diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index d039cc99e2..94de8cc6f1 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-12-21T03:36:44Z",
+ "updated_at": "2021-12-21T11:41:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1246,
- "watchers_count": 1246,
+ "stargazers_count": 1248,
+ "watchers_count": 1248,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 276,
- "watchers": 1246,
+ "watchers": 1248,
"score": 0
},
{
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 058d57f788..8a92d2b530 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-12-21T03:36:44Z",
+ "updated_at": "2021-12-21T11:41:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1246,
- "watchers_count": 1246,
+ "stargazers_count": 1248,
+ "watchers_count": 1248,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 276,
- "watchers": 1246,
+ "watchers": 1248,
"score": 0
},
{
diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json
index c809b14d0b..70426f4991 100644
--- a/2017/CVE-2017-0785.json
+++ b/2017/CVE-2017-0785.json
@@ -126,17 +126,17 @@
"description": "Scan\/Exploit Blueborne CVE-2017-0785",
"fork": false,
"created_at": "2017-10-04T20:41:12Z",
- "updated_at": "2021-05-09T09:09:38Z",
+ "updated_at": "2021-12-21T11:40:23Z",
"pushed_at": "2018-02-28T07:04:05Z",
- "stargazers_count": 32,
- "watchers_count": 32,
+ "stargazers_count": 33,
+ "watchers_count": 33,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 32,
+ "watchers": 33,
"score": 0
},
{
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 9a0f30d9a6..471fb701e4 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-12-21T03:36:44Z",
+ "updated_at": "2021-12-21T11:41:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1246,
- "watchers_count": 1246,
+ "stargazers_count": 1248,
+ "watchers_count": 1248,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 276,
- "watchers": 1246,
+ "watchers": 1248,
"score": 0
},
{
diff --git a/2017/CVE-2017-6008.json b/2017/CVE-2017-6008.json
index d2e259c9b1..94c073cd76 100644
--- a/2017/CVE-2017-6008.json
+++ b/2017/CVE-2017-6008.json
@@ -13,17 +13,17 @@
"description": "Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.",
"fork": false,
"created_at": "2017-05-30T09:55:55Z",
- "updated_at": "2021-11-13T18:10:18Z",
+ "updated_at": "2021-12-21T07:12:57Z",
"pushed_at": "2020-04-20T10:12:11Z",
- "stargazers_count": 109,
- "watchers_count": 109,
- "forks_count": 30,
+ "stargazers_count": 110,
+ "watchers_count": 110,
+ "forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 30,
- "watchers": 109,
+ "forks": 31,
+ "watchers": 110,
"score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 0d515b7f21..72d84ddc98 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-12-21T03:36:44Z",
+ "updated_at": "2021-12-21T11:41:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1246,
- "watchers_count": 1246,
+ "stargazers_count": 1248,
+ "watchers_count": 1248,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 276,
- "watchers": 1246,
+ "watchers": 1248,
"score": 0
},
{
diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json
index dbf7223781..d386eba69e 100644
--- a/2019/CVE-2019-1405.json
+++ b/2019/CVE-2019-1405.json
@@ -13,17 +13,17 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
- "updated_at": "2021-11-18T09:24:22Z",
+ "updated_at": "2021-12-21T12:02:40Z",
"pushed_at": "2019-11-14T14:16:54Z",
- "stargazers_count": 282,
- "watchers_count": 282,
+ "stargazers_count": 284,
+ "watchers_count": 284,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 71,
- "watchers": 282,
+ "watchers": 284,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index a37ab5945c..7a1ab6e245 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-12-21T03:36:44Z",
+ "updated_at": "2021-12-21T11:41:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1246,
- "watchers_count": 1246,
+ "stargazers_count": 1248,
+ "watchers_count": 1248,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 276,
- "watchers": 1246,
+ "watchers": 1248,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json
index c15584fe26..344b288ef9 100644
--- a/2019/CVE-2019-3396.json
+++ b/2019/CVE-2019-3396.json
@@ -98,7 +98,7 @@
"pushed_at": "2020-10-01T08:40:07Z",
"stargazers_count": 164,
"watchers_count": 164,
- "forks_count": 67,
+ "forks_count": 68,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -108,7 +108,7 @@
"ssti"
],
"visibility": "public",
- "forks": 67,
+ "forks": 68,
"watchers": 164,
"score": 0
},
diff --git a/2020/CVE-2020-10977.json b/2020/CVE-2020-10977.json
index e3671ee960..73efbc6305 100644
--- a/2020/CVE-2020-10977.json
+++ b/2020/CVE-2020-10977.json
@@ -196,14 +196,14 @@
{
"id": 363605353,
"name": "gitlab-cve-2020-10977",
- "full_name": "nickvdyck\/gitlab-cve-2020-10977",
+ "full_name": "vandycknick\/gitlab-cve-2020-10977",
"owner": {
- "login": "nickvdyck",
+ "login": "vandycknick",
"id": 6469315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6469315?v=4",
- "html_url": "https:\/\/github.com\/nickvdyck"
+ "html_url": "https:\/\/github.com\/vandycknick"
},
- "html_url": "https:\/\/github.com\/nickvdyck\/gitlab-cve-2020-10977",
+ "html_url": "https:\/\/github.com\/vandycknick\/gitlab-cve-2020-10977",
"description": "GitLab Arbitrary File Read Exploit",
"fork": false,
"created_at": "2021-05-02T08:45:03Z",
diff --git a/2020/CVE-2020-25223.json b/2020/CVE-2020-25223.json
index 02eaefe262..4d5b28f329 100644
--- a/2020/CVE-2020-25223.json
+++ b/2020/CVE-2020-25223.json
@@ -13,17 +13,17 @@
"description": "CVE-2020-25223",
"fork": false,
"created_at": "2021-08-29T11:08:53Z",
- "updated_at": "2021-09-13T21:24:05Z",
+ "updated_at": "2021-12-21T07:47:28Z",
"pushed_at": "2021-09-13T21:24:03Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 8,
+ "watchers": 9,
"score": 0
},
{
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 3af63a2a15..792d5b404c 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2021-12-21T03:36:44Z",
+ "updated_at": "2021-12-21T11:41:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
- "stargazers_count": 1246,
- "watchers_count": 1246,
+ "stargazers_count": 1248,
+ "watchers_count": 1248,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 276,
- "watchers": 1246,
+ "watchers": 1248,
"score": 0
},
{
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index aa1a1aafeb..38511efd39 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -107,42 +107,6 @@
"watchers": 4,
"score": 0
},
- {
- "id": 381984439,
- "name": "CVE-2021-1675-LPE",
- "full_name": "hlldz\/CVE-2021-1675-LPE",
- "owner": {
- "login": "hlldz",
- "id": 16455559,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
- "html_url": "https:\/\/github.com\/hlldz"
- },
- "html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
- "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
- "fork": false,
- "created_at": "2021-07-01T09:47:13Z",
- "updated_at": "2021-12-17T02:18:18Z",
- "pushed_at": "2021-07-05T06:46:12Z",
- "stargazers_count": 318,
- "watchers_count": 318,
- "forks_count": 76,
- "allow_forking": true,
- "is_template": false,
- "topics": [
- "cobaltstrike",
- "cve-2021-1675",
- "cve-2021-34527",
- "exploit",
- "lpe",
- "printnightmare",
- "reflectivedll",
- "windows"
- ],
- "visibility": "public",
- "forks": 76,
- "watchers": 318,
- "score": 0
- },
{
"id": 382024474,
"name": "CVE-2021-1675",
diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json
index 8d4496fbba..0edcc791c8 100644
--- a/2021/CVE-2021-1732.json
+++ b/2021/CVE-2021-1732.json
@@ -13,17 +13,17 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
- "updated_at": "2021-12-21T02:31:04Z",
+ "updated_at": "2021-12-21T09:16:46Z",
"pushed_at": "2021-03-05T03:10:26Z",
- "stargazers_count": 350,
- "watchers_count": 350,
+ "stargazers_count": 352,
+ "watchers_count": 352,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 93,
- "watchers": 350,
+ "watchers": 352,
"score": 0
},
{
@@ -121,17 +121,17 @@
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
"fork": false,
"created_at": "2021-04-23T08:21:54Z",
- "updated_at": "2021-12-15T14:41:56Z",
+ "updated_at": "2021-12-21T07:25:34Z",
"pushed_at": "2021-04-23T08:28:53Z",
- "stargazers_count": 50,
- "watchers_count": 50,
+ "stargazers_count": 51,
+ "watchers_count": 51,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 50,
+ "watchers": 51,
"score": 0
},
{
diff --git a/2021/CVE-2021-21315.json b/2021/CVE-2021-21315.json
index fc8999a231..997c1eb78b 100644
--- a/2021/CVE-2021-21315.json
+++ b/2021/CVE-2021-21315.json
@@ -131,10 +131,10 @@
"html_url": "https:\/\/github.com\/Ki11i0n4ir3"
},
"html_url": "https:\/\/github.com\/Ki11i0n4ir3\/CVE-2021-21315",
- "description": "rust noob tried write exploit code with rust lang",
+ "description": "rust noob tried write easy exploit code with rust lang",
"fork": false,
"created_at": "2021-11-10T06:40:17Z",
- "updated_at": "2021-12-20T02:57:52Z",
+ "updated_at": "2021-12-21T07:34:43Z",
"pushed_at": "2021-12-20T02:57:50Z",
"stargazers_count": 1,
"watchers_count": 1,
diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json
index d2e02cb785..2d3d415677 100644
--- a/2021/CVE-2021-21551.json
+++ b/2021/CVE-2021-21551.json
@@ -17,12 +17,12 @@
"pushed_at": "2021-05-20T20:33:09Z",
"stargazers_count": 232,
"watchers_count": 232,
- "forks_count": 40,
+ "forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 40,
+ "forks": 41,
"watchers": 232,
"score": 0
},
@@ -94,10 +94,10 @@
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
"fork": false,
"created_at": "2021-05-30T10:15:10Z",
- "updated_at": "2021-12-19T22:47:52Z",
+ "updated_at": "2021-12-21T10:31:19Z",
"pushed_at": "2021-11-16T17:34:11Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@@ -119,7 +119,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 16,
+ "watchers": 17,
"score": 0
},
{
diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json
index b303259939..fa5fc041d2 100644
--- a/2021/CVE-2021-22005.json
+++ b/2021/CVE-2021-22005.json
@@ -229,17 +229,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-24T23:14:01Z",
- "updated_at": "2021-10-24T23:14:14Z",
+ "updated_at": "2021-12-21T10:53:31Z",
"pushed_at": "2021-10-24T23:14:11Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
},
{
diff --git a/2021/CVE-2021-22555.json b/2021/CVE-2021-22555.json
index 8fd2b1eb17..db6d7d47d2 100644
--- a/2021/CVE-2021-22555.json
+++ b/2021/CVE-2021-22555.json
@@ -44,12 +44,12 @@
"pushed_at": "2021-07-16T01:48:48Z",
"stargazers_count": 0,
"watchers_count": 0,
- "forks_count": 0,
+ "forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 9,
"watchers": 0,
"score": 0
},
diff --git a/2021/CVE-2021-23758.json b/2021/CVE-2021-23758.json
index 5cc84b18d1..d426d84714 100644
--- a/2021/CVE-2021-23758.json
+++ b/2021/CVE-2021-23758.json
@@ -17,12 +17,12 @@
"pushed_at": "2021-12-15T16:37:09Z",
"stargazers_count": 6,
"watchers_count": 6,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 6,
"score": 0
}
diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json
index 73d28361ef..a4a2751e75 100644
--- a/2021/CVE-2021-28476.json
+++ b/2021/CVE-2021-28476.json
@@ -17,7 +17,7 @@
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 204,
"watchers_count": 204,
- "forks_count": 33,
+ "forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -30,7 +30,7 @@
"vmswitch"
],
"visibility": "public",
- "forks": 33,
+ "forks": 34,
"watchers": 204,
"score": 0
},
diff --git a/2021/CVE-2021-29155.json b/2021/CVE-2021-29155.json
index 63cabed897..99e337d495 100644
--- a/2021/CVE-2021-29155.json
+++ b/2021/CVE-2021-29155.json
@@ -17,12 +17,12 @@
"pushed_at": "2021-06-04T16:59:22Z",
"stargazers_count": 2,
"watchers_count": 2,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 2,
"score": 0
}
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index 802e266840..9bb80738d4 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -942,17 +942,17 @@
"description": "CVE-2021-3156非交互式执行命令",
"fork": false,
"created_at": "2021-02-09T19:25:18Z",
- "updated_at": "2021-12-17T08:42:38Z",
+ "updated_at": "2021-12-21T09:31:58Z",
"pushed_at": "2021-02-09T19:31:33Z",
- "stargazers_count": 177,
- "watchers_count": 177,
+ "stargazers_count": 178,
+ "watchers_count": 178,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
- "watchers": 177,
+ "watchers": 178,
"score": 0
},
{
@@ -1023,17 +1023,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
- "updated_at": "2021-12-20T16:10:33Z",
+ "updated_at": "2021-12-21T12:00:10Z",
"pushed_at": "2021-11-04T23:56:50Z",
- "stargazers_count": 417,
- "watchers_count": 417,
+ "stargazers_count": 418,
+ "watchers_count": 418,
"forks_count": 106,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 106,
- "watchers": 417,
+ "watchers": 418,
"score": 0
},
{
diff --git a/2021/CVE-2021-3281.json b/2021/CVE-2021-3281.json
deleted file mode 100644
index d142ba2e9d..0000000000
--- a/2021/CVE-2021-3281.json
+++ /dev/null
@@ -1,29 +0,0 @@
-[
- {
- "id": 383067956,
- "name": "CVE-2021-3281",
- "full_name": "lwzSoviet\/CVE-2021-3281",
- "owner": {
- "login": "lwzSoviet",
- "id": 30397594,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30397594?v=4",
- "html_url": "https:\/\/github.com\/lwzSoviet"
- },
- "html_url": "https:\/\/github.com\/lwzSoviet\/CVE-2021-3281",
- "description": null,
- "fork": false,
- "created_at": "2021-07-05T08:25:26Z",
- "updated_at": "2021-10-28T10:48:25Z",
- "pushed_at": "2021-07-05T08:47:14Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 1,
- "score": 0
- }
-]
\ No newline at end of file
diff --git a/2021/CVE-2021-33624.json b/2021/CVE-2021-33624.json
index f2436c7cf5..27c2f445b7 100644
--- a/2021/CVE-2021-33624.json
+++ b/2021/CVE-2021-33624.json
@@ -17,12 +17,12 @@
"pushed_at": "2021-08-02T07:24:02Z",
"stargazers_count": 2,
"watchers_count": 2,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 2,
"score": 0
}
diff --git a/2021/CVE-2021-33909.json b/2021/CVE-2021-33909.json
index 71b3651eff..bd26035ded 100644
--- a/2021/CVE-2021-33909.json
+++ b/2021/CVE-2021-33909.json
@@ -125,12 +125,12 @@
"pushed_at": "2021-09-02T04:52:19Z",
"stargazers_count": 36,
"watchers_count": 36,
- "forks_count": 12,
+ "forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 12,
+ "forks": 13,
"watchers": 36,
"score": 0
}
diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json
index d080bbba8a..63892658e1 100644
--- a/2021/CVE-2021-34473.json
+++ b/2021/CVE-2021-34473.json
@@ -67,17 +67,17 @@
"description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2021-08-16T11:27:13Z",
- "updated_at": "2021-12-05T17:53:10Z",
+ "updated_at": "2021-12-21T06:16:24Z",
"pushed_at": "2021-08-16T09:00:06Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 17,
+ "watchers": 18,
"score": 0
},
{
diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json
index 19c265d6f1..07aa29c464 100644
--- a/2021/CVE-2021-36934.json
+++ b/2021/CVE-2021-36934.json
@@ -292,12 +292,12 @@
"pushed_at": "2021-09-15T12:41:32Z",
"stargazers_count": 233,
"watchers_count": 233,
- "forks_count": 60,
+ "forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 60,
+ "forks": 61,
"watchers": 233,
"score": 0
},
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index fbe3b33f2a..95a5695078 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -553,11 +553,11 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
- "updated_at": "2021-12-19T17:43:46Z",
+ "updated_at": "2021-12-21T11:49:33Z",
"pushed_at": "2021-10-12T23:05:07Z",
- "stargazers_count": 525,
- "watchers_count": 525,
- "forks_count": 117,
+ "stargazers_count": 526,
+ "watchers_count": 526,
+ "forks_count": 118,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -569,8 +569,8 @@
"remote-code-execution"
],
"visibility": "public",
- "forks": 117,
- "watchers": 525,
+ "forks": 118,
+ "watchers": 526,
"score": 0
},
{
@@ -923,17 +923,17 @@
"description": "CVE-2021-40444",
"fork": false,
"created_at": "2021-12-19T08:16:07Z",
- "updated_at": "2021-12-20T21:50:56Z",
+ "updated_at": "2021-12-21T11:49:46Z",
"pushed_at": "2021-12-19T08:27:33Z",
- "stargazers_count": 16,
- "watchers_count": 16,
- "forks_count": 6,
+ "stargazers_count": 21,
+ "watchers_count": 21,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 6,
- "watchers": 16,
+ "forks": 7,
+ "watchers": 21,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
index 44ea3427cc..7db59f7888 100644
--- a/2021/CVE-2021-40449.json
+++ b/2021/CVE-2021-40449.json
@@ -40,17 +40,17 @@
"description": "windows 10 14393 LPE",
"fork": false,
"created_at": "2021-10-20T09:24:36Z",
- "updated_at": "2021-12-21T05:56:34Z",
+ "updated_at": "2021-12-21T10:36:01Z",
"pushed_at": "2021-10-28T03:51:09Z",
- "stargazers_count": 69,
- "watchers_count": 69,
+ "stargazers_count": 71,
+ "watchers_count": 71,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 32,
- "watchers": 69,
+ "watchers": 71,
"score": 0
},
{
diff --git a/2021/CVE-2021-42008.json b/2021/CVE-2021-42008.json
index 1c00c7cd02..f1e7f1e554 100644
--- a/2021/CVE-2021-42008.json
+++ b/2021/CVE-2021-42008.json
@@ -17,12 +17,12 @@
"pushed_at": "2021-12-03T13:19:26Z",
"stargazers_count": 3,
"watchers_count": 3,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 3,
"score": 0
},
diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json
index 2cd29e485e..ab107cba3e 100644
--- a/2021/CVE-2021-42278.json
+++ b/2021/CVE-2021-42278.json
@@ -13,11 +13,11 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
- "updated_at": "2021-12-21T06:00:48Z",
- "pushed_at": "2021-12-16T14:47:13Z",
- "stargazers_count": 593,
- "watchers_count": 593,
- "forks_count": 118,
+ "updated_at": "2021-12-21T11:36:56Z",
+ "pushed_at": "2021-12-21T10:11:05Z",
+ "stargazers_count": 600,
+ "watchers_count": 600,
+ "forks_count": 121,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -27,8 +27,8 @@
"s4u2self"
],
"visibility": "public",
- "forks": 118,
- "watchers": 593,
+ "forks": 121,
+ "watchers": 600,
"score": 0
},
{
@@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
- "updated_at": "2021-12-20T15:01:01Z",
+ "updated_at": "2021-12-21T09:18:26Z",
"pushed_at": "2021-12-20T04:51:01Z",
- "stargazers_count": 131,
- "watchers_count": 131,
+ "stargazers_count": 134,
+ "watchers_count": 134,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
- "watchers": 131,
+ "watchers": 134,
"score": 0
},
{
@@ -99,17 +99,17 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
- "updated_at": "2021-12-20T18:45:06Z",
+ "updated_at": "2021-12-21T09:18:00Z",
"pushed_at": "2021-12-13T23:15:47Z",
- "stargazers_count": 154,
- "watchers_count": 154,
+ "stargazers_count": 155,
+ "watchers_count": 155,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
- "watchers": 154,
+ "watchers": 155,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index 7ae325332b..b0f7163c66 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
- "updated_at": "2021-12-21T02:58:36Z",
+ "updated_at": "2021-12-21T08:58:03Z",
"pushed_at": "2021-12-16T09:50:15Z",
- "stargazers_count": 916,
- "watchers_count": 916,
+ "stargazers_count": 918,
+ "watchers_count": 918,
"forks_count": 235,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 235,
- "watchers": 916,
+ "watchers": 918,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-43224.json b/2021/CVE-2021-43224.json
index 2552b6cfc7..46eda45139 100644
--- a/2021/CVE-2021-43224.json
+++ b/2021/CVE-2021-43224.json
@@ -13,17 +13,17 @@
"description": "Windows Common Log File System Driver POC",
"fork": false,
"created_at": "2021-12-21T01:51:41Z",
- "updated_at": "2021-12-21T05:41:13Z",
- "pushed_at": "2021-12-21T02:26:50Z",
- "stargazers_count": 5,
- "watchers_count": 5,
- "forks_count": 1,
+ "updated_at": "2021-12-21T10:43:46Z",
+ "pushed_at": "2021-12-21T06:57:06Z",
+ "stargazers_count": 13,
+ "watchers_count": 13,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 1,
- "watchers": 5,
+ "forks": 4,
+ "watchers": 13,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json
index 46154bb09a..8cc864f5df 100644
--- a/2021/CVE-2021-43798.json
+++ b/2021/CVE-2021-43798.json
@@ -604,5 +604,32 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 440470889,
+ "name": "CVE-2021-43798",
+ "full_name": "gps1949\/CVE-2021-43798",
+ "owner": {
+ "login": "gps1949",
+ "id": 62601891,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62601891?v=4",
+ "html_url": "https:\/\/github.com\/gps1949"
+ },
+ "html_url": "https:\/\/github.com\/gps1949\/CVE-2021-43798",
+ "description": null,
+ "fork": false,
+ "created_at": "2021-12-21T10:04:41Z",
+ "updated_at": "2021-12-21T10:09:58Z",
+ "pushed_at": "2021-12-21T10:09:56Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 24a9026248..c8e45f113c 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -94,17 +94,17 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
- "updated_at": "2021-12-21T03:24:15Z",
+ "updated_at": "2021-12-21T11:48:15Z",
"pushed_at": "2021-12-14T15:30:16Z",
- "stargazers_count": 244,
- "watchers_count": 244,
- "forks_count": 61,
+ "stargazers_count": 245,
+ "watchers_count": 245,
+ "forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 61,
- "watchers": 244,
+ "forks": 62,
+ "watchers": 245,
"score": 0
},
{
@@ -156,10 +156,10 @@
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
"fork": false,
"created_at": "2021-12-10T06:42:37Z",
- "updated_at": "2021-12-21T01:32:31Z",
+ "updated_at": "2021-12-21T06:20:00Z",
"pushed_at": "2021-12-11T02:49:41Z",
- "stargazers_count": 89,
- "watchers_count": 89,
+ "stargazers_count": 90,
+ "watchers_count": 90,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@@ -179,7 +179,7 @@
],
"visibility": "public",
"forks": 14,
- "watchers": 89,
+ "watchers": 90,
"score": 0
},
{
@@ -390,17 +390,17 @@
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
- "updated_at": "2021-12-21T05:12:26Z",
+ "updated_at": "2021-12-21T11:31:34Z",
"pushed_at": "2021-12-20T22:54:49Z",
- "stargazers_count": 799,
- "watchers_count": 799,
- "forks_count": 310,
+ "stargazers_count": 807,
+ "watchers_count": 807,
+ "forks_count": 311,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 310,
- "watchers": 799,
+ "forks": 311,
+ "watchers": 807,
"score": 0
},
{
@@ -417,10 +417,10 @@
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
"fork": false,
"created_at": "2021-12-10T14:22:49Z",
- "updated_at": "2021-12-21T05:52:16Z",
+ "updated_at": "2021-12-21T09:59:53Z",
"pushed_at": "2021-12-14T15:16:15Z",
- "stargazers_count": 111,
- "watchers_count": 111,
+ "stargazers_count": 113,
+ "watchers_count": 113,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@@ -434,7 +434,7 @@
],
"visibility": "public",
"forks": 27,
- "watchers": 111,
+ "watchers": 113,
"score": 0
},
{
@@ -601,17 +601,17 @@
"description": "Hashes for vulnerable LOG4J versions",
"fork": false,
"created_at": "2021-12-10T18:06:06Z",
- "updated_at": "2021-12-21T00:48:49Z",
+ "updated_at": "2021-12-21T11:33:00Z",
"pushed_at": "2021-12-17T17:02:24Z",
- "stargazers_count": 131,
- "watchers_count": 131,
- "forks_count": 30,
+ "stargazers_count": 132,
+ "watchers_count": 132,
+ "forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 30,
- "watchers": 131,
+ "forks": 31,
+ "watchers": 132,
"score": 0
},
{
@@ -770,17 +770,17 @@
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
"fork": false,
"created_at": "2021-12-10T21:46:18Z",
- "updated_at": "2021-12-21T05:45:58Z",
+ "updated_at": "2021-12-21T09:29:51Z",
"pushed_at": "2021-12-13T22:27:25Z",
- "stargazers_count": 117,
- "watchers_count": 117,
+ "stargazers_count": 118,
+ "watchers_count": 118,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
- "watchers": 117,
+ "watchers": 118,
"score": 0
},
{
@@ -858,11 +858,11 @@
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
- "updated_at": "2021-12-21T05:25:40Z",
+ "updated_at": "2021-12-21T10:53:48Z",
"pushed_at": "2021-12-20T18:11:42Z",
- "stargazers_count": 508,
- "watchers_count": 508,
- "forks_count": 76,
+ "stargazers_count": 513,
+ "watchers_count": 513,
+ "forks_count": 78,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -887,8 +887,8 @@
"writeups"
],
"visibility": "public",
- "forks": 76,
- "watchers": 508,
+ "forks": 78,
+ "watchers": 513,
"score": 0
},
{
@@ -905,11 +905,11 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
- "updated_at": "2021-12-21T05:51:50Z",
- "pushed_at": "2021-12-20T23:29:10Z",
- "stargazers_count": 856,
- "watchers_count": 856,
- "forks_count": 192,
+ "updated_at": "2021-12-21T11:49:14Z",
+ "pushed_at": "2021-12-21T07:14:37Z",
+ "stargazers_count": 871,
+ "watchers_count": 871,
+ "forks_count": 197,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -919,8 +919,8 @@
"security"
],
"visibility": "public",
- "forks": 192,
- "watchers": 856,
+ "forks": 197,
+ "watchers": 871,
"score": 0
},
{
@@ -964,10 +964,10 @@
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
"fork": false,
"created_at": "2021-12-10T23:35:31Z",
- "updated_at": "2021-12-20T21:18:02Z",
+ "updated_at": "2021-12-21T09:39:08Z",
"pushed_at": "2021-12-14T13:43:35Z",
- "stargazers_count": 66,
- "watchers_count": 66,
+ "stargazers_count": 68,
+ "watchers_count": 68,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@@ -979,7 +979,7 @@
],
"visibility": "public",
"forks": 14,
- "watchers": 66,
+ "watchers": 68,
"score": 0
},
{
@@ -1233,11 +1233,11 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
- "updated_at": "2021-12-21T05:37:50Z",
- "pushed_at": "2021-12-21T02:01:01Z",
- "stargazers_count": 91,
- "watchers_count": 91,
- "forks_count": 37,
+ "updated_at": "2021-12-21T12:08:42Z",
+ "pushed_at": "2021-12-21T08:52:54Z",
+ "stargazers_count": 103,
+ "watchers_count": 103,
+ "forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -1246,8 +1246,8 @@
"log4j2"
],
"visibility": "public",
- "forks": 37,
- "watchers": 91,
+ "forks": 41,
+ "watchers": 103,
"score": 0
},
{
@@ -1372,11 +1372,11 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
- "updated_at": "2021-12-21T05:27:23Z",
- "pushed_at": "2021-12-21T04:38:36Z",
- "stargazers_count": 574,
- "watchers_count": 574,
- "forks_count": 114,
+ "updated_at": "2021-12-21T12:07:33Z",
+ "pushed_at": "2021-12-21T08:08:40Z",
+ "stargazers_count": 585,
+ "watchers_count": 585,
+ "forks_count": 115,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -1390,8 +1390,8 @@
"scanner"
],
"visibility": "public",
- "forks": 114,
- "watchers": 574,
+ "forks": 115,
+ "watchers": 585,
"score": 0
},
{
@@ -1883,11 +1883,11 @@
"description": "Scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
- "updated_at": "2021-12-21T06:08:24Z",
- "pushed_at": "2021-12-20T23:08:15Z",
- "stargazers_count": 465,
- "watchers_count": 465,
- "forks_count": 76,
+ "updated_at": "2021-12-21T12:01:57Z",
+ "pushed_at": "2021-12-21T08:00:31Z",
+ "stargazers_count": 470,
+ "watchers_count": 470,
+ "forks_count": 77,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -1904,8 +1904,8 @@
"vulnerability-scanner"
],
"visibility": "public",
- "forks": 76,
- "watchers": 465,
+ "forks": 77,
+ "watchers": 470,
"score": 0
},
{
@@ -1926,7 +1926,7 @@
"pushed_at": "2021-12-12T09:59:26Z",
"stargazers_count": 3,
"watchers_count": 3,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -1939,7 +1939,7 @@
"remote-code-execution"
],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 3,
"score": 0
},
@@ -1984,17 +1984,17 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
- "updated_at": "2021-12-21T04:40:55Z",
+ "updated_at": "2021-12-21T12:02:52Z",
"pushed_at": "2021-12-21T02:42:24Z",
- "stargazers_count": 429,
- "watchers_count": 429,
+ "stargazers_count": 432,
+ "watchers_count": 432,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 55,
- "watchers": 429,
+ "watchers": 432,
"score": 0
},
{
@@ -2504,17 +2504,17 @@
"description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.",
"fork": false,
"created_at": "2021-12-12T12:16:07Z",
- "updated_at": "2021-12-20T15:08:21Z",
+ "updated_at": "2021-12-21T10:30:14Z",
"pushed_at": "2021-12-20T09:43:33Z",
- "stargazers_count": 37,
- "watchers_count": 37,
+ "stargazers_count": 38,
+ "watchers_count": 38,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 37,
+ "watchers": 38,
"score": 0
},
{
@@ -2727,10 +2727,10 @@
"description": "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability ",
"fork": false,
"created_at": "2021-12-12T14:05:05Z",
- "updated_at": "2021-12-20T18:41:40Z",
+ "updated_at": "2021-12-21T07:52:34Z",
"pushed_at": "2021-12-19T07:40:25Z",
- "stargazers_count": 43,
- "watchers_count": 43,
+ "stargazers_count": 44,
+ "watchers_count": 44,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@@ -2741,7 +2741,7 @@
],
"visibility": "public",
"forks": 9,
- "watchers": 43,
+ "watchers": 44,
"score": 0
},
{
@@ -2758,8 +2758,8 @@
"description": "Known IoCs for log4j framework vulnerability ",
"fork": false,
"created_at": "2021-12-12T14:27:28Z",
- "updated_at": "2021-12-17T20:03:53Z",
- "pushed_at": "2021-12-17T20:03:51Z",
+ "updated_at": "2021-12-21T10:18:36Z",
+ "pushed_at": "2021-12-21T10:18:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
@@ -2839,17 +2839,17 @@
"description": "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability.",
"fork": false,
"created_at": "2021-12-12T15:29:20Z",
- "updated_at": "2021-12-20T09:14:35Z",
+ "updated_at": "2021-12-21T10:08:58Z",
"pushed_at": "2021-12-20T16:04:05Z",
- "stargazers_count": 61,
- "watchers_count": 61,
+ "stargazers_count": 62,
+ "watchers_count": 62,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 61,
+ "watchers": 62,
"score": 0
},
{
@@ -3012,10 +3012,10 @@
"description": "A tool to analyze the log files from minecraft to scan potential security risks from the CVE-2021-44228 Log4J library exploit. ",
"fork": false,
"created_at": "2021-12-12T19:42:47Z",
- "updated_at": "2021-12-18T20:40:59Z",
+ "updated_at": "2021-12-21T08:17:51Z",
"pushed_at": "2021-12-18T20:40:56Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@@ -3029,7 +3029,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0
},
{
@@ -3169,17 +3169,17 @@
"description": "Log4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)",
"fork": false,
"created_at": "2021-12-12T21:52:53Z",
- "updated_at": "2021-12-12T22:36:04Z",
+ "updated_at": "2021-12-21T08:19:19Z",
"pushed_at": "2021-12-12T22:36:02Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 0,
+ "forks": 1,
+ "watchers": 1,
"score": 0
},
{
@@ -3200,12 +3200,12 @@
"pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 252,
"watchers_count": 252,
- "forks_count": 37,
+ "forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 37,
+ "forks": 38,
"watchers": 252,
"score": 0
},
@@ -3513,12 +3513,12 @@
"pushed_at": "2021-12-17T20:36:18Z",
"stargazers_count": 6,
"watchers_count": 6,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 6,
"score": 0
},
@@ -3536,17 +3536,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
- "updated_at": "2021-12-21T06:09:21Z",
+ "updated_at": "2021-12-21T12:05:29Z",
"pushed_at": "2021-12-20T11:16:26Z",
- "stargazers_count": 2091,
- "watchers_count": 2091,
- "forks_count": 477,
+ "stargazers_count": 2107,
+ "watchers_count": 2107,
+ "forks_count": 482,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 477,
- "watchers": 2091,
+ "forks": 482,
+ "watchers": 2107,
"score": 0
},
{
@@ -3563,17 +3563,17 @@
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T04:14:18Z",
- "updated_at": "2021-12-21T04:16:21Z",
- "pushed_at": "2021-12-21T02:41:51Z",
- "stargazers_count": 201,
- "watchers_count": 201,
- "forks_count": 68,
+ "updated_at": "2021-12-21T11:19:53Z",
+ "pushed_at": "2021-12-21T07:15:25Z",
+ "stargazers_count": 207,
+ "watchers_count": 207,
+ "forks_count": 70,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 68,
- "watchers": 201,
+ "forks": 70,
+ "watchers": 207,
"score": 0
},
{
@@ -3979,17 +3979,17 @@
"description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
"fork": false,
"created_at": "2021-12-13T11:06:46Z",
- "updated_at": "2021-12-20T06:27:56Z",
+ "updated_at": "2021-12-21T08:48:36Z",
"pushed_at": "2021-12-16T06:53:21Z",
- "stargazers_count": 40,
- "watchers_count": 40,
- "forks_count": 12,
+ "stargazers_count": 41,
+ "watchers_count": 41,
+ "forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 12,
- "watchers": 40,
+ "forks": 13,
+ "watchers": 41,
"score": 0
},
{
@@ -4034,7 +4034,7 @@
"fork": false,
"created_at": "2021-12-13T12:30:11Z",
"updated_at": "2021-12-20T01:43:11Z",
- "pushed_at": "2021-12-20T01:43:08Z",
+ "pushed_at": "2021-12-21T10:21:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
@@ -4121,16 +4121,16 @@
"description": "Log4j CVE-2021-44228 examples: Remote Code Execution (through LDAP, RMI, ...), Forced DNS queries, ...",
"fork": false,
"created_at": "2021-12-13T13:08:03Z",
- "updated_at": "2021-12-20T08:32:09Z",
- "pushed_at": "2021-12-15T10:49:56Z",
+ "updated_at": "2021-12-21T11:12:43Z",
+ "pushed_at": "2021-12-21T11:12:40Z",
"stargazers_count": 3,
"watchers_count": 3,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 3,
"score": 0
},
@@ -4858,17 +4858,17 @@
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
"fork": false,
"created_at": "2021-12-13T21:39:51Z",
- "updated_at": "2021-12-21T06:04:22Z",
+ "updated_at": "2021-12-21T10:48:49Z",
"pushed_at": "2021-12-21T01:24:46Z",
- "stargazers_count": 232,
- "watchers_count": 232,
- "forks_count": 21,
+ "stargazers_count": 239,
+ "watchers_count": 239,
+ "forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 21,
- "watchers": 232,
+ "forks": 22,
+ "watchers": 239,
"score": 0
},
{
@@ -4885,10 +4885,10 @@
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
"fork": false,
"created_at": "2021-12-13T21:47:41Z",
- "updated_at": "2021-12-20T15:12:12Z",
+ "updated_at": "2021-12-21T08:39:05Z",
"pushed_at": "2021-12-20T12:52:54Z",
- "stargazers_count": 34,
- "watchers_count": 34,
+ "stargazers_count": 35,
+ "watchers_count": 35,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@@ -4903,7 +4903,7 @@
],
"visibility": "public",
"forks": 9,
- "watchers": 34,
+ "watchers": 35,
"score": 0
},
{
@@ -4974,11 +4974,11 @@
"description": "Find log4j for CVE-2021-44228 on some places * Log4Shell",
"fork": false,
"created_at": "2021-12-13T22:26:04Z",
- "updated_at": "2021-12-14T22:10:09Z",
+ "updated_at": "2021-12-21T07:48:29Z",
"pushed_at": "2021-12-14T21:11:59Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "forks_count": 3,
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -4988,8 +4988,8 @@
"log4jshell"
],
"visibility": "public",
- "forks": 3,
- "watchers": 1,
+ "forks": 4,
+ "watchers": 2,
"score": 0
},
{
@@ -5255,10 +5255,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
- "updated_at": "2021-12-21T05:51:06Z",
+ "updated_at": "2021-12-21T06:42:01Z",
"pushed_at": "2021-12-18T17:32:43Z",
- "stargazers_count": 154,
- "watchers_count": 154,
+ "stargazers_count": 155,
+ "watchers_count": 155,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@@ -5271,7 +5271,7 @@
],
"visibility": "public",
"forks": 19,
- "watchers": 154,
+ "watchers": 155,
"score": 0
},
{
@@ -5429,11 +5429,11 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
- "updated_at": "2021-12-21T01:46:24Z",
+ "updated_at": "2021-12-21T11:16:18Z",
"pushed_at": "2021-12-20T23:43:04Z",
- "stargazers_count": 311,
- "watchers_count": 311,
- "forks_count": 54,
+ "stargazers_count": 317,
+ "watchers_count": 317,
+ "forks_count": 55,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -5447,8 +5447,8 @@
"python"
],
"visibility": "public",
- "forks": 54,
- "watchers": 311,
+ "forks": 55,
+ "watchers": 317,
"score": 0
},
{
@@ -5465,17 +5465,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-14T12:37:23Z",
- "updated_at": "2021-12-21T03:17:27Z",
+ "updated_at": "2021-12-21T11:31:40Z",
"pushed_at": "2021-12-14T12:49:56Z",
- "stargazers_count": 32,
- "watchers_count": 32,
+ "stargazers_count": 33,
+ "watchers_count": 33,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 32,
+ "watchers": 33,
"score": 0
},
{
@@ -5708,17 +5708,17 @@
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T18:08:45Z",
- "updated_at": "2021-12-21T05:25:44Z",
+ "updated_at": "2021-12-21T11:43:21Z",
"pushed_at": "2021-12-20T14:44:27Z",
- "stargazers_count": 93,
- "watchers_count": 93,
- "forks_count": 14,
+ "stargazers_count": 94,
+ "watchers_count": 94,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 14,
- "watchers": 93,
+ "forks": 15,
+ "watchers": 94,
"score": 0
},
{
@@ -5949,8 +5949,8 @@
"description": "Searches filesystem for CVE-2021-44228 and CVE-2021-45046 vulnerable instances of log4j library, including embedded (jar\/war\/zip) packaged ones.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
- "updated_at": "2021-12-20T16:32:54Z",
- "pushed_at": "2021-12-20T16:32:52Z",
+ "updated_at": "2021-12-21T12:06:24Z",
+ "pushed_at": "2021-12-21T12:06:22Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
@@ -6010,17 +6010,17 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
- "updated_at": "2021-12-21T04:36:03Z",
+ "updated_at": "2021-12-21T11:19:25Z",
"pushed_at": "2021-12-21T04:36:00Z",
- "stargazers_count": 191,
- "watchers_count": 191,
- "forks_count": 41,
+ "stargazers_count": 194,
+ "watchers_count": 194,
+ "forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 41,
- "watchers": 191,
+ "forks": 42,
+ "watchers": 194,
"score": 0
},
{
@@ -6730,17 +6730,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-15T20:17:41Z",
- "updated_at": "2021-12-21T02:11:17Z",
+ "updated_at": "2021-12-21T07:00:12Z",
"pushed_at": "2021-12-16T22:07:35Z",
- "stargazers_count": 74,
- "watchers_count": 74,
+ "stargazers_count": 75,
+ "watchers_count": 75,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 74,
+ "watchers": 75,
"score": 0
},
{
@@ -6789,17 +6789,17 @@
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-15T22:30:34Z",
- "updated_at": "2021-12-20T23:38:13Z",
+ "updated_at": "2021-12-21T08:37:09Z",
"pushed_at": "2021-12-19T15:31:46Z",
- "stargazers_count": 44,
- "watchers_count": 44,
+ "stargazers_count": 45,
+ "watchers_count": 45,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 44,
+ "watchers": 45,
"score": 0
},
{
@@ -7025,8 +7025,8 @@
"description": "Detect and fix log4j log4shell vulnerability (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-16T11:54:11Z",
- "updated_at": "2021-12-19T10:13:59Z",
- "pushed_at": "2021-12-19T10:13:56Z",
+ "updated_at": "2021-12-21T11:57:18Z",
+ "pushed_at": "2021-12-21T11:44:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@@ -7223,7 +7223,7 @@
"fork": false,
"created_at": "2021-12-16T15:04:23Z",
"updated_at": "2021-12-21T05:46:51Z",
- "pushed_at": "2021-12-21T06:07:43Z",
+ "pushed_at": "2021-12-21T07:03:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@@ -7717,11 +7717,11 @@
"html_url": "https:\/\/github.com\/zane00"
},
"html_url": "https:\/\/github.com\/zane00\/CVE-2021-44228",
- "description": "Log4Shell (CVE-2021-44228): Descrizione, Exploitation e Rimedi",
+ "description": "Log4Shell (CVE-2021-44228): Descrizione, Exploitation e Mitigazione",
"fork": false,
"created_at": "2021-12-17T10:36:16Z",
- "updated_at": "2021-12-20T14:50:18Z",
- "pushed_at": "2021-12-20T14:50:15Z",
+ "updated_at": "2021-12-21T11:08:13Z",
+ "pushed_at": "2021-12-21T08:50:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@@ -8300,7 +8300,7 @@
"pushed_at": "2021-12-19T18:11:20Z",
"stargazers_count": 1,
"watchers_count": 1,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@@ -8311,7 +8311,7 @@
"redteam"
],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 1,
"score": 0
},
@@ -8643,12 +8643,12 @@
"pushed_at": "2021-12-21T06:11:58Z",
"stargazers_count": 2,
"watchers_count": 2,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 2,
"score": 0
},
@@ -8666,17 +8666,17 @@
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
"fork": false,
"created_at": "2021-12-20T15:22:50Z",
- "updated_at": "2021-12-20T16:40:11Z",
- "pushed_at": "2021-12-20T16:40:08Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "updated_at": "2021-12-21T10:19:33Z",
+ "pushed_at": "2021-12-21T10:19:31Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
},
{
@@ -8813,5 +8813,32 @@
"forks": 0,
"watchers": 0,
"score": 0
+ },
+ {
+ "id": 440439859,
+ "name": "Log4Shell-Scanner",
+ "full_name": "r00thunter\/Log4Shell-Scanner",
+ "owner": {
+ "login": "r00thunter",
+ "id": 33806985,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33806985?v=4",
+ "html_url": "https:\/\/github.com\/r00thunter"
+ },
+ "html_url": "https:\/\/github.com\/r00thunter\/Log4Shell-Scanner",
+ "description": "Python script to detect Log4Shell Vulnerability CVE-2021-44228",
+ "fork": false,
+ "created_at": "2021-12-21T08:13:35Z",
+ "updated_at": "2021-12-21T08:15:05Z",
+ "pushed_at": "2021-12-21T08:15:02Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-4428.json b/2021/CVE-2021-4428.json
new file mode 100644
index 0000000000..c0a8c1babb
--- /dev/null
+++ b/2021/CVE-2021-4428.json
@@ -0,0 +1,29 @@
+[
+ {
+ "id": 440457055,
+ "name": "Log4Shell",
+ "full_name": "CERT-hr\/Log4Shell",
+ "owner": {
+ "login": "CERT-hr",
+ "id": 42938844,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42938844?v=4",
+ "html_url": "https:\/\/github.com\/CERT-hr"
+ },
+ "html_url": "https:\/\/github.com\/CERT-hr\/Log4Shell",
+ "description": "This repo contains IoCs which are associated with exploitation of CVE-2021-4428.",
+ "fork": false,
+ "created_at": "2021-12-21T09:17:08Z",
+ "updated_at": "2021-12-21T09:17:11Z",
+ "pushed_at": "2021-12-21T09:17:09Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-45046.json b/2021/CVE-2021-45046.json
index caacc46ac6..39b994f7c3 100644
--- a/2021/CVE-2021-45046.json
+++ b/2021/CVE-2021-45046.json
@@ -209,17 +209,17 @@
"description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check weather it's affected by log4j2 remote code execution(CVE-2021-45046)",
"fork": false,
"created_at": "2021-12-20T12:07:41Z",
- "updated_at": "2021-12-21T05:20:46Z",
+ "updated_at": "2021-12-21T09:30:50Z",
"pushed_at": "2021-12-20T14:50:03Z",
- "stargazers_count": 35,
- "watchers_count": 35,
+ "stargazers_count": 41,
+ "watchers_count": 41,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 35,
+ "watchers": 41,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-45105.json b/2021/CVE-2021-45105.json
index 8b3e069c4f..3c50d1b8bb 100644
--- a/2021/CVE-2021-45105.json
+++ b/2021/CVE-2021-45105.json
@@ -97,44 +97,17 @@
"description": "log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc",
"fork": false,
"created_at": "2021-12-20T10:52:20Z",
- "updated_at": "2021-12-20T12:30:03Z",
+ "updated_at": "2021-12-21T11:06:15Z",
"pushed_at": "2021-12-20T12:10:47Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
- "score": 0
- },
- {
- "id": 440311205,
- "name": "log4j",
- "full_name": "hackername0102\/log4j",
- "owner": {
- "login": "hackername0102",
- "id": 54266291,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54266291?v=4",
- "html_url": "https:\/\/github.com\/hackername0102"
- },
- "html_url": "https:\/\/github.com\/hackername0102\/log4j",
- "description": "POC of CVE-2021-45105",
- "fork": false,
- "created_at": "2021-12-20T21:27:55Z",
- "updated_at": "2021-12-20T21:41:10Z",
- "pushed_at": "2021-12-20T21:41:07Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index c54163171c..2e16e7d3ea 100644
--- a/README.md
+++ b/README.md
@@ -35,7 +35,6 @@ Windows Print Spooler Elevation of Privilege Vulnerability
- [cube0x0/CVE-2021-1675](https://github.com/cube0x0/CVE-2021-1675)
- [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675)
- [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675)
-- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE)
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
- [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675)
- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
@@ -347,14 +346,6 @@ Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177
- [fullbbadda1208/CVE-2021-3229](https://github.com/fullbbadda1208/CVE-2021-3229)
-### CVE-2021-3281 (2021-02-02)
-
-
-In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
-
-
-- [lwzSoviet/CVE-2021-3281](https://github.com/lwzSoviet/CVE-2021-3281)
-
### CVE-2021-3291 (2021-01-26)
@@ -525,6 +516,9 @@ JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when
- [cckuailong/log4shell_1.x](https://github.com/cckuailong/log4shell_1.x)
+### CVE-2021-4428
+- [CERT-hr/Log4Shell](https://github.com/CERT-hr/Log4Shell)
+
### CVE-2021-4438
- [longnguyen-2k/log4j](https://github.com/longnguyen-2k/log4j)
@@ -3741,6 +3735,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [Awrrays/Grafana-CVE-2021-43798](https://github.com/Awrrays/Grafana-CVE-2021-43798)
- [Ryze-T/CVE-2021-43798](https://github.com/Ryze-T/CVE-2021-43798)
- [k3rwin/CVE-2021-43798-Grafana-](https://github.com/k3rwin/CVE-2021-43798-Grafana-)
+- [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798)
### CVE-2021-43799
- [scopion/CVE-2021-43799](https://github.com/scopion/CVE-2021-43799)
@@ -4095,6 +4090,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [erickrr-bd/TekiumLog4jApp](https://github.com/erickrr-bd/TekiumLog4jApp)
- [sassoftware/loguccino](https://github.com/sassoftware/loguccino)
- [xx-zhang/apache-log4j2-CVE-2021-44228](https://github.com/xx-zhang/apache-log4j2-CVE-2021-44228)
+- [r00thunter/Log4Shell-Scanner](https://github.com/r00thunter/Log4Shell-Scanner)
### CVE-2021-44827
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
@@ -4132,7 +4128,6 @@ Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not prot
- [pravin-pp/log4j2-CVE-2021-45105](https://github.com/pravin-pp/log4j2-CVE-2021-45105)
- [tejas-nagchandi/CVE-2021-45105](https://github.com/tejas-nagchandi/CVE-2021-45105)
- [iAmSOScArEd/log4j2_dos_exploit](https://github.com/iAmSOScArEd/log4j2_dos_exploit)
-- [hackername0102/log4j](https://github.com/hackername0102/log4j)
## 2020
@@ -6405,7 +6400,7 @@ GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an iss
- [erk3/gitlab-12.9.0-file-read](https://github.com/erk3/gitlab-12.9.0-file-read)
- [liath/CVE-2020-10977](https://github.com/liath/CVE-2020-10977)
- [lisp3r/cve-2020-10977-read-and-execute](https://github.com/lisp3r/cve-2020-10977-read-and-execute)
-- [nickvdyck/gitlab-cve-2020-10977](https://github.com/nickvdyck/gitlab-cve-2020-10977)
+- [vandycknick/gitlab-cve-2020-10977](https://github.com/vandycknick/gitlab-cve-2020-10977)
### CVE-2020-11022 (2020-04-29)