mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/12/21 06:13:46
This commit is contained in:
parent
d27afee5bd
commit
3593093296
42 changed files with 493 additions and 450 deletions
|
@ -106,5 +106,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 440387641,
|
||||
"name": "CVE-2006-3392",
|
||||
"full_name": "windsormoreira\/CVE-2006-3392",
|
||||
"owner": {
|
||||
"login": "windsormoreira",
|
||||
"id": 21226709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
|
||||
"html_url": "https:\/\/github.com\/windsormoreira"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2006-3392",
|
||||
"description": "Webmin Local File Include (unauthenticated)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T04:18:21Z",
|
||||
"updated_at": "2021-12-21T04:43:07Z",
|
||||
"pushed_at": "2021-12-21T04:43:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-20T07:41:26Z",
|
||||
"updated_at": "2021-12-21T03:36:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1245,
|
||||
"watchers_count": 1245,
|
||||
"stargazers_count": 1246,
|
||||
"watchers_count": 1246,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1245,
|
||||
"watchers": 1246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -152,7 +152,7 @@
|
|||
"pushed_at": "2020-03-23T15:56:02Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -164,7 +164,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-20T07:41:26Z",
|
||||
"updated_at": "2021-12-21T03:36:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1245,
|
||||
"watchers_count": 1245,
|
||||
"stargazers_count": 1246,
|
||||
"watchers_count": 1246,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1245,
|
||||
"watchers": 1246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-20T07:41:26Z",
|
||||
"updated_at": "2021-12-21T03:36:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1245,
|
||||
"watchers_count": 1245,
|
||||
"stargazers_count": 1246,
|
||||
"watchers_count": 1246,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1245,
|
||||
"watchers": 1246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -125,17 +125,17 @@
|
|||
"description": "Spring Data Commons RCE 远程命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-29T03:43:15Z",
|
||||
"updated_at": "2021-08-10T06:19:55Z",
|
||||
"updated_at": "2021-12-21T00:30:00Z",
|
||||
"pushed_at": "2019-04-29T04:25:35Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,7 +94,7 @@
|
|||
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-15T10:38:26Z",
|
||||
"updated_at": "2021-12-06T20:08:15Z",
|
||||
"updated_at": "2021-12-21T03:06:38Z",
|
||||
"pushed_at": "2018-12-16T04:15:01Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
|
|
|
@ -116,14 +116,14 @@
|
|||
{
|
||||
"id": 413221283,
|
||||
"name": "CVE-2018-15961",
|
||||
"full_name": "onsecuredev\/CVE-2018-15961",
|
||||
"full_name": "rakhanobe\/CVE-2018-15961",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2018-15961",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2018-15961",
|
||||
"description": "CVE-2018-15961 — ᴀᴅᴏʙᴇ ᴄᴏʟᴅғᴜsɪᴏɴ (ʀᴄᴇ) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-03T23:31:47Z",
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-20T07:41:26Z",
|
||||
"updated_at": "2021-12-21T03:36:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1245,
|
||||
"watchers_count": 1245,
|
||||
"stargazers_count": 1246,
|
||||
"watchers_count": 1246,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1245,
|
||||
"watchers": 1246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -29,14 +29,14 @@
|
|||
{
|
||||
"id": 416094403,
|
||||
"name": "CVE-2019-15858",
|
||||
"full_name": "onsecuredev\/CVE-2019-15858",
|
||||
"full_name": "rakhanobe\/CVE-2019-15858",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2019-15858",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2019-15858",
|
||||
"description": "Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T21:37:06Z",
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-20T07:41:26Z",
|
||||
"updated_at": "2021-12-21T03:36:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1245,
|
||||
"watchers_count": 1245,
|
||||
"stargazers_count": 1246,
|
||||
"watchers_count": 1246,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1245,
|
||||
"watchers": 1246,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-09T02:18:37Z",
|
||||
"updated_at": "2021-12-10T08:19:20Z",
|
||||
"updated_at": "2021-12-21T04:19:28Z",
|
||||
"pushed_at": "2019-11-03T17:29:56Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2021-12-15T14:38:34Z",
|
||||
"updated_at": "2021-12-21T03:47:07Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 605,
|
||||
"watchers_count": 605,
|
||||
"stargazers_count": 606,
|
||||
"watchers_count": 606,
|
||||
"forks_count": 199,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 199,
|
||||
"watchers": 605,
|
||||
"watchers": 606,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -177,10 +177,10 @@
|
|||
"description": "Identifying and Mitigating the CVE-2020–0796 flaw in the fly",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T18:42:32Z",
|
||||
"updated_at": "2021-12-05T20:38:29Z",
|
||||
"updated_at": "2021-12-21T05:23:50Z",
|
||||
"pushed_at": "2020-03-12T10:19:35Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -192,7 +192,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1018,10 +1018,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-12-16T23:40:21Z",
|
||||
"updated_at": "2021-12-21T03:32:48Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1169,
|
||||
"watchers_count": 1169,
|
||||
"stargazers_count": 1171,
|
||||
"watchers_count": 1171,
|
||||
"forks_count": 367,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1034,7 +1034,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 367,
|
||||
"watchers": 1169,
|
||||
"watchers": 1171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1986,14 +1986,14 @@
|
|||
{
|
||||
"id": 415205467,
|
||||
"name": "CVE-2020-0796",
|
||||
"full_name": "onsecuredev\/CVE-2020-0796",
|
||||
"full_name": "rakhanobe\/CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2020-0796",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2020-0796",
|
||||
"description": "Remote Code Execution POC for CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T04:52:55Z",
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-12-20T03:19:19Z",
|
||||
"updated_at": "2021-12-21T00:25:37Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1395,
|
||||
"watchers_count": 1395,
|
||||
"stargazers_count": 1396,
|
||||
"watchers_count": 1396,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 316,
|
||||
"watchers": 1395,
|
||||
"watchers": 1396,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-20T07:41:26Z",
|
||||
"updated_at": "2021-12-21T03:36:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1245,
|
||||
"watchers_count": 1245,
|
||||
"stargazers_count": 1246,
|
||||
"watchers_count": 1246,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1245,
|
||||
"watchers": 1246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-8163 - Remote code execution of user-provided local names in Rails",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-19T21:03:05Z",
|
||||
"updated_at": "2021-07-01T06:47:40Z",
|
||||
"updated_at": "2021-12-21T03:11:31Z",
|
||||
"pushed_at": "2021-09-28T03:56:09Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -224,63 +224,6 @@
|
|||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382466613,
|
||||
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"full_name": "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"owner": {
|
||||
"login": "gohrenberg",
|
||||
"id": 80491750,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4",
|
||||
"html_url": "https:\/\/github.com\/gohrenberg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T21:18:11Z",
|
||||
"updated_at": "2021-10-24T04:59:14Z",
|
||||
"pushed_at": "2021-07-05T05:41:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-1675",
|
||||
"printnightmare"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382815972,
|
||||
"name": "PrintNightmare-CVE-2021-1675",
|
||||
"full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "exploitblizzard",
|
||||
"id": 61627070,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675",
|
||||
"description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-04T09:50:39Z",
|
||||
"updated_at": "2021-11-19T23:25:49Z",
|
||||
"pushed_at": "2021-07-04T09:57:46Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383128850,
|
||||
"name": "CVE-2021-1675",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-12-16T09:50:16Z",
|
||||
"updated_at": "2021-12-21T02:31:04Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"watchers": 349,
|
||||
"watchers": 350,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -29,14 +29,14 @@
|
|||
{
|
||||
"id": 422835153,
|
||||
"name": "CVE-2021-20837",
|
||||
"full_name": "onsecuredev\/CVE-2021-20837",
|
||||
"full_name": "rakhanobe\/CVE-2021-20837",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-20837",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-20837",
|
||||
"description": "XMLRPC - RCE in MovableTypePoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-30T09:15:56Z",
|
||||
|
|
|
@ -700,14 +700,14 @@
|
|||
{
|
||||
"id": 413216838,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "onsecuredev\/CVE-2021-21972",
|
||||
"full_name": "rakhanobe\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-21972",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-21972",
|
||||
"description": "CVE-2021-21972 – ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-03T23:03:11Z",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-03T02:30:14Z",
|
||||
"updated_at": "2021-12-20T08:33:19Z",
|
||||
"updated_at": "2021-12-21T02:05:39Z",
|
||||
"pushed_at": "2021-12-03T02:57:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -125,14 +125,14 @@
|
|||
"pushed_at": "2021-11-06T05:20:30Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 47,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"forks": 48,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -56,14 +56,14 @@
|
|||
{
|
||||
"id": 413204436,
|
||||
"name": "CVE-2021-22893",
|
||||
"full_name": "onsecuredev\/CVE-2021-22893",
|
||||
"full_name": "rakhanobe\/CVE-2021-22893",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-22893",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-22893",
|
||||
"description": "Proof On Concept — Pulse Secure CVE-2021-22893",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-03T21:46:58Z",
|
||||
|
|
|
@ -866,14 +866,14 @@
|
|||
{
|
||||
"id": 414400971,
|
||||
"name": "CVE-2021-26084",
|
||||
"full_name": "onsecuredev\/CVE-2021-26084",
|
||||
"full_name": "rakhanobe\/CVE-2021-26084",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-26084",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-26084",
|
||||
"description": "CVE-2021-26084 - Confluence Server Webwork OGNL injection ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T23:24:24Z",
|
||||
|
|
|
@ -56,14 +56,14 @@
|
|||
{
|
||||
"id": 414009465,
|
||||
"name": "CVE-2021-27651",
|
||||
"full_name": "onsecuredev\/CVE-2021-27651",
|
||||
"full_name": "rakhanobe\/CVE-2021-27651",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-27651",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-27651",
|
||||
"description": "bypass all stages of the password reset flow",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T23:33:50Z",
|
||||
|
|
|
@ -29,14 +29,14 @@
|
|||
{
|
||||
"id": 421034424,
|
||||
"name": "CVE-2021-30573",
|
||||
"full_name": "onsecuredev\/CVE-2021-30573",
|
||||
"full_name": "rakhanobe\/CVE-2021-30573",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-30573",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-30573",
|
||||
"description": "Google Chrome Vulnerabilities CVE-2021-30573",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T13:25:23Z",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CSP Playground for CVE-2021-30682",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-15T08:10:02Z",
|
||||
"updated_at": "2021-11-23T15:21:14Z",
|
||||
"updated_at": "2021-12-21T05:54:01Z",
|
||||
"pushed_at": "2021-11-14T07:29:00Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -60,33 +60,6 @@
|
|||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382894525,
|
||||
"name": "CVE-2021-34527-1675",
|
||||
"full_name": "CnOxx1\/CVE-2021-34527-1675",
|
||||
"owner": {
|
||||
"login": "CnOxx1",
|
||||
"id": 86923954,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4",
|
||||
"html_url": "https:\/\/github.com\/CnOxx1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675",
|
||||
"description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-04T16:09:18Z",
|
||||
"updated_at": "2021-09-06T06:08:09Z",
|
||||
"pushed_at": "2021-07-04T16:31:21Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383207766,
|
||||
"name": "disable-RegisterSpoolerRemoteRpcEndPoint",
|
||||
|
@ -182,17 +155,17 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2021-12-17T15:20:20Z",
|
||||
"updated_at": "2021-12-21T03:36:00Z",
|
||||
"pushed_at": "2021-08-20T01:54:22Z",
|
||||
"stargazers_count": 655,
|
||||
"watchers_count": 655,
|
||||
"stargazers_count": 656,
|
||||
"watchers_count": 656,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 655,
|
||||
"watchers": 656,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 434961092,
|
||||
"name": "CVE-2021-38314",
|
||||
"full_name": "onsecuredev\/CVE-2021-38314",
|
||||
"full_name": "rakhanobe\/CVE-2021-38314",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-38314",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-38314",
|
||||
"description": " Unauthenticated Sensitive Information Disclosure (CVE-2021–38314).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-04T17:08:05Z",
|
||||
|
|
|
@ -927,12 +927,12 @@
|
|||
"pushed_at": "2021-12-19T08:27:33Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "windows 10 14393 LPE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-20T09:24:36Z",
|
||||
"updated_at": "2021-12-18T01:23:17Z",
|
||||
"updated_at": "2021-12-21T05:56:34Z",
|
||||
"pushed_at": "2021-10-28T03:51:09Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 68,
|
||||
"forks": 32,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 414763941,
|
||||
"name": "CVE-2021-40870",
|
||||
"full_name": "onsecuredev\/CVE-2021-40870",
|
||||
"full_name": "rakhanobe\/CVE-2021-40870",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-40870",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-40870",
|
||||
"description": "Aviatrix allows an authenticated user to execute arbitrary code",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-07T21:34:00Z",
|
||||
|
|
|
@ -744,14 +744,14 @@
|
|||
{
|
||||
"id": 414410579,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "onsecuredev\/CVE-2021-41773",
|
||||
"full_name": "rakhanobe\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "onsecuredev",
|
||||
"login": "rakhanobe",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/onsecuredev"
|
||||
"html_url": "https:\/\/github.com\/rakhanobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-41773",
|
||||
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-41773",
|
||||
"description": "Apache HTTPd (2.4.49) – Local File Disclosure (LFI)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-07T00:14:40Z",
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2021-12-20T21:54:43Z",
|
||||
"updated_at": "2021-12-21T06:00:48Z",
|
||||
"pushed_at": "2021-12-16T14:47:13Z",
|
||||
"stargazers_count": 589,
|
||||
"watchers_count": 589,
|
||||
"forks_count": 117,
|
||||
"stargazers_count": 593,
|
||||
"watchers_count": 593,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,8 +27,8 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 589,
|
||||
"forks": 118,
|
||||
"watchers": 593,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2021-12-20T21:01:55Z",
|
||||
"updated_at": "2021-12-21T02:58:36Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"stargazers_count": 916,
|
||||
"watchers_count": 916,
|
||||
"forks_count": 235,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 235,
|
||||
"watchers": 913,
|
||||
"watchers": 916,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42913.json
Normal file
29
2021/CVE-2021-42913.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 440389065,
|
||||
"name": "CVE-2021-42913",
|
||||
"full_name": "windsormoreira\/CVE-2021-42913",
|
||||
"owner": {
|
||||
"login": "windsormoreira",
|
||||
"id": 21226709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
|
||||
"html_url": "https:\/\/github.com\/windsormoreira"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2021-42913",
|
||||
"description": "Samsung Printer SCX-6X55X Improper Access Control",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T04:26:11Z",
|
||||
"updated_at": "2021-12-21T04:51:08Z",
|
||||
"pushed_at": "2021-12-21T04:51:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-43224.json
Normal file
29
2021/CVE-2021-43224.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 440359142,
|
||||
"name": "CVE-2021-43224-POC",
|
||||
"full_name": "KaLendsi\/CVE-2021-43224-POC",
|
||||
"owner": {
|
||||
"login": "KaLendsi",
|
||||
"id": 68001644,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
|
||||
"html_url": "https:\/\/github.com\/KaLendsi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-43224-POC",
|
||||
"description": "Windows Common Log File System Driver POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T01:51:41Z",
|
||||
"updated_at": "2021-12-21T05:41:13Z",
|
||||
"pushed_at": "2021-12-21T02:26:50Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of Concept for CVE-2021-43891",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T21:30:51Z",
|
||||
"updated_at": "2021-12-20T22:18:51Z",
|
||||
"updated_at": "2021-12-21T05:48:51Z",
|
||||
"pushed_at": "2021-12-20T21:38:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Remote Code Injection In Log4j",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T05:23:44Z",
|
||||
"updated_at": "2021-12-20T14:32:13Z",
|
||||
"updated_at": "2021-12-21T03:24:15Z",
|
||||
"pushed_at": "2021-12-14T15:30:16Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 243,
|
||||
"watchers": 244,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,10 +121,10 @@
|
|||
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:15:38Z",
|
||||
"updated_at": "2021-12-20T13:19:42Z",
|
||||
"updated_at": "2021-12-21T01:09:10Z",
|
||||
"pushed_at": "2021-12-16T01:33:48Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -139,7 +139,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 173,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -156,10 +156,10 @@
|
|||
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:42:37Z",
|
||||
"updated_at": "2021-12-18T16:43:09Z",
|
||||
"updated_at": "2021-12-21T01:32:31Z",
|
||||
"pushed_at": "2021-12-11T02:49:41Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -179,7 +179,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 90,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -390,17 +390,17 @@
|
|||
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2021-12-21T00:07:35Z",
|
||||
"updated_at": "2021-12-21T05:12:26Z",
|
||||
"pushed_at": "2021-12-20T22:54:49Z",
|
||||
"stargazers_count": 798,
|
||||
"watchers_count": 798,
|
||||
"forks_count": 311,
|
||||
"stargazers_count": 799,
|
||||
"watchers_count": 799,
|
||||
"forks_count": 310,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 798,
|
||||
"forks": 310,
|
||||
"watchers": 799,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -417,10 +417,10 @@
|
|||
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T14:22:49Z",
|
||||
"updated_at": "2021-12-20T17:14:30Z",
|
||||
"updated_at": "2021-12-21T05:52:16Z",
|
||||
"pushed_at": "2021-12-14T15:16:15Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -434,7 +434,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -601,17 +601,17 @@
|
|||
"description": "Hashes for vulnerable LOG4J versions",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T18:06:06Z",
|
||||
"updated_at": "2021-12-20T19:16:32Z",
|
||||
"updated_at": "2021-12-21T00:48:49Z",
|
||||
"pushed_at": "2021-12-17T17:02:24Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -770,17 +770,17 @@
|
|||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:46:18Z",
|
||||
"updated_at": "2021-12-19T20:19:41Z",
|
||||
"updated_at": "2021-12-21T05:45:58Z",
|
||||
"pushed_at": "2021-12-13T22:27:25Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 115,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -858,11 +858,11 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2021-12-20T20:19:44Z",
|
||||
"updated_at": "2021-12-21T05:25:40Z",
|
||||
"pushed_at": "2021-12-20T18:11:42Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"forks_count": 75,
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -887,8 +887,8 @@
|
|||
"writeups"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"watchers": 502,
|
||||
"forks": 76,
|
||||
"watchers": 508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -905,11 +905,11 @@
|
|||
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2021-12-20T23:08:10Z",
|
||||
"updated_at": "2021-12-21T05:51:50Z",
|
||||
"pushed_at": "2021-12-20T23:29:10Z",
|
||||
"stargazers_count": 844,
|
||||
"watchers_count": 844,
|
||||
"forks_count": 187,
|
||||
"stargazers_count": 856,
|
||||
"watchers_count": 856,
|
||||
"forks_count": 192,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,8 +919,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 187,
|
||||
"watchers": 844,
|
||||
"forks": 192,
|
||||
"watchers": 856,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1233,11 +1233,11 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2021-12-20T15:11:23Z",
|
||||
"pushed_at": "2021-12-20T12:27:10Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 35,
|
||||
"updated_at": "2021-12-21T05:37:50Z",
|
||||
"pushed_at": "2021-12-21T02:01:01Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1246,8 +1246,8 @@
|
|||
"log4j2"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 78,
|
||||
"forks": 37,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1372,11 +1372,11 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2021-12-20T23:13:16Z",
|
||||
"pushed_at": "2021-12-20T21:37:39Z",
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"forks_count": 112,
|
||||
"updated_at": "2021-12-21T05:27:23Z",
|
||||
"pushed_at": "2021-12-21T04:38:36Z",
|
||||
"stargazers_count": 574,
|
||||
"watchers_count": 574,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1390,8 +1390,8 @@
|
|||
"scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 570,
|
||||
"forks": 114,
|
||||
"watchers": 574,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1766,10 +1766,10 @@
|
|||
"description": "Detections for CVE-2021-44228 inside of nested binaries",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T16:08:47Z",
|
||||
"updated_at": "2021-12-19T20:51:33Z",
|
||||
"updated_at": "2021-12-21T00:54:03Z",
|
||||
"pushed_at": "2021-12-18T22:20:25Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1785,7 +1785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1883,11 +1883,11 @@
|
|||
"description": "Scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2021-12-20T22:59:15Z",
|
||||
"updated_at": "2021-12-21T06:08:24Z",
|
||||
"pushed_at": "2021-12-20T23:08:15Z",
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
"forks_count": 75,
|
||||
"stargazers_count": 465,
|
||||
"watchers_count": 465,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1904,8 +1904,8 @@
|
|||
"vulnerability-scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"watchers": 458,
|
||||
"forks": 76,
|
||||
"watchers": 465,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1961,12 +1961,12 @@
|
|||
"pushed_at": "2021-12-11T10:39:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 36,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"forks": 35,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1984,17 +1984,17 @@
|
|||
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T01:24:51Z",
|
||||
"updated_at": "2021-12-20T18:21:57Z",
|
||||
"pushed_at": "2021-12-18T20:22:19Z",
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"updated_at": "2021-12-21T04:40:55Z",
|
||||
"pushed_at": "2021-12-21T02:42:24Z",
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 427,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2015,7 +2015,7 @@
|
|||
"pushed_at": "2021-12-16T18:34:46Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -2026,7 +2026,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"forks": 29,
|
||||
"watchers": 169,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2408,10 +2408,10 @@
|
|||
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T11:26:42Z",
|
||||
"updated_at": "2021-12-20T18:28:20Z",
|
||||
"updated_at": "2021-12-21T01:30:55Z",
|
||||
"pushed_at": "2021-12-12T17:37:11Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2426,7 +2426,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3196,17 +3196,17 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2021-12-20T21:17:13Z",
|
||||
"updated_at": "2021-12-21T01:51:04Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 36,
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 251,
|
||||
"forks": 37,
|
||||
"watchers": 252,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3432,12 +3432,12 @@
|
|||
"pushed_at": "2021-12-13T09:18:19Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -3536,17 +3536,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2021-12-20T22:06:15Z",
|
||||
"updated_at": "2021-12-21T06:09:21Z",
|
||||
"pushed_at": "2021-12-20T11:16:26Z",
|
||||
"stargazers_count": 2074,
|
||||
"watchers_count": 2074,
|
||||
"forks_count": 467,
|
||||
"stargazers_count": 2091,
|
||||
"watchers_count": 2091,
|
||||
"forks_count": 477,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 467,
|
||||
"watchers": 2074,
|
||||
"forks": 477,
|
||||
"watchers": 2091,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3563,17 +3563,17 @@
|
|||
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T04:14:18Z",
|
||||
"updated_at": "2021-12-20T23:43:52Z",
|
||||
"pushed_at": "2021-12-20T21:31:08Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 67,
|
||||
"updated_at": "2021-12-21T04:16:21Z",
|
||||
"pushed_at": "2021-12-21T02:41:51Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 199,
|
||||
"forks": 68,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4364,8 +4364,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T16:04:54Z",
|
||||
"updated_at": "2021-12-20T16:04:44Z",
|
||||
"pushed_at": "2021-12-20T16:04:42Z",
|
||||
"updated_at": "2021-12-21T02:30:06Z",
|
||||
"pushed_at": "2021-12-21T02:30:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -4564,10 +4564,10 @@
|
|||
"description": "Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T18:35:16Z",
|
||||
"updated_at": "2021-12-17T22:47:52Z",
|
||||
"updated_at": "2021-12-21T04:46:05Z",
|
||||
"pushed_at": "2021-12-14T22:45:24Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -4583,7 +4583,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4858,17 +4858,17 @@
|
|||
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:39:51Z",
|
||||
"updated_at": "2021-12-21T00:06:53Z",
|
||||
"pushed_at": "2021-12-21T00:06:50Z",
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 18,
|
||||
"updated_at": "2021-12-21T06:04:22Z",
|
||||
"pushed_at": "2021-12-21T01:24:46Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 227,
|
||||
"forks": 21,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5168,17 +5168,17 @@
|
|||
"description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T05:24:52Z",
|
||||
"updated_at": "2021-12-18T15:07:28Z",
|
||||
"updated_at": "2021-12-21T02:47:01Z",
|
||||
"pushed_at": "2021-12-15T19:44:28Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5255,11 +5255,11 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2021-12-20T22:27:13Z",
|
||||
"updated_at": "2021-12-21T05:51:06Z",
|
||||
"pushed_at": "2021-12-18T17:32:43Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"forks_count": 18,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -5270,8 +5270,8 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 150,
|
||||
"forks": 19,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5328,33 +5328,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438172224,
|
||||
"name": "ITF-log4shell-vulnapp",
|
||||
"full_name": "nikitapark\/ITF-log4shell-vulnapp",
|
||||
"owner": {
|
||||
"login": "nikitapark",
|
||||
"id": 25609921,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25609921?v=4",
|
||||
"html_url": "https:\/\/github.com\/nikitapark"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nikitapark\/ITF-log4shell-vulnapp",
|
||||
"description": "log4j (CVE-2021-44228) Spring-boot web application with vulnerabilities",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T08:21:11Z",
|
||||
"updated_at": "2021-12-20T07:12:38Z",
|
||||
"pushed_at": "2021-12-20T07:12:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438175327,
|
||||
"name": "log4j2-rce-recap",
|
||||
|
@ -5456,11 +5429,11 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2021-12-21T00:02:17Z",
|
||||
"updated_at": "2021-12-21T01:46:24Z",
|
||||
"pushed_at": "2021-12-20T23:43:04Z",
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"forks_count": 53,
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -5474,8 +5447,8 @@
|
|||
"python"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 310,
|
||||
"forks": 54,
|
||||
"watchers": 311,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5492,17 +5465,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T12:37:23Z",
|
||||
"updated_at": "2021-12-20T23:45:08Z",
|
||||
"updated_at": "2021-12-21T03:17:27Z",
|
||||
"pushed_at": "2021-12-14T12:49:56Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5735,17 +5708,17 @@
|
|||
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T18:08:45Z",
|
||||
"updated_at": "2021-12-20T23:38:01Z",
|
||||
"updated_at": "2021-12-21T05:25:44Z",
|
||||
"pushed_at": "2021-12-20T14:44:27Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 90,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5762,17 +5735,17 @@
|
|||
"description": "Tools for investigating Log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T19:08:14Z",
|
||||
"updated_at": "2021-12-20T23:38:33Z",
|
||||
"updated_at": "2021-12-21T02:32:49Z",
|
||||
"pushed_at": "2021-12-20T14:03:01Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5907,7 +5880,7 @@
|
|||
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T22:19:29Z",
|
||||
"updated_at": "2021-12-20T15:56:01Z",
|
||||
"updated_at": "2021-12-21T00:43:50Z",
|
||||
"pushed_at": "2021-12-20T15:55:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
@ -6037,17 +6010,17 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2021-12-20T23:35:46Z",
|
||||
"pushed_at": "2021-12-19T17:36:51Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"updated_at": "2021-12-21T04:36:03Z",
|
||||
"pushed_at": "2021-12-21T04:36:00Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6757,17 +6730,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T20:17:41Z",
|
||||
"updated_at": "2021-12-20T13:14:35Z",
|
||||
"updated_at": "2021-12-21T02:11:17Z",
|
||||
"pushed_at": "2021-12-16T22:07:35Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -7195,8 +7168,8 @@
|
|||
"description": "Scanner recursivo de arquivos desenvolvido em Python3 para varredura e localização de versões vulneráveis do Log4j2 em um computador, contemplando análise interna de arquivos JAR (CVE-2021-44228 e CVE-2021-45046)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-16T14:29:05Z",
|
||||
"updated_at": "2021-12-20T05:41:10Z",
|
||||
"pushed_at": "2021-12-20T05:41:07Z",
|
||||
"updated_at": "2021-12-21T05:28:20Z",
|
||||
"pushed_at": "2021-12-21T05:28:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
@ -7249,8 +7222,8 @@
|
|||
"description": "Log4Shell CVE-2021-44228 Vulnerability Scanner and POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-16T15:04:23Z",
|
||||
"updated_at": "2021-12-16T15:44:02Z",
|
||||
"pushed_at": "2021-12-16T15:43:44Z",
|
||||
"updated_at": "2021-12-21T05:46:51Z",
|
||||
"pushed_at": "2021-12-21T06:07:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
@ -7972,17 +7945,17 @@
|
|||
"description": "Docker images and k8s YAMLs for Log4j Vulnerability POC (Log4j (CVE-2021-44228 RCE Vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-17T19:50:40Z",
|
||||
"updated_at": "2021-12-20T16:39:31Z",
|
||||
"updated_at": "2021-12-21T02:11:16Z",
|
||||
"pushed_at": "2021-12-20T16:39:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8575,8 +8548,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T11:07:21Z",
|
||||
"updated_at": "2021-12-20T15:46:32Z",
|
||||
"pushed_at": "2021-12-20T15:46:29Z",
|
||||
"updated_at": "2021-12-21T04:34:14Z",
|
||||
"pushed_at": "2021-12-21T04:34:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -8602,10 +8575,10 @@
|
|||
"description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T12:01:52Z",
|
||||
"updated_at": "2021-12-20T12:04:58Z",
|
||||
"updated_at": "2021-12-21T00:45:15Z",
|
||||
"pushed_at": "2021-12-20T12:03:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -8618,7 +8591,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8666,17 +8639,17 @@
|
|||
"description": "log4j2 RCE漏洞(CVE-2021-44228)内网扫描器,可用于在不出网的条件下进行漏洞扫描,帮助企业内部快速发现Log4jShell漏洞。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T13:41:35Z",
|
||||
"updated_at": "2021-12-20T13:41:35Z",
|
||||
"pushed_at": "2021-12-20T13:41:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-12-21T06:12:29Z",
|
||||
"pushed_at": "2021-12-21T06:11:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8786,5 +8759,59 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 440373235,
|
||||
"name": "loguccino",
|
||||
"full_name": "sassoftware\/loguccino",
|
||||
"owner": {
|
||||
"login": "sassoftware",
|
||||
"id": 5289877,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5289877?v=4",
|
||||
"html_url": "https:\/\/github.com\/sassoftware"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sassoftware\/loguccino",
|
||||
"description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T03:01:36Z",
|
||||
"updated_at": "2021-12-21T03:01:36Z",
|
||||
"pushed_at": "2021-12-21T03:01:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 440408111,
|
||||
"name": "apache-log4j2-CVE-2021-44228",
|
||||
"full_name": "xx-zhang\/apache-log4j2-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "xx-zhang",
|
||||
"id": 47806549,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47806549?v=4",
|
||||
"html_url": "https:\/\/github.com\/xx-zhang"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xx-zhang\/apache-log4j2-CVE-2021-44228",
|
||||
"description": "相关的复现和文档",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T06:03:18Z",
|
||||
"updated_at": "2021-12-21T06:03:18Z",
|
||||
"pushed_at": "2021-12-21T06:03:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -209,17 +209,17 @@
|
|||
"description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check weather it's affected by log4j2 remote code execution(CVE-2021-45046)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T12:07:41Z",
|
||||
"updated_at": "2021-12-20T19:09:01Z",
|
||||
"updated_at": "2021-12-21T05:20:46Z",
|
||||
"pushed_at": "2021-12-20T14:50:03Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 17,
|
||||
"forks": 3,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Log4j_dos_CVE-2021-45105",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T12:54:44Z",
|
||||
"updated_at": "2021-12-20T03:37:53Z",
|
||||
"updated_at": "2021-12-21T04:37:07Z",
|
||||
"pushed_at": "2021-12-19T01:59:52Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
47
README.md
47
README.md
|
@ -39,8 +39,6 @@ Windows Print Spooler Elevation of Privilege Vulnerability
|
|||
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
|
||||
- [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675)
|
||||
- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
|
||||
- [gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler](https://github.com/gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler)
|
||||
- [exploitblizzard/PrintNightmare-CVE-2021-1675](https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675)
|
||||
- [edsonjt81/CVE-2021-1675](https://github.com/edsonjt81/CVE-2021-1675)
|
||||
- [sailay1996/PrintNightmare-LPE](https://github.com/sailay1996/PrintNightmare-LPE)
|
||||
- [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare)
|
||||
|
@ -551,7 +549,7 @@ Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 an
|
|||
</code>
|
||||
|
||||
- [ghost-nemesis/cve-2021-20837-poc](https://github.com/ghost-nemesis/cve-2021-20837-poc)
|
||||
- [onsecuredev/CVE-2021-20837](https://github.com/onsecuredev/CVE-2021-20837)
|
||||
- [rakhanobe/CVE-2021-20837](https://github.com/rakhanobe/CVE-2021-20837)
|
||||
- [ohnonoyesyes/CVE-2021-20837](https://github.com/ohnonoyesyes/CVE-2021-20837)
|
||||
- [Cosemz/CVE-2021-20837](https://github.com/Cosemz/CVE-2021-20837)
|
||||
|
||||
|
@ -756,7 +754,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
|
|||
- [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972)
|
||||
- [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter)
|
||||
- [haiclover/CVE-2021-21972](https://github.com/haiclover/CVE-2021-21972)
|
||||
- [onsecuredev/CVE-2021-21972](https://github.com/onsecuredev/CVE-2021-21972)
|
||||
- [rakhanobe/CVE-2021-21972](https://github.com/rakhanobe/CVE-2021-21972)
|
||||
|
||||
### CVE-2021-21973 (2021-02-24)
|
||||
|
||||
|
@ -970,7 +968,7 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b
|
|||
|
||||
- [ZephrFish/CVE-2021-22893_HoneyPoC2](https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2)
|
||||
- [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893)
|
||||
- [onsecuredev/CVE-2021-22893](https://github.com/onsecuredev/CVE-2021-22893)
|
||||
- [rakhanobe/CVE-2021-22893](https://github.com/rakhanobe/CVE-2021-22893)
|
||||
|
||||
### CVE-2021-22911 (2021-05-27)
|
||||
|
||||
|
@ -1283,7 +1281,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
|
||||
- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
|
||||
- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
|
||||
- [onsecuredev/CVE-2021-26084](https://github.com/onsecuredev/CVE-2021-26084)
|
||||
- [rakhanobe/CVE-2021-26084](https://github.com/rakhanobe/CVE-2021-26084)
|
||||
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
|
||||
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
|
||||
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
|
||||
|
@ -1632,7 +1630,7 @@ In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionali
|
|||
|
||||
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
|
||||
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
|
||||
- [onsecuredev/CVE-2021-27651](https://github.com/onsecuredev/CVE-2021-27651)
|
||||
- [rakhanobe/CVE-2021-27651](https://github.com/rakhanobe/CVE-2021-27651)
|
||||
|
||||
### CVE-2021-27850 (2021-04-15)
|
||||
|
||||
|
@ -1940,7 +1938,7 @@ Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote a
|
|||
</code>
|
||||
|
||||
- [s4e-lab/CVE-2021-30573-PoC-Google-Chrome](https://github.com/s4e-lab/CVE-2021-30573-PoC-Google-Chrome)
|
||||
- [onsecuredev/CVE-2021-30573](https://github.com/onsecuredev/CVE-2021-30573)
|
||||
- [rakhanobe/CVE-2021-30573](https://github.com/rakhanobe/CVE-2021-30573)
|
||||
- [kh4sh3i/CVE-2021-30573](https://github.com/kh4sh3i/CVE-2021-30573)
|
||||
|
||||
### CVE-2021-30632 (2021-10-08)
|
||||
|
@ -2377,7 +2375,6 @@ Windows Print Spooler Remote Code Execution Vulnerability
|
|||
|
||||
- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare)
|
||||
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
|
||||
- [CnOxx1/CVE-2021-34527-1675](https://github.com/CnOxx1/CVE-2021-34527-1675)
|
||||
- [rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint](https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint)
|
||||
- [geekbrett/CVE-2021-34527-PrintNightmare-Workaround](https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround)
|
||||
- [officedrone/CVE-2021-34527-workaround](https://github.com/officedrone/CVE-2021-34527-workaround)
|
||||
|
@ -2725,7 +2722,7 @@ In Apache CouchDB, a malicious user with permission to create documents in a dat
|
|||
The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
|
||||
</code>
|
||||
|
||||
- [onsecuredev/CVE-2021-38314](https://github.com/onsecuredev/CVE-2021-38314)
|
||||
- [rakhanobe/CVE-2021-38314](https://github.com/rakhanobe/CVE-2021-38314)
|
||||
- [phrantom/cve-2021-38314](https://github.com/phrantom/cve-2021-38314)
|
||||
- [shubhayu-64/CVE-2021-38314](https://github.com/shubhayu-64/CVE-2021-38314)
|
||||
|
||||
|
@ -3143,7 +3140,7 @@ An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestr
|
|||
</code>
|
||||
|
||||
- [0xAgun/CVE-2021-40870](https://github.com/0xAgun/CVE-2021-40870)
|
||||
- [onsecuredev/CVE-2021-40870](https://github.com/onsecuredev/CVE-2021-40870)
|
||||
- [rakhanobe/CVE-2021-40870](https://github.com/rakhanobe/CVE-2021-40870)
|
||||
- [JoyGhoshs/CVE-2021-40870](https://github.com/JoyGhoshs/CVE-2021-40870)
|
||||
|
||||
### CVE-2021-40875 (2021-09-22)
|
||||
|
@ -3329,7 +3326,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [fnatalucci/CVE-2021-41773-RCE](https://github.com/fnatalucci/CVE-2021-41773-RCE)
|
||||
- [AssassinUKG/CVE-2021-41773](https://github.com/AssassinUKG/CVE-2021-41773)
|
||||
- [jheeree/Simple-CVE-2021-41773-checker](https://github.com/jheeree/Simple-CVE-2021-41773-checker)
|
||||
- [onsecuredev/CVE-2021-41773](https://github.com/onsecuredev/CVE-2021-41773)
|
||||
- [rakhanobe/CVE-2021-41773](https://github.com/rakhanobe/CVE-2021-41773)
|
||||
- [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2)
|
||||
- [vinhjaxt/CVE-2021-41773-exploit](https://github.com/vinhjaxt/CVE-2021-41773-exploit)
|
||||
- [twseptian/CVE-2021-41773](https://github.com/twseptian/CVE-2021-41773)
|
||||
|
@ -3603,6 +3600,14 @@ An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An a
|
|||
|
||||
- [netanelc305/PlEXcalaison](https://github.com/netanelc305/PlEXcalaison)
|
||||
|
||||
### CVE-2021-42913 (2021-12-20)
|
||||
|
||||
<code>
|
||||
The SyncThru Web Service on Samsung SCX-6x55X printers allows an attacker to gain access to a list of SMB users and cleartext passwords by reading the HTML source code. Authentication is not required.
|
||||
</code>
|
||||
|
||||
- [windsormoreira/CVE-2021-42913](https://github.com/windsormoreira/CVE-2021-42913)
|
||||
|
||||
### CVE-2021-43032 (2021-11-03)
|
||||
|
||||
<code>
|
||||
|
@ -3627,6 +3632,14 @@ Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscri
|
|||
|
||||
- [Dir0x/CVE-2021-43141](https://github.com/Dir0x/CVE-2021-43141)
|
||||
|
||||
### CVE-2021-43224 (2021-12-15)
|
||||
|
||||
<code>
|
||||
Windows Common Log File System Driver Information Disclosure Vulnerability
|
||||
</code>
|
||||
|
||||
- [KaLendsi/CVE-2021-43224-POC](https://github.com/KaLendsi/CVE-2021-43224-POC)
|
||||
|
||||
### CVE-2021-43267 (2021-11-02)
|
||||
|
||||
<code>
|
||||
|
@ -3958,7 +3971,6 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [0xInfection/LogMePwn](https://github.com/0xInfection/LogMePwn)
|
||||
- [toramanemre/apache-solr-log4j-CVE-2021-44228](https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228)
|
||||
- [codiobert/log4j-scanner](https://github.com/codiobert/log4j-scanner)
|
||||
- [nikitapark/ITF-log4shell-vulnapp](https://github.com/nikitapark/ITF-log4shell-vulnapp)
|
||||
- [cbuschka/log4j2-rce-recap](https://github.com/cbuschka/log4j2-rce-recap)
|
||||
- [andrii-kovalenko-celonis/log4j-vulnerability-demo](https://github.com/andrii-kovalenko-celonis/log4j-vulnerability-demo)
|
||||
- [jan-muhammad-zaidi/Log4j-CVE-2021-44228](https://github.com/jan-muhammad-zaidi/Log4j-CVE-2021-44228)
|
||||
|
@ -4081,6 +4093,8 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [intel-xeon/CVE-2021-44228---detection-with-PowerShell](https://github.com/intel-xeon/CVE-2021-44228---detection-with-PowerShell)
|
||||
- [chandru-gunasekaran/log4j-fix-CVE-2021-44228](https://github.com/chandru-gunasekaran/log4j-fix-CVE-2021-44228)
|
||||
- [erickrr-bd/TekiumLog4jApp](https://github.com/erickrr-bd/TekiumLog4jApp)
|
||||
- [sassoftware/loguccino](https://github.com/sassoftware/loguccino)
|
||||
- [xx-zhang/apache-log4j2-CVE-2021-44228](https://github.com/xx-zhang/apache-log4j2-CVE-2021-44228)
|
||||
|
||||
### CVE-2021-44827
|
||||
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
|
||||
|
@ -4488,7 +4502,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
|
||||
- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
|
||||
- [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796)
|
||||
- [onsecuredev/CVE-2020-0796](https://github.com/onsecuredev/CVE-2020-0796)
|
||||
- [rakhanobe/CVE-2020-0796](https://github.com/rakhanobe/CVE-2020-0796)
|
||||
- [Murasame-nc/CVE-2020-0796-LPE-POC](https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC)
|
||||
- [F6JO/CVE-2020-0796-Batch-scanning](https://github.com/F6JO/CVE-2020-0796-Batch-scanning)
|
||||
- [lisinan988/CVE-2020-0796-exp](https://github.com/lisinan988/CVE-2020-0796-exp)
|
||||
|
@ -11786,7 +11800,7 @@ admin/includes/class.import.snippet.php in the "Woody ad snippets" plu
|
|||
</code>
|
||||
|
||||
- [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858)
|
||||
- [onsecuredev/CVE-2019-15858](https://github.com/onsecuredev/CVE-2019-15858)
|
||||
- [rakhanobe/CVE-2019-15858](https://github.com/rakhanobe/CVE-2019-15858)
|
||||
|
||||
### CVE-2019-15972 (2019-11-25)
|
||||
|
||||
|
@ -15115,7 +15129,7 @@ Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlie
|
|||
- [cved-sources/cve-2018-15961](https://github.com/cved-sources/cve-2018-15961)
|
||||
- [0xAJ2K/CVE-2018-15961](https://github.com/0xAJ2K/CVE-2018-15961)
|
||||
- [xbufu/CVE-2018-15961](https://github.com/xbufu/CVE-2018-15961)
|
||||
- [onsecuredev/CVE-2018-15961](https://github.com/onsecuredev/CVE-2018-15961)
|
||||
- [rakhanobe/CVE-2018-15961](https://github.com/rakhanobe/CVE-2018-15961)
|
||||
|
||||
### CVE-2018-15968 (2018-10-12)
|
||||
|
||||
|
@ -22578,6 +22592,7 @@ Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function be
|
|||
- [IvanGlinkin/CVE-2006-3392](https://github.com/IvanGlinkin/CVE-2006-3392)
|
||||
- [Adel-kaka-dz/CVE-2006-3392](https://github.com/Adel-kaka-dz/CVE-2006-3392)
|
||||
- [gb21oc/ExploitWebmin](https://github.com/gb21oc/ExploitWebmin)
|
||||
- [windsormoreira/CVE-2006-3392](https://github.com/windsormoreira/CVE-2006-3392)
|
||||
|
||||
### CVE-2006-3592 (2006-07-14)
|
||||
|
||||
|
|
Loading…
Reference in a new issue