Auto Update 2021/12/21 06:13:46

This commit is contained in:
motikan2010-bot 2021-12-21 15:13:46 +09:00
parent d27afee5bd
commit 3593093296
42 changed files with 493 additions and 450 deletions

View file

@ -106,5 +106,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 440387641,
"name": "CVE-2006-3392",
"full_name": "windsormoreira\/CVE-2006-3392",
"owner": {
"login": "windsormoreira",
"id": 21226709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
"html_url": "https:\/\/github.com\/windsormoreira"
},
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2006-3392",
"description": "Webmin Local File Include (unauthenticated)",
"fork": false,
"created_at": "2021-12-21T04:18:21Z",
"updated_at": "2021-12-21T04:43:07Z",
"pushed_at": "2021-12-21T04:43:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-20T07:41:26Z",
"updated_at": "2021-12-21T03:36:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"stargazers_count": 1246,
"watchers_count": 1246,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1245,
"watchers": 1246,
"score": 0
},
{

View file

@ -152,7 +152,7 @@
"pushed_at": "2020-03-23T15:56:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [
@ -164,7 +164,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 7,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-20T07:41:26Z",
"updated_at": "2021-12-21T03:36:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"stargazers_count": 1246,
"watchers_count": 1246,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1245,
"watchers": 1246,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-20T07:41:26Z",
"updated_at": "2021-12-21T03:36:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"stargazers_count": 1246,
"watchers_count": 1246,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1245,
"watchers": 1246,
"score": 0
},
{

View file

@ -125,17 +125,17 @@
"description": "Spring Data Commons RCE 远程命令执行漏洞",
"fork": false,
"created_at": "2019-04-29T03:43:15Z",
"updated_at": "2021-08-10T06:19:55Z",
"updated_at": "2021-12-21T00:30:00Z",
"pushed_at": "2019-04-29T04:25:35Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 52,
"watchers": 53,
"score": 0
}
]

View file

@ -94,7 +94,7 @@
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
"fork": false,
"created_at": "2018-12-15T10:38:26Z",
"updated_at": "2021-12-06T20:08:15Z",
"updated_at": "2021-12-21T03:06:38Z",
"pushed_at": "2018-12-16T04:15:01Z",
"stargazers_count": 20,
"watchers_count": 20,

View file

@ -116,14 +116,14 @@
{
"id": 413221283,
"name": "CVE-2018-15961",
"full_name": "onsecuredev\/CVE-2018-15961",
"full_name": "rakhanobe\/CVE-2018-15961",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2018-15961",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2018-15961",
"description": "CVE-2018-15961 — ᴀᴅᴏʙᴇ ʟᴅғsɪɴ (ʀᴄᴇ) ",
"fork": false,
"created_at": "2021-10-03T23:31:47Z",

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-20T07:41:26Z",
"updated_at": "2021-12-21T03:36:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"stargazers_count": 1246,
"watchers_count": 1246,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1245,
"watchers": 1246,
"score": 0
},
{

View file

@ -29,14 +29,14 @@
{
"id": 416094403,
"name": "CVE-2019-15858",
"full_name": "onsecuredev\/CVE-2019-15858",
"full_name": "rakhanobe\/CVE-2019-15858",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2019-15858",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2019-15858",
"description": "Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)",
"fork": false,
"created_at": "2021-10-11T21:37:06Z",

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-20T07:41:26Z",
"updated_at": "2021-12-21T03:36:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"stargazers_count": 1246,
"watchers_count": 1246,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1245,
"watchers": 1246,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
"fork": false,
"created_at": "2019-02-09T02:18:37Z",
"updated_at": "2021-12-10T08:19:20Z",
"updated_at": "2021-12-21T04:19:28Z",
"pushed_at": "2019-11-03T17:29:56Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2021-12-15T14:38:34Z",
"updated_at": "2021-12-21T03:47:07Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 605,
"watchers_count": 605,
"stargazers_count": 606,
"watchers_count": 606,
"forks_count": 199,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 199,
"watchers": 605,
"watchers": 606,
"score": 0
},
{
@ -177,10 +177,10 @@
"description": "Identifying and Mitigating the CVE-20200796 flaw in the fly",
"fork": false,
"created_at": "2020-03-11T18:42:32Z",
"updated_at": "2021-12-05T20:38:29Z",
"updated_at": "2021-12-21T05:23:50Z",
"pushed_at": "2020-03-12T10:19:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -192,7 +192,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -1018,10 +1018,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-12-16T23:40:21Z",
"updated_at": "2021-12-21T03:32:48Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1169,
"watchers_count": 1169,
"stargazers_count": 1171,
"watchers_count": 1171,
"forks_count": 367,
"allow_forking": true,
"is_template": false,
@ -1034,7 +1034,7 @@
],
"visibility": "public",
"forks": 367,
"watchers": 1169,
"watchers": 1171,
"score": 0
},
{
@ -1986,14 +1986,14 @@
{
"id": 415205467,
"name": "CVE-2020-0796",
"full_name": "onsecuredev\/CVE-2020-0796",
"full_name": "rakhanobe\/CVE-2020-0796",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2020-0796",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2020-0796",
"description": "Remote Code Execution POC for CVE-2020-0796",
"fork": false,
"created_at": "2021-10-09T04:52:55Z",

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-12-20T03:19:19Z",
"updated_at": "2021-12-21T00:25:37Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1395,
"watchers_count": 1395,
"stargazers_count": 1396,
"watchers_count": 1396,
"forks_count": 316,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 316,
"watchers": 1395,
"watchers": 1396,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-20T07:41:26Z",
"updated_at": "2021-12-21T03:36:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"stargazers_count": 1246,
"watchers_count": 1246,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1245,
"watchers": 1246,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-8163 - Remote code execution of user-provided local names in Rails",
"fork": false,
"created_at": "2020-06-19T21:03:05Z",
"updated_at": "2021-07-01T06:47:40Z",
"updated_at": "2021-12-21T03:11:31Z",
"pushed_at": "2021-09-28T03:56:09Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -224,63 +224,6 @@
"watchers": 6,
"score": 0
},
{
"id": 382466613,
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"full_name": "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"owner": {
"login": "gohrenberg",
"id": 80491750,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4",
"html_url": "https:\/\/github.com\/gohrenberg"
},
"html_url": "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
"fork": false,
"created_at": "2021-07-02T21:18:11Z",
"updated_at": "2021-10-24T04:59:14Z",
"pushed_at": "2021-07-05T05:41:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-1675",
"printnightmare"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 382815972,
"name": "PrintNightmare-CVE-2021-1675",
"full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675",
"owner": {
"login": "exploitblizzard",
"id": 61627070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
"html_url": "https:\/\/github.com\/exploitblizzard"
},
"html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675",
"description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
"fork": false,
"created_at": "2021-07-04T09:50:39Z",
"updated_at": "2021-11-19T23:25:49Z",
"pushed_at": "2021-07-04T09:57:46Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 383128850,
"name": "CVE-2021-1675",

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-12-16T09:50:16Z",
"updated_at": "2021-12-21T02:31:04Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 93,
"watchers": 349,
"watchers": 350,
"score": 0
},
{

View file

@ -29,14 +29,14 @@
{
"id": 422835153,
"name": "CVE-2021-20837",
"full_name": "onsecuredev\/CVE-2021-20837",
"full_name": "rakhanobe\/CVE-2021-20837",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-20837",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-20837",
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",

View file

@ -700,14 +700,14 @@
{
"id": 413216838,
"name": "CVE-2021-21972",
"full_name": "onsecuredev\/CVE-2021-21972",
"full_name": "rakhanobe\/CVE-2021-21972",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-21972",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-21972",
"description": "CVE-2021-21972 ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)",
"fork": false,
"created_at": "2021-10-03T23:03:11Z",

View file

@ -13,17 +13,17 @@
"description": "A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.",
"fork": false,
"created_at": "2021-12-03T02:30:14Z",
"updated_at": "2021-12-20T08:33:19Z",
"updated_at": "2021-12-21T02:05:39Z",
"pushed_at": "2021-12-03T02:57:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -125,14 +125,14 @@
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 47,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-22205"
],
"visibility": "public",
"forks": 47,
"forks": 48,
"watchers": 115,
"score": 0
},

View file

@ -56,14 +56,14 @@
{
"id": 413204436,
"name": "CVE-2021-22893",
"full_name": "onsecuredev\/CVE-2021-22893",
"full_name": "rakhanobe\/CVE-2021-22893",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-22893",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-22893",
"description": "Proof On Concept — Pulse Secure CVE-2021-22893",
"fork": false,
"created_at": "2021-10-03T21:46:58Z",

View file

@ -866,14 +866,14 @@
{
"id": 414400971,
"name": "CVE-2021-26084",
"full_name": "onsecuredev\/CVE-2021-26084",
"full_name": "rakhanobe\/CVE-2021-26084",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-26084",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-26084",
"description": "CVE-2021-26084 - Confluence Server Webwork OGNL injection ",
"fork": false,
"created_at": "2021-10-06T23:24:24Z",

View file

@ -56,14 +56,14 @@
{
"id": 414009465,
"name": "CVE-2021-27651",
"full_name": "onsecuredev\/CVE-2021-27651",
"full_name": "rakhanobe\/CVE-2021-27651",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-27651",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-27651",
"description": "bypass all stages of the password reset flow",
"fork": false,
"created_at": "2021-10-05T23:33:50Z",

View file

@ -29,14 +29,14 @@
{
"id": 421034424,
"name": "CVE-2021-30573",
"full_name": "onsecuredev\/CVE-2021-30573",
"full_name": "rakhanobe\/CVE-2021-30573",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-30573",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-30573",
"description": "Google Chrome Vulnerabilities CVE-2021-30573",
"fork": false,
"created_at": "2021-10-25T13:25:23Z",

View file

@ -13,17 +13,17 @@
"description": "CSP Playground for CVE-2021-30682",
"fork": false,
"created_at": "2021-10-15T08:10:02Z",
"updated_at": "2021-11-23T15:21:14Z",
"updated_at": "2021-12-21T05:54:01Z",
"pushed_at": "2021-11-14T07:29:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -60,33 +60,6 @@
"watchers": 46,
"score": 0
},
{
"id": 382894525,
"name": "CVE-2021-34527-1675",
"full_name": "CnOxx1\/CVE-2021-34527-1675",
"owner": {
"login": "CnOxx1",
"id": 86923954,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4",
"html_url": "https:\/\/github.com\/CnOxx1"
},
"html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675",
"description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability",
"fork": false,
"created_at": "2021-07-04T16:09:18Z",
"updated_at": "2021-09-06T06:08:09Z",
"pushed_at": "2021-07-04T16:31:21Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 383207766,
"name": "disable-RegisterSpoolerRemoteRpcEndPoint",
@ -182,17 +155,17 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2021-12-17T15:20:20Z",
"updated_at": "2021-12-21T03:36:00Z",
"pushed_at": "2021-08-20T01:54:22Z",
"stargazers_count": 655,
"watchers_count": 655,
"stargazers_count": 656,
"watchers_count": 656,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 95,
"watchers": 655,
"watchers": 656,
"score": 0
},
{

View file

@ -2,14 +2,14 @@
{
"id": 434961092,
"name": "CVE-2021-38314",
"full_name": "onsecuredev\/CVE-2021-38314",
"full_name": "rakhanobe\/CVE-2021-38314",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-38314",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-38314",
"description": " Unauthenticated Sensitive Information Disclosure (CVE-202138314).",
"fork": false,
"created_at": "2021-12-04T17:08:05Z",

View file

@ -927,12 +927,12 @@
"pushed_at": "2021-12-19T08:27:33Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 16,
"score": 0
}

View file

@ -40,17 +40,17 @@
"description": "windows 10 14393 LPE",
"fork": false,
"created_at": "2021-10-20T09:24:36Z",
"updated_at": "2021-12-18T01:23:17Z",
"updated_at": "2021-12-21T05:56:34Z",
"pushed_at": "2021-10-28T03:51:09Z",
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 31,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 68,
"forks": 32,
"watchers": 69,
"score": 0
},
{

View file

@ -32,14 +32,14 @@
{
"id": 414763941,
"name": "CVE-2021-40870",
"full_name": "onsecuredev\/CVE-2021-40870",
"full_name": "rakhanobe\/CVE-2021-40870",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-40870",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-40870",
"description": "Aviatrix allows an authenticated user to execute arbitrary code",
"fork": false,
"created_at": "2021-10-07T21:34:00Z",

View file

@ -744,14 +744,14 @@
{
"id": 414410579,
"name": "CVE-2021-41773",
"full_name": "onsecuredev\/CVE-2021-41773",
"full_name": "rakhanobe\/CVE-2021-41773",
"owner": {
"login": "onsecuredev",
"login": "rakhanobe",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/onsecuredev"
"html_url": "https:\/\/github.com\/rakhanobe"
},
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-41773",
"html_url": "https:\/\/github.com\/rakhanobe\/CVE-2021-41773",
"description": "Apache HTTPd (2.4.49) Local File Disclosure (LFI)",
"fork": false,
"created_at": "2021-10-07T00:14:40Z",

View file

@ -13,11 +13,11 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2021-12-20T21:54:43Z",
"updated_at": "2021-12-21T06:00:48Z",
"pushed_at": "2021-12-16T14:47:13Z",
"stargazers_count": 589,
"watchers_count": 589,
"forks_count": 117,
"stargazers_count": 593,
"watchers_count": 593,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 117,
"watchers": 589,
"forks": 118,
"watchers": 593,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2021-12-20T21:01:55Z",
"updated_at": "2021-12-21T02:58:36Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 913,
"watchers_count": 913,
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 235,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 235,
"watchers": 913,
"watchers": 916,
"score": 0
}
]

29
2021/CVE-2021-42913.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 440389065,
"name": "CVE-2021-42913",
"full_name": "windsormoreira\/CVE-2021-42913",
"owner": {
"login": "windsormoreira",
"id": 21226709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
"html_url": "https:\/\/github.com\/windsormoreira"
},
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2021-42913",
"description": "Samsung Printer SCX-6X55X Improper Access Control",
"fork": false,
"created_at": "2021-12-21T04:26:11Z",
"updated_at": "2021-12-21T04:51:08Z",
"pushed_at": "2021-12-21T04:51:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-43224.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 440359142,
"name": "CVE-2021-43224-POC",
"full_name": "KaLendsi\/CVE-2021-43224-POC",
"owner": {
"login": "KaLendsi",
"id": 68001644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
"html_url": "https:\/\/github.com\/KaLendsi"
},
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-43224-POC",
"description": "Windows Common Log File System Driver POC",
"fork": false,
"created_at": "2021-12-21T01:51:41Z",
"updated_at": "2021-12-21T05:41:13Z",
"pushed_at": "2021-12-21T02:26:50Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Proof of Concept for CVE-2021-43891",
"fork": false,
"created_at": "2021-12-20T21:30:51Z",
"updated_at": "2021-12-20T22:18:51Z",
"updated_at": "2021-12-21T05:48:51Z",
"pushed_at": "2021-12-20T21:38:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2021-12-20T14:32:13Z",
"updated_at": "2021-12-21T03:24:15Z",
"pushed_at": "2021-12-14T15:30:16Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 243,
"watchers": 244,
"score": 0
},
{
@ -121,10 +121,10 @@
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
"fork": false,
"created_at": "2021-12-10T06:15:38Z",
"updated_at": "2021-12-20T13:19:42Z",
"updated_at": "2021-12-21T01:09:10Z",
"pushed_at": "2021-12-16T01:33:48Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -139,7 +139,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 173,
"watchers": 174,
"score": 0
},
{
@ -156,10 +156,10 @@
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
"fork": false,
"created_at": "2021-12-10T06:42:37Z",
"updated_at": "2021-12-18T16:43:09Z",
"updated_at": "2021-12-21T01:32:31Z",
"pushed_at": "2021-12-11T02:49:41Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -179,7 +179,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 90,
"watchers": 89,
"score": 0
},
{
@ -390,17 +390,17 @@
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2021-12-21T00:07:35Z",
"updated_at": "2021-12-21T05:12:26Z",
"pushed_at": "2021-12-20T22:54:49Z",
"stargazers_count": 798,
"watchers_count": 798,
"forks_count": 311,
"stargazers_count": 799,
"watchers_count": 799,
"forks_count": 310,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 311,
"watchers": 798,
"forks": 310,
"watchers": 799,
"score": 0
},
{
@ -417,10 +417,10 @@
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
"fork": false,
"created_at": "2021-12-10T14:22:49Z",
"updated_at": "2021-12-20T17:14:30Z",
"updated_at": "2021-12-21T05:52:16Z",
"pushed_at": "2021-12-14T15:16:15Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -434,7 +434,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 110,
"watchers": 111,
"score": 0
},
{
@ -601,17 +601,17 @@
"description": "Hashes for vulnerable LOG4J versions",
"fork": false,
"created_at": "2021-12-10T18:06:06Z",
"updated_at": "2021-12-20T19:16:32Z",
"updated_at": "2021-12-21T00:48:49Z",
"pushed_at": "2021-12-17T17:02:24Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 130,
"watchers": 131,
"score": 0
},
{
@ -770,17 +770,17 @@
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
"fork": false,
"created_at": "2021-12-10T21:46:18Z",
"updated_at": "2021-12-19T20:19:41Z",
"updated_at": "2021-12-21T05:45:58Z",
"pushed_at": "2021-12-13T22:27:25Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 115,
"watchers": 117,
"score": 0
},
{
@ -858,11 +858,11 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2021-12-20T20:19:44Z",
"updated_at": "2021-12-21T05:25:40Z",
"pushed_at": "2021-12-20T18:11:42Z",
"stargazers_count": 502,
"watchers_count": 502,
"forks_count": 75,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"topics": [
@ -887,8 +887,8 @@
"writeups"
],
"visibility": "public",
"forks": 75,
"watchers": 502,
"forks": 76,
"watchers": 508,
"score": 0
},
{
@ -905,11 +905,11 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2021-12-20T23:08:10Z",
"updated_at": "2021-12-21T05:51:50Z",
"pushed_at": "2021-12-20T23:29:10Z",
"stargazers_count": 844,
"watchers_count": 844,
"forks_count": 187,
"stargazers_count": 856,
"watchers_count": 856,
"forks_count": 192,
"allow_forking": true,
"is_template": false,
"topics": [
@ -919,8 +919,8 @@
"security"
],
"visibility": "public",
"forks": 187,
"watchers": 844,
"forks": 192,
"watchers": 856,
"score": 0
},
{
@ -1233,11 +1233,11 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2021-12-20T15:11:23Z",
"pushed_at": "2021-12-20T12:27:10Z",
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 35,
"updated_at": "2021-12-21T05:37:50Z",
"pushed_at": "2021-12-21T02:01:01Z",
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1246,8 +1246,8 @@
"log4j2"
],
"visibility": "public",
"forks": 35,
"watchers": 78,
"forks": 37,
"watchers": 91,
"score": 0
},
{
@ -1372,11 +1372,11 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2021-12-20T23:13:16Z",
"pushed_at": "2021-12-20T21:37:39Z",
"stargazers_count": 570,
"watchers_count": 570,
"forks_count": 112,
"updated_at": "2021-12-21T05:27:23Z",
"pushed_at": "2021-12-21T04:38:36Z",
"stargazers_count": 574,
"watchers_count": 574,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1390,8 +1390,8 @@
"scanner"
],
"visibility": "public",
"forks": 112,
"watchers": 570,
"forks": 114,
"watchers": 574,
"score": 0
},
{
@ -1766,10 +1766,10 @@
"description": "Detections for CVE-2021-44228 inside of nested binaries",
"fork": false,
"created_at": "2021-12-11T16:08:47Z",
"updated_at": "2021-12-19T20:51:33Z",
"updated_at": "2021-12-21T00:54:03Z",
"pushed_at": "2021-12-18T22:20:25Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -1785,7 +1785,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 23,
"watchers": 24,
"score": 0
},
{
@ -1883,11 +1883,11 @@
"description": "Scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2021-12-20T22:59:15Z",
"updated_at": "2021-12-21T06:08:24Z",
"pushed_at": "2021-12-20T23:08:15Z",
"stargazers_count": 458,
"watchers_count": 458,
"forks_count": 75,
"stargazers_count": 465,
"watchers_count": 465,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1904,8 +1904,8 @@
"vulnerability-scanner"
],
"visibility": "public",
"forks": 75,
"watchers": 458,
"forks": 76,
"watchers": 465,
"score": 0
},
{
@ -1961,12 +1961,12 @@
"pushed_at": "2021-12-11T10:39:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 36,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"forks": 35,
"watchers": 1,
"score": 0
},
@ -1984,17 +1984,17 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2021-12-20T18:21:57Z",
"pushed_at": "2021-12-18T20:22:19Z",
"stargazers_count": 427,
"watchers_count": 427,
"updated_at": "2021-12-21T04:40:55Z",
"pushed_at": "2021-12-21T02:42:24Z",
"stargazers_count": 429,
"watchers_count": 429,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 427,
"watchers": 429,
"score": 0
},
{
@ -2015,7 +2015,7 @@
"pushed_at": "2021-12-16T18:34:46Z",
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [
@ -2026,7 +2026,7 @@
"rce"
],
"visibility": "public",
"forks": 28,
"forks": 29,
"watchers": 169,
"score": 0
},
@ -2408,10 +2408,10 @@
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
"fork": false,
"created_at": "2021-12-12T11:26:42Z",
"updated_at": "2021-12-20T18:28:20Z",
"updated_at": "2021-12-21T01:30:55Z",
"pushed_at": "2021-12-12T17:37:11Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -2426,7 +2426,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 47,
"watchers": 48,
"score": 0
},
{
@ -3196,17 +3196,17 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T22:52:02Z",
"updated_at": "2021-12-20T21:17:13Z",
"updated_at": "2021-12-21T01:51:04Z",
"pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 251,
"watchers_count": 251,
"forks_count": 36,
"stargazers_count": 252,
"watchers_count": 252,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 251,
"forks": 37,
"watchers": 252,
"score": 0
},
{
@ -3432,12 +3432,12 @@
"pushed_at": "2021-12-13T09:18:19Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 26,
"score": 0
},
@ -3536,17 +3536,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2021-12-20T22:06:15Z",
"updated_at": "2021-12-21T06:09:21Z",
"pushed_at": "2021-12-20T11:16:26Z",
"stargazers_count": 2074,
"watchers_count": 2074,
"forks_count": 467,
"stargazers_count": 2091,
"watchers_count": 2091,
"forks_count": 477,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 467,
"watchers": 2074,
"forks": 477,
"watchers": 2091,
"score": 0
},
{
@ -3563,17 +3563,17 @@
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T04:14:18Z",
"updated_at": "2021-12-20T23:43:52Z",
"pushed_at": "2021-12-20T21:31:08Z",
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 67,
"updated_at": "2021-12-21T04:16:21Z",
"pushed_at": "2021-12-21T02:41:51Z",
"stargazers_count": 201,
"watchers_count": 201,
"forks_count": 68,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 199,
"forks": 68,
"watchers": 201,
"score": 0
},
{
@ -4364,8 +4364,8 @@
"description": null,
"fork": false,
"created_at": "2021-12-13T16:04:54Z",
"updated_at": "2021-12-20T16:04:44Z",
"pushed_at": "2021-12-20T16:04:42Z",
"updated_at": "2021-12-21T02:30:06Z",
"pushed_at": "2021-12-21T02:30:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -4564,10 +4564,10 @@
"description": "Python3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.",
"fork": false,
"created_at": "2021-12-13T18:35:16Z",
"updated_at": "2021-12-17T22:47:52Z",
"updated_at": "2021-12-21T04:46:05Z",
"pushed_at": "2021-12-14T22:45:24Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -4583,7 +4583,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -4858,17 +4858,17 @@
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
"fork": false,
"created_at": "2021-12-13T21:39:51Z",
"updated_at": "2021-12-21T00:06:53Z",
"pushed_at": "2021-12-21T00:06:50Z",
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 18,
"updated_at": "2021-12-21T06:04:22Z",
"pushed_at": "2021-12-21T01:24:46Z",
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 227,
"forks": 21,
"watchers": 232,
"score": 0
},
{
@ -5168,17 +5168,17 @@
"description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!",
"fork": false,
"created_at": "2021-12-14T05:24:52Z",
"updated_at": "2021-12-18T15:07:28Z",
"updated_at": "2021-12-21T02:47:01Z",
"pushed_at": "2021-12-15T19:44:28Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -5255,11 +5255,11 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2021-12-20T22:27:13Z",
"updated_at": "2021-12-21T05:51:06Z",
"pushed_at": "2021-12-18T17:32:43Z",
"stargazers_count": 150,
"watchers_count": 150,
"forks_count": 18,
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [
@ -5270,8 +5270,8 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 18,
"watchers": 150,
"forks": 19,
"watchers": 154,
"score": 0
},
{
@ -5328,33 +5328,6 @@
"watchers": 1,
"score": 0
},
{
"id": 438172224,
"name": "ITF-log4shell-vulnapp",
"full_name": "nikitapark\/ITF-log4shell-vulnapp",
"owner": {
"login": "nikitapark",
"id": 25609921,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25609921?v=4",
"html_url": "https:\/\/github.com\/nikitapark"
},
"html_url": "https:\/\/github.com\/nikitapark\/ITF-log4shell-vulnapp",
"description": "log4j (CVE-2021-44228) Spring-boot web application with vulnerabilities",
"fork": false,
"created_at": "2021-12-14T08:21:11Z",
"updated_at": "2021-12-20T07:12:38Z",
"pushed_at": "2021-12-20T07:12:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438175327,
"name": "log4j2-rce-recap",
@ -5456,11 +5429,11 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2021-12-21T00:02:17Z",
"updated_at": "2021-12-21T01:46:24Z",
"pushed_at": "2021-12-20T23:43:04Z",
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 53,
"stargazers_count": 311,
"watchers_count": 311,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [
@ -5474,8 +5447,8 @@
"python"
],
"visibility": "public",
"forks": 53,
"watchers": 310,
"forks": 54,
"watchers": 311,
"score": 0
},
{
@ -5492,17 +5465,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-14T12:37:23Z",
"updated_at": "2021-12-20T23:45:08Z",
"updated_at": "2021-12-21T03:17:27Z",
"pushed_at": "2021-12-14T12:49:56Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 30,
"watchers": 32,
"score": 0
},
{
@ -5735,17 +5708,17 @@
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T18:08:45Z",
"updated_at": "2021-12-20T23:38:01Z",
"updated_at": "2021-12-21T05:25:44Z",
"pushed_at": "2021-12-20T14:44:27Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 90,
"watchers": 93,
"score": 0
},
{
@ -5762,17 +5735,17 @@
"description": "Tools for investigating Log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T19:08:14Z",
"updated_at": "2021-12-20T23:38:33Z",
"updated_at": "2021-12-21T02:32:49Z",
"pushed_at": "2021-12-20T14:03:01Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 71,
"watchers": 72,
"score": 0
},
{
@ -5907,7 +5880,7 @@
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.",
"fork": false,
"created_at": "2021-12-14T22:19:29Z",
"updated_at": "2021-12-20T15:56:01Z",
"updated_at": "2021-12-21T00:43:50Z",
"pushed_at": "2021-12-20T15:55:58Z",
"stargazers_count": 1,
"watchers_count": 1,
@ -6037,17 +6010,17 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2021-12-20T23:35:46Z",
"pushed_at": "2021-12-19T17:36:51Z",
"stargazers_count": 190,
"watchers_count": 190,
"updated_at": "2021-12-21T04:36:03Z",
"pushed_at": "2021-12-21T04:36:00Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 190,
"watchers": 191,
"score": 0
},
{
@ -6757,17 +6730,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-15T20:17:41Z",
"updated_at": "2021-12-20T13:14:35Z",
"updated_at": "2021-12-21T02:11:17Z",
"pushed_at": "2021-12-16T22:07:35Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 73,
"watchers": 74,
"score": 0
},
{
@ -7195,8 +7168,8 @@
"description": "Scanner recursivo de arquivos desenvolvido em Python3 para varredura e localização de versões vulneráveis do Log4j2 em um computador, contemplando análise interna de arquivos JAR (CVE-2021-44228 e CVE-2021-45046)",
"fork": false,
"created_at": "2021-12-16T14:29:05Z",
"updated_at": "2021-12-20T05:41:10Z",
"pushed_at": "2021-12-20T05:41:07Z",
"updated_at": "2021-12-21T05:28:20Z",
"pushed_at": "2021-12-21T05:28:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@ -7249,8 +7222,8 @@
"description": "Log4Shell CVE-2021-44228 Vulnerability Scanner and POC",
"fork": false,
"created_at": "2021-12-16T15:04:23Z",
"updated_at": "2021-12-16T15:44:02Z",
"pushed_at": "2021-12-16T15:43:44Z",
"updated_at": "2021-12-21T05:46:51Z",
"pushed_at": "2021-12-21T06:07:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@ -7972,17 +7945,17 @@
"description": "Docker images and k8s YAMLs for Log4j Vulnerability POC (Log4j (CVE-2021-44228 RCE Vulnerability)",
"fork": false,
"created_at": "2021-12-17T19:50:40Z",
"updated_at": "2021-12-20T16:39:31Z",
"updated_at": "2021-12-21T02:11:16Z",
"pushed_at": "2021-12-20T16:39:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
},
{
@ -8575,8 +8548,8 @@
"description": null,
"fork": false,
"created_at": "2021-12-20T11:07:21Z",
"updated_at": "2021-12-20T15:46:32Z",
"pushed_at": "2021-12-20T15:46:29Z",
"updated_at": "2021-12-21T04:34:14Z",
"pushed_at": "2021-12-21T04:34:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -8602,10 +8575,10 @@
"description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks",
"fork": false,
"created_at": "2021-12-20T12:01:52Z",
"updated_at": "2021-12-20T12:04:58Z",
"updated_at": "2021-12-21T00:45:15Z",
"pushed_at": "2021-12-20T12:03:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -8618,7 +8591,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -8666,17 +8639,17 @@
"description": "log4j2 RCE漏洞CVE-2021-44228)内网扫描器可用于在不出网的条件下进行漏洞扫描帮助企业内部快速发现Log4jShell漏洞。",
"fork": false,
"created_at": "2021-12-20T13:41:35Z",
"updated_at": "2021-12-20T13:41:35Z",
"pushed_at": "2021-12-20T13:41:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-12-21T06:12:29Z",
"pushed_at": "2021-12-21T06:11:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
},
{
@ -8786,5 +8759,59 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 440373235,
"name": "loguccino",
"full_name": "sassoftware\/loguccino",
"owner": {
"login": "sassoftware",
"id": 5289877,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5289877?v=4",
"html_url": "https:\/\/github.com\/sassoftware"
},
"html_url": "https:\/\/github.com\/sassoftware\/loguccino",
"description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ",
"fork": false,
"created_at": "2021-12-21T03:01:36Z",
"updated_at": "2021-12-21T03:01:36Z",
"pushed_at": "2021-12-21T03:01:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 440408111,
"name": "apache-log4j2-CVE-2021-44228",
"full_name": "xx-zhang\/apache-log4j2-CVE-2021-44228",
"owner": {
"login": "xx-zhang",
"id": 47806549,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47806549?v=4",
"html_url": "https:\/\/github.com\/xx-zhang"
},
"html_url": "https:\/\/github.com\/xx-zhang\/apache-log4j2-CVE-2021-44228",
"description": "相关的复现和文档",
"fork": false,
"created_at": "2021-12-21T06:03:18Z",
"updated_at": "2021-12-21T06:03:18Z",
"pushed_at": "2021-12-21T06:03:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -209,17 +209,17 @@
"description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check weather it's affected by log4j2 remote code execution(CVE-2021-45046)",
"fork": false,
"created_at": "2021-12-20T12:07:41Z",
"updated_at": "2021-12-20T19:09:01Z",
"updated_at": "2021-12-21T05:20:46Z",
"pushed_at": "2021-12-20T14:50:03Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 17,
"forks": 3,
"watchers": 35,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Log4j_dos_CVE-2021-45105",
"fork": false,
"created_at": "2021-12-18T12:54:44Z",
"updated_at": "2021-12-20T03:37:53Z",
"updated_at": "2021-12-21T04:37:07Z",
"pushed_at": "2021-12-19T01:59:52Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -39,8 +39,6 @@ Windows Print Spooler Elevation of Privilege Vulnerability
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
- [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675)
- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
- [gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler](https://github.com/gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler)
- [exploitblizzard/PrintNightmare-CVE-2021-1675](https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675)
- [edsonjt81/CVE-2021-1675](https://github.com/edsonjt81/CVE-2021-1675)
- [sailay1996/PrintNightmare-LPE](https://github.com/sailay1996/PrintNightmare-LPE)
- [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare)
@ -551,7 +549,7 @@ Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 an
</code>
- [ghost-nemesis/cve-2021-20837-poc](https://github.com/ghost-nemesis/cve-2021-20837-poc)
- [onsecuredev/CVE-2021-20837](https://github.com/onsecuredev/CVE-2021-20837)
- [rakhanobe/CVE-2021-20837](https://github.com/rakhanobe/CVE-2021-20837)
- [ohnonoyesyes/CVE-2021-20837](https://github.com/ohnonoyesyes/CVE-2021-20837)
- [Cosemz/CVE-2021-20837](https://github.com/Cosemz/CVE-2021-20837)
@ -756,7 +754,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
- [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972)
- [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter)
- [haiclover/CVE-2021-21972](https://github.com/haiclover/CVE-2021-21972)
- [onsecuredev/CVE-2021-21972](https://github.com/onsecuredev/CVE-2021-21972)
- [rakhanobe/CVE-2021-21972](https://github.com/rakhanobe/CVE-2021-21972)
### CVE-2021-21973 (2021-02-24)
@ -970,7 +968,7 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b
- [ZephrFish/CVE-2021-22893_HoneyPoC2](https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2)
- [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893)
- [onsecuredev/CVE-2021-22893](https://github.com/onsecuredev/CVE-2021-22893)
- [rakhanobe/CVE-2021-22893](https://github.com/rakhanobe/CVE-2021-22893)
### CVE-2021-22911 (2021-05-27)
@ -1283,7 +1281,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
- [onsecuredev/CVE-2021-26084](https://github.com/onsecuredev/CVE-2021-26084)
- [rakhanobe/CVE-2021-26084](https://github.com/rakhanobe/CVE-2021-26084)
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
@ -1632,7 +1630,7 @@ In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionali
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
- [onsecuredev/CVE-2021-27651](https://github.com/onsecuredev/CVE-2021-27651)
- [rakhanobe/CVE-2021-27651](https://github.com/rakhanobe/CVE-2021-27651)
### CVE-2021-27850 (2021-04-15)
@ -1940,7 +1938,7 @@ Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote a
</code>
- [s4e-lab/CVE-2021-30573-PoC-Google-Chrome](https://github.com/s4e-lab/CVE-2021-30573-PoC-Google-Chrome)
- [onsecuredev/CVE-2021-30573](https://github.com/onsecuredev/CVE-2021-30573)
- [rakhanobe/CVE-2021-30573](https://github.com/rakhanobe/CVE-2021-30573)
- [kh4sh3i/CVE-2021-30573](https://github.com/kh4sh3i/CVE-2021-30573)
### CVE-2021-30632 (2021-10-08)
@ -2377,7 +2375,6 @@ Windows Print Spooler Remote Code Execution Vulnerability
- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare)
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
- [CnOxx1/CVE-2021-34527-1675](https://github.com/CnOxx1/CVE-2021-34527-1675)
- [rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint](https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint)
- [geekbrett/CVE-2021-34527-PrintNightmare-Workaround](https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround)
- [officedrone/CVE-2021-34527-workaround](https://github.com/officedrone/CVE-2021-34527-workaround)
@ -2725,7 +2722,7 @@ In Apache CouchDB, a malicious user with permission to create documents in a dat
The Gutenberg Template Library &amp; Redux Framework plugin &lt;= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of sites `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
</code>
- [onsecuredev/CVE-2021-38314](https://github.com/onsecuredev/CVE-2021-38314)
- [rakhanobe/CVE-2021-38314](https://github.com/rakhanobe/CVE-2021-38314)
- [phrantom/cve-2021-38314](https://github.com/phrantom/cve-2021-38314)
- [shubhayu-64/CVE-2021-38314](https://github.com/shubhayu-64/CVE-2021-38314)
@ -3143,7 +3140,7 @@ An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestr
</code>
- [0xAgun/CVE-2021-40870](https://github.com/0xAgun/CVE-2021-40870)
- [onsecuredev/CVE-2021-40870](https://github.com/onsecuredev/CVE-2021-40870)
- [rakhanobe/CVE-2021-40870](https://github.com/rakhanobe/CVE-2021-40870)
- [JoyGhoshs/CVE-2021-40870](https://github.com/JoyGhoshs/CVE-2021-40870)
### CVE-2021-40875 (2021-09-22)
@ -3329,7 +3326,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [fnatalucci/CVE-2021-41773-RCE](https://github.com/fnatalucci/CVE-2021-41773-RCE)
- [AssassinUKG/CVE-2021-41773](https://github.com/AssassinUKG/CVE-2021-41773)
- [jheeree/Simple-CVE-2021-41773-checker](https://github.com/jheeree/Simple-CVE-2021-41773-checker)
- [onsecuredev/CVE-2021-41773](https://github.com/onsecuredev/CVE-2021-41773)
- [rakhanobe/CVE-2021-41773](https://github.com/rakhanobe/CVE-2021-41773)
- [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2)
- [vinhjaxt/CVE-2021-41773-exploit](https://github.com/vinhjaxt/CVE-2021-41773-exploit)
- [twseptian/CVE-2021-41773](https://github.com/twseptian/CVE-2021-41773)
@ -3603,6 +3600,14 @@ An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An a
- [netanelc305/PlEXcalaison](https://github.com/netanelc305/PlEXcalaison)
### CVE-2021-42913 (2021-12-20)
<code>
The SyncThru Web Service on Samsung SCX-6x55X printers allows an attacker to gain access to a list of SMB users and cleartext passwords by reading the HTML source code. Authentication is not required.
</code>
- [windsormoreira/CVE-2021-42913](https://github.com/windsormoreira/CVE-2021-42913)
### CVE-2021-43032 (2021-11-03)
<code>
@ -3627,6 +3632,14 @@ Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscri
- [Dir0x/CVE-2021-43141](https://github.com/Dir0x/CVE-2021-43141)
### CVE-2021-43224 (2021-12-15)
<code>
Windows Common Log File System Driver Information Disclosure Vulnerability
</code>
- [KaLendsi/CVE-2021-43224-POC](https://github.com/KaLendsi/CVE-2021-43224-POC)
### CVE-2021-43267 (2021-11-02)
<code>
@ -3958,7 +3971,6 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [0xInfection/LogMePwn](https://github.com/0xInfection/LogMePwn)
- [toramanemre/apache-solr-log4j-CVE-2021-44228](https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228)
- [codiobert/log4j-scanner](https://github.com/codiobert/log4j-scanner)
- [nikitapark/ITF-log4shell-vulnapp](https://github.com/nikitapark/ITF-log4shell-vulnapp)
- [cbuschka/log4j2-rce-recap](https://github.com/cbuschka/log4j2-rce-recap)
- [andrii-kovalenko-celonis/log4j-vulnerability-demo](https://github.com/andrii-kovalenko-celonis/log4j-vulnerability-demo)
- [jan-muhammad-zaidi/Log4j-CVE-2021-44228](https://github.com/jan-muhammad-zaidi/Log4j-CVE-2021-44228)
@ -4081,6 +4093,8 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [intel-xeon/CVE-2021-44228---detection-with-PowerShell](https://github.com/intel-xeon/CVE-2021-44228---detection-with-PowerShell)
- [chandru-gunasekaran/log4j-fix-CVE-2021-44228](https://github.com/chandru-gunasekaran/log4j-fix-CVE-2021-44228)
- [erickrr-bd/TekiumLog4jApp](https://github.com/erickrr-bd/TekiumLog4jApp)
- [sassoftware/loguccino](https://github.com/sassoftware/loguccino)
- [xx-zhang/apache-log4j2-CVE-2021-44228](https://github.com/xx-zhang/apache-log4j2-CVE-2021-44228)
### CVE-2021-44827
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
@ -4488,7 +4502,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
- [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796)
- [onsecuredev/CVE-2020-0796](https://github.com/onsecuredev/CVE-2020-0796)
- [rakhanobe/CVE-2020-0796](https://github.com/rakhanobe/CVE-2020-0796)
- [Murasame-nc/CVE-2020-0796-LPE-POC](https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC)
- [F6JO/CVE-2020-0796-Batch-scanning](https://github.com/F6JO/CVE-2020-0796-Batch-scanning)
- [lisinan988/CVE-2020-0796-exp](https://github.com/lisinan988/CVE-2020-0796-exp)
@ -11786,7 +11800,7 @@ admin/includes/class.import.snippet.php in the &quot;Woody ad snippets&quot; plu
</code>
- [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858)
- [onsecuredev/CVE-2019-15858](https://github.com/onsecuredev/CVE-2019-15858)
- [rakhanobe/CVE-2019-15858](https://github.com/rakhanobe/CVE-2019-15858)
### CVE-2019-15972 (2019-11-25)
@ -15115,7 +15129,7 @@ Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlie
- [cved-sources/cve-2018-15961](https://github.com/cved-sources/cve-2018-15961)
- [0xAJ2K/CVE-2018-15961](https://github.com/0xAJ2K/CVE-2018-15961)
- [xbufu/CVE-2018-15961](https://github.com/xbufu/CVE-2018-15961)
- [onsecuredev/CVE-2018-15961](https://github.com/onsecuredev/CVE-2018-15961)
- [rakhanobe/CVE-2018-15961](https://github.com/rakhanobe/CVE-2018-15961)
### CVE-2018-15968 (2018-10-12)
@ -22578,6 +22592,7 @@ Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function be
- [IvanGlinkin/CVE-2006-3392](https://github.com/IvanGlinkin/CVE-2006-3392)
- [Adel-kaka-dz/CVE-2006-3392](https://github.com/Adel-kaka-dz/CVE-2006-3392)
- [gb21oc/ExploitWebmin](https://github.com/gb21oc/ExploitWebmin)
- [windsormoreira/CVE-2006-3392](https://github.com/windsormoreira/CVE-2006-3392)
### CVE-2006-3592 (2006-07-14)