + "watchers": 53, "score": 0 }, { @@ -5617,17 +5680,17 @@ "description": "Tools for investigating Log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-14T19:08:14Z", - "updated_at": "2021-12-16T06:08:16Z", + "updated_at": "2021-12-16T07:30:02Z", "pushed_at": "2021-12-15T21:53:04Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 43, + "watchers": 44, "score": 0 }, { @@ -5644,17 +5707,17 @@ "description": "A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.", "fork": false, "created_at": "2021-12-14T19:29:11Z", - "updated_at": "2021-12-16T03:03:08Z", + "updated_at": "2021-12-16T11:42:48Z", "pushed_at": "2021-12-14T21:14:33Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 16, + "watchers": 17, "score": 0 }, { @@ -5731,10 +5794,10 @@ "description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-14T21:47:04Z", - "updated_at": "2021-12-16T05:52:30Z", + "updated_at": "2021-12-16T11:55:14Z", "pushed_at": "2021-12-15T20:37:05Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -5745,7 +5808,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 20, + "watchers": 22, "score": 0 }, { @@ -5762,8 +5825,8 @@ "description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.", "fork": false, "created_at": "2021-12-14T22:19:29Z", - "updated_at": "2021-12-15T16:49:18Z", - "pushed_at": "2021-12-15T16:49:16Z", + "updated_at": "2021-12-16T09:41:07Z", + "pushed_at": "2021-12-16T09:41:04Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, @@ -5798,11 +5861,11 @@ "description": "Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher", "fork": false, "created_at": "2021-12-14T22:22:15Z", - "updated_at": "2021-12-15T18:17:21Z", - "pushed_at": "2021-12-15T07:05:18Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 0, + "updated_at": "2021-12-16T10:22:18Z", + "pushed_at": "2021-12-16T09:43:10Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -5813,8 +5876,8 @@ "log4shell" ], "visibility": "public", - "forks": 0, - "watchers": 2, + "forks": 1, + "watchers": 4, "score": 0 }, { @@ -5860,17 +5923,17 @@ "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-14T23:33:51Z", - "updated_at": "2021-12-15T23:39:15Z", + "updated_at": "2021-12-16T10:49:05Z", "pushed_at": "2021-12-15T23:39:11Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0 }, { @@ -6049,10 +6112,10 @@ "description": "A playground for poking at the Log4Shell (CVE-2021-44228) vulnerability mitigations", "fork": false, "created_at": "2021-12-15T07:51:12Z", - "updated_at": "2021-12-15T08:44:18Z", + "updated_at": "2021-12-16T11:59:53Z", "pushed_at": "2021-12-15T08:44:16Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -6062,7 +6125,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -6137,17 +6200,17 @@ "description": "Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228", "fork": false, "created_at": "2021-12-15T10:55:35Z", - "updated_at": "2021-12-16T05:50:42Z", + "updated_at": "2021-12-16T12:04:02Z", "pushed_at": "2021-12-15T16:29:14Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0 }, { @@ -6191,10 +6254,10 @@ "description": "This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)", "fork": false, "created_at": "2021-12-15T11:34:02Z", - "updated_at": "2021-12-15T22:50:06Z", + "updated_at": "2021-12-16T10:22:33Z", "pushed_at": "2021-12-15T22:50:04Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -6205,7 +6268,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -6306,17 +6369,17 @@ "description": "we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them", "fork": false, "created_at": "2021-12-15T15:42:06Z", - "updated_at": "2021-12-15T20:18:22Z", + "updated_at": "2021-12-16T08:04:29Z", "pushed_at": "2021-12-15T20:15:44Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -6337,7 +6400,7 @@ "pushed_at": "2021-12-15T19:15:07Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -6346,7 +6409,7 @@ "log4j" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0 }, @@ -6391,17 +6454,17 @@ "description": "Scans for Log4j versions effected by CVE-2021-44228", "fork": false, "created_at": "2021-12-15T16:21:26Z", - "updated_at": "2021-12-15T19:16:43Z", - "pushed_at": "2021-12-15T19:16:40Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2021-12-16T11:53:17Z", + "pushed_at": "2021-12-16T11:55:53Z", + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -6418,8 +6481,35 @@ "description": "Honeypot for CVE-2021-44228", "fork": false, "created_at": "2021-12-15T16:29:37Z", - "updated_at": "2021-12-15T16:29:37Z", - "pushed_at": "2021-12-15T16:29:37Z", + "updated_at": "2021-12-16T09:56:45Z", + "pushed_at": "2021-12-16T09:57:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 438719808, + "name": "CVE-2021-44228", + "full_name": "MkTech-0-8YT3\/CVE-2021-44228", + "owner": { + "login": "MkTech-0-8YT3", + "id": 61518601, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61518601?v=4", + "html_url": "https:\/\/github.com\/MkTech-0-8YT3" + }, + "html_url": "https:\/\/github.com\/MkTech-0-8YT3\/CVE-2021-44228", + "description": "CVE-2021-44228 demo webapp", + "fork": false, + "created_at": "2021-12-15T17:42:13Z", + "updated_at": "2021-12-16T09:20:51Z", + "pushed_at": "2021-12-16T09:20:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -6499,17 +6589,17 @@ "description": null, "fork": false, "created_at": "2021-12-15T20:17:41Z", - "updated_at": "2021-12-16T06:09:00Z", + "updated_at": "2021-12-16T11:39:54Z", "pushed_at": "2021-12-15T21:03:44Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 3, + "stargazers_count": 20, + "watchers_count": 20, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 15, + "forks": 4, + "watchers": 20, "score": 0 }, { @@ -6624,5 +6714,133 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 438920047, + "name": "CVE-2021-44228", + "full_name": "roxas-tan\/CVE-2021-44228", + "owner": { + "login": "roxas-tan", + "id": 63656689, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63656689?v=4", + "html_url": "https:\/\/github.com\/roxas-tan" + }, + "html_url": "https:\/\/github.com\/roxas-tan\/CVE-2021-44228", + "description": "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce", + "fork": false, + "created_at": "2021-12-16T08:46:55Z", + "updated_at": "2021-12-16T08:59:16Z", + "pushed_at": "2021-12-16T08:59:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 438931405, + "name": "CVE-2021-44228", + "full_name": "shamo0\/CVE-2021-44228", + "owner": { + "login": "shamo0", + "id": 48299520, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4", + "html_url": "https:\/\/github.com\/shamo0" + }, + "html_url": "https:\/\/github.com\/shamo0\/CVE-2021-44228", + "description": "log4shell (CVE-2021-44228) scanning tool", + "fork": false, + "created_at": "2021-12-16T09:26:37Z", + "updated_at": "2021-12-16T10:00:18Z", + "pushed_at": "2021-12-16T10:00:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [ + "2021", + "44228", + "apache", + "code", + "cve", + "cve-2021-44228", + "execution", + "exploit", + "log", + "log4j", + "log4j2", + "log4shell", + "logging", + "poc", + "rce", + "remote", + "scanner", + "scanning", + "tool" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 438940454, + "name": "log4j-Scan-Burpsuite", + "full_name": "snow0715\/log4j-Scan-Burpsuite", + "owner": { + "login": "snow0715", + "id": 54879520, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54879520?v=4", + "html_url": "https:\/\/github.com\/snow0715" + }, + "html_url": "https:\/\/github.com\/snow0715\/log4j-Scan-Burpsuite", + "description": "Log4j漏洞(CVE-2021-44228)的Burpsuite检测插件", + "fork": false, + "created_at": "2021-12-16T09:58:02Z", + "updated_at": "2021-12-16T10:36:16Z", + "pushed_at": "2021-12-16T10:36:13Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 438951347, + "name": "Log4j-Windows-Scanner", + "full_name": "Joefreedy\/Log4j-Windows-Scanner", + "owner": { + "login": "Joefreedy", + "id": 47759132, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47759132?v=4", + "html_url": "https:\/\/github.com\/Joefreedy" + }, + "html_url": "https:\/\/github.com\/Joefreedy\/Log4j-Windows-Scanner", + "description": "CVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines.", + "fork": false, + "created_at": "2021-12-16T10:37:16Z", + "updated_at": "2021-12-16T11:52:58Z", + "pushed_at": "2021-12-16T11:39:13Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44827.json b/2021/CVE-2021-44827.json index ed970d194d..37f92b7a84 100644 --- a/2021/CVE-2021-44827.json +++ b/2021/CVE-2021-44827.json @@ -13,17 +13,17 @@ "description": "A PoC for CVE-2021-44827 - authenticated remote code execution in Tp-link Archer C20i", "fork": false, "created_at": "2021-12-13T11:17:12Z", - "updated_at": "2021-12-13T11:18:55Z", + "updated_at": "2021-12-16T10:23:11Z", "pushed_at": "2021-12-13T11:18:52Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-45043.json b/2021/CVE-2021-45043.json index 650b41c9ab..3fa00bd315 100644 --- a/2021/CVE-2021-45043.json +++ b/2021/CVE-2021-45043.json @@ -13,17 +13,17 @@ "description": "HD-Network Real-time Monitoring System 2.0 allows ..\/ directory traversal to read \/etc\/shadow via the \/language\/lang s_Language parameter.", "fork": false, "created_at": "2021-12-15T15:01:31Z", - "updated_at": "2021-12-15T15:07:04Z", + "updated_at": "2021-12-16T10:22:56Z", "pushed_at": "2021-12-15T15:07:00Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-45046.json b/2021/CVE-2021-45046.json index b7b49cd1da..1f7e00186b 100644 --- a/2021/CVE-2021-45046.json +++ b/2021/CVE-2021-45046.json @@ -13,17 +13,17 @@ "description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046", "fork": false, "created_at": "2021-12-15T05:48:53Z", - "updated_at": "2021-12-15T15:09:04Z", + "updated_at": "2021-12-16T10:21:41Z", "pushed_at": "2021-12-15T05:50:22Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 3, + "watchers": 5, "score": 0 }, { @@ -40,17 +40,17 @@ "description": "Oh no another one", "fork": false, "created_at": "2021-12-15T09:01:37Z", - "updated_at": "2021-12-15T09:18:03Z", + "updated_at": "2021-12-16T10:21:16Z", "pushed_at": "2021-12-15T09:18:00Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -67,14 +67,17 @@ "description": "Replicating CVE-2021-45046", "fork": false, "created_at": "2021-12-15T16:28:11Z", - "updated_at": "2021-12-15T16:51:38Z", - "pushed_at": "2021-12-15T16:51:35Z", + "updated_at": "2021-12-16T07:17:16Z", + "pushed_at": "2021-12-16T07:13:00Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, - "topics": [], + "topics": [ + "cve-2021-45046", + "log4j2" + ], "visibility": "public", "forks": 0, "watchers": 0, diff --git a/README.md b/README.md index f4cdc9533f..44073d9595 100644 --- a/README.md +++ b/README.md @@ -300,6 +300,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based - [blasty/CVE-2021-3156](https://github.com/blasty/CVE-2021-3156) - [teamtopkarl/CVE-2021-3156](https://github.com/teamtopkarl/CVE-2021-3156) - [Q4n/CVE-2021-3156](https://github.com/Q4n/CVE-2021-3156) +- [kal1gh0st/CVE-2021-3156](https://github.com/kal1gh0st/CVE-2021-3156) - [apogiatzis/docker-CVE-2021-3156](https://github.com/apogiatzis/docker-CVE-2021-3156) - [voidlsd/CVE-2021-3156](https://github.com/voidlsd/CVE-2021-3156) - [Ashish-dawani/CVE-2021-3156-Patch](https://github.com/Ashish-dawani/CVE-2021-3156-Patch) @@ -558,7 +559,7 @@ Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 an - [ghost-nemesis/cve-2021-20837-poc](https://github.com/ghost-nemesis/cve-2021-20837-poc) -- [oxctdev/CVE-2021-20837](https://github.com/oxctdev/CVE-2021-20837) +- [onsecuredev/CVE-2021-20837](https://github.com/onsecuredev/CVE-2021-20837) - [ohnonoyesyes/CVE-2021-20837](https://github.com/ohnonoyesyes/CVE-2021-20837) - [Cosemz/CVE-2021-20837](https://github.com/Cosemz/CVE-2021-20837) @@ -763,7 +764,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v - [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972) - [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter) - [haiclover/CVE-2021-21972](https://github.com/haiclover/CVE-2021-21972) -- [oxctdev/CVE-2021-21972](https://github.com/oxctdev/CVE-2021-21972) +- [onsecuredev/CVE-2021-21972](https://github.com/onsecuredev/CVE-2021-21972) ### CVE-2021-21973 (2021-02-24) @@ -976,7 +977,7 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b - [ZephrFish/CVE-2021-22893_HoneyPoC2](https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2) - [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893) -- [oxctdev/CVE-2021-22893](https://github.com/oxctdev/CVE-2021-22893) +- [onsecuredev/CVE-2021-22893](https://github.com/onsecuredev/CVE-2021-22893) ### CVE-2021-22911 (2021-05-27) @@ -1281,7 +1282,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul - [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084) - [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC) - [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084) -- [oxctdev/CVE-2021-26084](https://github.com/oxctdev/CVE-2021-26084) +- [onsecuredev/CVE-2021-26084](https://github.com/onsecuredev/CVE-2021-26084) - [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084) - [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084) - [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck) @@ -1630,7 +1631,7 @@ In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionali - [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC) - [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651) -- [oxctdev/CVE-2021-27651](https://github.com/oxctdev/CVE-2021-27651) +- [onsecuredev/CVE-2021-27651](https://github.com/onsecuredev/CVE-2021-27651) ### CVE-2021-27850 (2021-04-15) @@ -1939,7 +1940,7 @@ Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote a - [s4e-lab/CVE-2021-30573-PoC-Google-Chrome](https://github.com/s4e-lab/CVE-2021-30573-PoC-Google-Chrome) -- [oxctdev/CVE-2021-30573](https://github.com/oxctdev/CVE-2021-30573) +- [onsecuredev/CVE-2021-30573](https://github.com/onsecuredev/CVE-2021-30573) - [kh4sh3i/CVE-2021-30573](https://github.com/kh4sh3i/CVE-2021-30573) ### CVE-2021-30632 (2021-10-08) @@ -2738,7 +2739,7 @@ In Apache CouchDB, a malicious user with permission to create documents in a dat The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`. -- [oxctdev/CVE-2021-38314](https://github.com/oxctdev/CVE-2021-38314) +- [onsecuredev/CVE-2021-38314](https://github.com/onsecuredev/CVE-2021-38314) - [phrantom/cve-2021-38314](https://github.com/phrantom/cve-2021-38314) ### CVE-2021-38583 (2021-08-13) @@ -3059,6 +3060,7 @@ Microsoft MSHTML Remote Code Execution Vulnerability - [Udyz/CVE-2021-40444-CAB](https://github.com/Udyz/CVE-2021-40444-CAB) - [gh0stxplt/CVE-2021-40444-URL-Extractor](https://github.com/gh0stxplt/CVE-2021-40444-URL-Extractor) - [Edubr2020/CVE-2021-40444--CABless](https://github.com/Edubr2020/CVE-2021-40444--CABless) +- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives) - [LazarusReborn/Docx-Exploit-2021](https://github.com/LazarusReborn/Docx-Exploit-2021) - [H0j3n/CVE-2021-40444](https://github.com/H0j3n/CVE-2021-40444) - [factionsypho/TIC4301_Project](https://github.com/factionsypho/TIC4301_Project) @@ -3145,7 +3147,7 @@ An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestr - [0xAgun/CVE-2021-40870](https://github.com/0xAgun/CVE-2021-40870) -- [oxctdev/CVE-2021-40870](https://github.com/oxctdev/CVE-2021-40870) +- [onsecuredev/CVE-2021-40870](https://github.com/onsecuredev/CVE-2021-40870) - [JoyGhoshs/CVE-2021-40870](https://github.com/JoyGhoshs/CVE-2021-40870) ### CVE-2021-40875 (2021-09-22) @@ -3331,7 +3333,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [fnatalucci/CVE-2021-41773-RCE](https://github.com/fnatalucci/CVE-2021-41773-RCE) - [AssassinUKG/CVE-2021-41773](https://github.com/AssassinUKG/CVE-2021-41773) - [jheeree/Simple-CVE-2021-41773-checker](https://github.com/jheeree/Simple-CVE-2021-41773-checker) -- [oxctdev/CVE-2021-41773](https://github.com/oxctdev/CVE-2021-41773) +- [onsecuredev/CVE-2021-41773](https://github.com/onsecuredev/CVE-2021-41773) - [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2) - [vinhjaxt/CVE-2021-41773-exploit](https://github.com/vinhjaxt/CVE-2021-41773-exploit) - [twseptian/CVE-2021-41773](https://github.com/twseptian/CVE-2021-41773) @@ -3384,6 +3386,9 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. ### CVE-2021-41822 - [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822) +### CVE-2021-41962 +- [lohyt/-CVE-2021-41962](https://github.com/lohyt/-CVE-2021-41962) + ### CVE-2021-42008 (2021-10-04) @@ -3828,6 +3833,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u - [myyxl/cve-2021-44228-minecraft-poc](https://github.com/myyxl/cve-2021-44228-minecraft-poc) - [RrUZi/Awesome-CVE-2021-44228](https://github.com/RrUZi/Awesome-CVE-2021-44228) - [0-x-2-2/CVE-2021-44228](https://github.com/0-x-2-2/CVE-2021-44228) +- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector) - [Crane-Mocker/log4j-poc](https://github.com/Crane-Mocker/log4j-poc) - [kali-dass/CVE-2021-44228-log4Shell](https://github.com/kali-dass/CVE-2021-44228-log4Shell) - [pravin-pp/log4j2-CVE-2021-44228](https://github.com/pravin-pp/log4j2-CVE-2021-44228) @@ -3939,6 +3945,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u - [ReynerGonzalez/Security-Log4J-Tester](https://github.com/ReynerGonzalez/Security-Log4J-Tester) - [ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228](https://github.com/ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228) - [wortell/log4j](https://github.com/wortell/log4j) +- [roswellit/CVE-2021-44228](https://github.com/roswellit/CVE-2021-44228) - [yanicksenn/CVE-2021-44228](https://github.com/yanicksenn/CVE-2021-44228) - [municipalparkingservices/CVE-2021-44228-Scanner](https://github.com/municipalparkingservices/CVE-2021-44228-Scanner) - [BinaryDefense/log4j-honeypot-flask](https://github.com/BinaryDefense/log4j-honeypot-flask) @@ -3971,6 +3978,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u - [honeynet/log4shell-data](https://github.com/honeynet/log4shell-data) - [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner) - [wortell/log4j-honeypot](https://github.com/wortell/log4j-honeypot) +- [MkTech-0-8YT3/CVE-2021-44228](https://github.com/MkTech-0-8YT3/CVE-2021-44228) - [alenazi90/log4j](https://github.com/alenazi90/log4j) - [pmontesd/log4j-cve-2021-44228](https://github.com/pmontesd/log4j-cve-2021-44228) - [aws-samples/kubernetes-log4j-cve-2021-44228-node-agent](https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent) @@ -3978,6 +3986,10 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u - [ubitech/cve-2021-44228-rce-poc](https://github.com/ubitech/cve-2021-44228-rce-poc) - [rv4l3r3/log4v-vuln-check](https://github.com/rv4l3r3/log4v-vuln-check) - [dpomnean/log4j_scanner_wrapper](https://github.com/dpomnean/log4j_scanner_wrapper) +- [roxas-tan/CVE-2021-44228](https://github.com/roxas-tan/CVE-2021-44228) +- [shamo0/CVE-2021-44228](https://github.com/shamo0/CVE-2021-44228) +- [snow0715/log4j-Scan-Burpsuite](https://github.com/snow0715/log4j-Scan-Burpsuite) +- [Joefreedy/Log4j-Windows-Scanner](https://github.com/Joefreedy/Log4j-Windows-Scanner) ### CVE-2021-44827 - [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827) @@ -4369,7 +4381,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve - [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner) - [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker) - [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796) -- [oxctdev/CVE-2020-0796](https://github.com/oxctdev/CVE-2020-0796) +- [onsecuredev/CVE-2020-0796](https://github.com/onsecuredev/CVE-2020-0796) - [Murasame-nc/CVE-2020-0796-LPE-POC](https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC) - [F6JO/CVE-2020-0796-Batch-scanning](https://github.com/F6JO/CVE-2020-0796-Batch-scanning) - [lisinan988/CVE-2020-0796-exp](https://github.com/lisinan988/CVE-2020-0796-exp) @@ -10778,6 +10790,7 @@ A double free vulnerability in the DDGifSlurp function in decoding.c in the andr - [starling021/CVE-2019-11932-SupportApp](https://github.com/starling021/CVE-2019-11932-SupportApp) - [Hacker-Yadav/CVE-2019-11932](https://github.com/Hacker-Yadav/CVE-2019-11932) - [BadAssAiras/hello](https://github.com/BadAssAiras/hello) +- [kal1gh0st/WhatsAppHACK-RCE](https://github.com/kal1gh0st/WhatsAppHACK-RCE) - [zxn1/CVE-2019-11932](https://github.com/zxn1/CVE-2019-11932) - [Tabni/https-github.com-awakened1712-CVE-2019-11932](https://github.com/Tabni/https-github.com-awakened1712-CVE-2019-11932) @@ -11665,7 +11678,7 @@ admin/includes/class.import.snippet.php in the "Woody ad snippets" plu - [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858) -- [oxctdev/CVE-2019-15858](https://github.com/oxctdev/CVE-2019-15858) +- [onsecuredev/CVE-2019-15858](https://github.com/onsecuredev/CVE-2019-15858) ### CVE-2019-15972 (2019-11-25) @@ -14993,7 +15006,7 @@ Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlie - [cved-sources/cve-2018-15961](https://github.com/cved-sources/cve-2018-15961) - [0xAJ2K/CVE-2018-15961](https://github.com/0xAJ2K/CVE-2018-15961) - [xbufu/CVE-2018-15961](https://github.com/xbufu/CVE-2018-15961) -- [oxctdev/CVE-2018-15961](https://github.com/oxctdev/CVE-2018-15961) +- [onsecuredev/CVE-2018-15961](https://github.com/onsecuredev/CVE-2018-15961) ### CVE-2018-15968 (2018-10-12)