mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2022/01/09 12:13:49
This commit is contained in:
parent
680b20bca2
commit
3df7cc6eb4
14 changed files with 133 additions and 124 deletions
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"forks_count": 100,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"forks": 101,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"forks_count": 100,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"forks": 101,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -206,12 +206,12 @@
|
|||
"pushed_at": "2021-01-19T07:17:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2021-12-28T06:15:47Z",
|
||||
"updated_at": "2022-01-09T07:47:35Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 166,
|
||||
"watchers": 167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -148,10 +148,10 @@
|
|||
"description": "Android privilege escalation via an use-after-free in binder.c",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-17T11:53:54Z",
|
||||
"updated_at": "2021-11-18T09:33:08Z",
|
||||
"updated_at": "2022-01-09T07:14:56Z",
|
||||
"pushed_at": "2020-04-14T07:04:15Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -160,7 +160,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 31,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,17 +45,17 @@
|
|||
"description": "CVE-2020-15227 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T02:38:15Z",
|
||||
"updated_at": "2022-01-06T21:46:16Z",
|
||||
"updated_at": "2022-01-09T09:07:04Z",
|
||||
"pushed_at": "2020-10-09T16:39:54Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T22:59:29Z",
|
||||
"updated_at": "2022-01-08T15:49:01Z",
|
||||
"updated_at": "2022-01-09T10:06:52Z",
|
||||
"pushed_at": "2021-09-03T10:24:34Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 80,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -179,17 +179,17 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2022-01-07T09:33:18Z",
|
||||
"updated_at": "2022-01-09T12:03:47Z",
|
||||
"pushed_at": "2021-12-14T05:12:17Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 32,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 66,
|
||||
"forks": 33,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Dahua IPC\/VTH\/VTO devices auth bypass exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-18T16:02:41Z",
|
||||
"updated_at": "2022-01-06T06:05:32Z",
|
||||
"updated_at": "2022-01-09T11:24:12Z",
|
||||
"pushed_at": "2021-10-18T16:09:44Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-38619.json
Normal file
29
2021/CVE-2021-38619.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 395501049,
|
||||
"name": "CVE-2021-38619",
|
||||
"full_name": "charlesbickel\/CVE-2021-38619",
|
||||
"owner": {
|
||||
"login": "charlesbickel",
|
||||
"id": 6393058,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6393058?v=4",
|
||||
"html_url": "https:\/\/github.com\/charlesbickel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/charlesbickel\/CVE-2021-38619",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-13T02:42:25Z",
|
||||
"updated_at": "2021-08-14T12:17:15Z",
|
||||
"pushed_at": "2021-08-13T13:40:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -49,12 +49,12 @@
|
|||
"pushed_at": "2021-12-20T04:51:01Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 35,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 36,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:15:38Z",
|
||||
"updated_at": "2022-01-07T16:45:41Z",
|
||||
"updated_at": "2022-01-09T07:50:37Z",
|
||||
"pushed_at": "2021-12-16T01:33:48Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -139,7 +139,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -858,10 +858,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-01-09T05:04:15Z",
|
||||
"updated_at": "2022-01-09T11:23:04Z",
|
||||
"pushed_at": "2021-12-31T11:47:19Z",
|
||||
"stargazers_count": 588,
|
||||
"watchers_count": 588,
|
||||
"stargazers_count": 589,
|
||||
"watchers_count": 589,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -888,7 +888,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"watchers": 588,
|
||||
"watchers": 589,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -905,11 +905,11 @@
|
|||
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-01-09T05:09:58Z",
|
||||
"updated_at": "2022-01-09T10:03:46Z",
|
||||
"pushed_at": "2022-01-02T07:12:10Z",
|
||||
"stargazers_count": 1114,
|
||||
"watchers_count": 1114,
|
||||
"forks_count": 280,
|
||||
"stargazers_count": 1116,
|
||||
"watchers_count": 1116,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,8 +919,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 280,
|
||||
"watchers": 1114,
|
||||
"forks": 281,
|
||||
"watchers": 1116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -964,10 +964,10 @@
|
|||
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:35:31Z",
|
||||
"updated_at": "2022-01-02T16:40:20Z",
|
||||
"updated_at": "2022-01-09T12:12:14Z",
|
||||
"pushed_at": "2021-12-14T13:43:35Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -979,7 +979,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1233,11 +1233,11 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2022-01-09T04:37:39Z",
|
||||
"updated_at": "2022-01-09T07:17:21Z",
|
||||
"pushed_at": "2022-01-07T06:07:32Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 52,
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1247,8 +1247,8 @@
|
|||
"log4jshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 167,
|
||||
"forks": 53,
|
||||
"watchers": 168,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1373,10 +1373,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2022-01-08T23:39:32Z",
|
||||
"updated_at": "2022-01-09T10:37:44Z",
|
||||
"pushed_at": "2022-01-05T02:28:40Z",
|
||||
"stargazers_count": 721,
|
||||
"watchers_count": 721,
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"forks_count": 145,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1393,7 +1393,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 145,
|
||||
"watchers": 721,
|
||||
"watchers": 723,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1885,10 +1885,10 @@
|
|||
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2022-01-07T23:58:36Z",
|
||||
"updated_at": "2022-01-09T11:43:58Z",
|
||||
"pushed_at": "2022-01-07T09:40:06Z",
|
||||
"stargazers_count": 562,
|
||||
"watchers_count": 562,
|
||||
"stargazers_count": 563,
|
||||
"watchers_count": 563,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1907,7 +1907,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"watchers": 562,
|
||||
"watchers": 563,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2929,17 +2929,17 @@
|
|||
"description": "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T16:49:45Z",
|
||||
"updated_at": "2022-01-09T02:23:31Z",
|
||||
"updated_at": "2022-01-09T06:27:11Z",
|
||||
"pushed_at": "2021-12-12T21:48:06Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3538,17 +3538,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-01-09T05:20:01Z",
|
||||
"updated_at": "2022-01-09T09:17:41Z",
|
||||
"pushed_at": "2022-01-02T20:21:42Z",
|
||||
"stargazers_count": 2541,
|
||||
"watchers_count": 2541,
|
||||
"forks_count": 603,
|
||||
"stargazers_count": 2542,
|
||||
"watchers_count": 2542,
|
||||
"forks_count": 604,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 603,
|
||||
"watchers": 2541,
|
||||
"forks": 604,
|
||||
"watchers": 2542,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3565,17 +3565,17 @@
|
|||
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T04:14:18Z",
|
||||
"updated_at": "2022-01-08T18:12:25Z",
|
||||
"updated_at": "2022-01-09T12:01:17Z",
|
||||
"pushed_at": "2022-01-05T20:33:01Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5416,7 +5416,7 @@
|
|||
"pushed_at": "2022-01-03T01:27:06Z",
|
||||
"stargazers_count": 376,
|
||||
"watchers_count": 376,
|
||||
"forks_count": 76,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -5430,7 +5430,7 @@
|
|||
"python"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"forks": 77,
|
||||
"watchers": 376,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -6715,17 +6715,17 @@
|
|||
"description": "Small example repo for looking into log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T19:59:38Z",
|
||||
"updated_at": "2022-01-02T14:56:03Z",
|
||||
"updated_at": "2022-01-09T12:12:43Z",
|
||||
"pushed_at": "2021-12-24T15:44:53Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6801,17 +6801,17 @@
|
|||
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T22:30:34Z",
|
||||
"updated_at": "2022-01-09T00:30:25Z",
|
||||
"updated_at": "2022-01-09T12:10:49Z",
|
||||
"pushed_at": "2022-01-09T00:30:22Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -10083,33 +10083,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 444948987,
|
||||
"name": "log4j-CVE-2021-44228",
|
||||
"full_name": "cryptoforcecommand\/log4j-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "cryptoforcecommand",
|
||||
"id": 97143513,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97143513?v=4",
|
||||
"html_url": "https:\/\/github.com\/cryptoforcecommand"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cryptoforcecommand\/log4j-CVE-2021-44228",
|
||||
"description": "latest developments and resources on log4j vulnerability CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T21:00:44Z",
|
||||
"updated_at": "2022-01-05T21:53:05Z",
|
||||
"pushed_at": "2022-01-08T06:29:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 444967250,
|
||||
"name": "Log4jHorizon",
|
||||
|
@ -10178,8 +10151,8 @@
|
|||
"description": "A vulnerable Java based REST API for demonstrating CVE-2021-44228 (log4shell).",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-08T06:45:44Z",
|
||||
"updated_at": "2022-01-08T06:45:48Z",
|
||||
"pushed_at": "2022-01-08T06:45:45Z",
|
||||
"updated_at": "2022-01-09T08:47:31Z",
|
||||
"pushed_at": "2022-01-09T08:47:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -232,17 +232,17 @@
|
|||
"description": "CVE-2021-45232-RCE-多线程批量漏洞检测",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T04:13:10Z",
|
||||
"updated_at": "2022-01-08T15:34:06Z",
|
||||
"updated_at": "2022-01-09T08:06:08Z",
|
||||
"pushed_at": "2022-01-06T04:12:02Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2500,6 +2500,14 @@ The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for Wor
|
|||
- [phrantom/cve-2021-38314](https://github.com/phrantom/cve-2021-38314)
|
||||
- [shubhayu-64/CVE-2021-38314](https://github.com/shubhayu-64/CVE-2021-38314)
|
||||
|
||||
### CVE-2021-38619 (2021-08-13)
|
||||
|
||||
<code>
|
||||
openBaraza HCM 3.1.6 does not properly neutralize user-controllable input: an unauthenticated remote attacker can conduct a stored cross-site scripting (XSS) attack against an administrative user from hr/subscription.jsp and hr/application.jsp and and hr/index.jsp (with view=).
|
||||
</code>
|
||||
|
||||
- [charlesbickel/CVE-2021-38619](https://github.com/charlesbickel/CVE-2021-38619)
|
||||
|
||||
### CVE-2021-38639 (2021-09-15)
|
||||
|
||||
<code>
|
||||
|
@ -3943,7 +3951,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [kanitan/log4j2-web-vulnerable](https://github.com/kanitan/log4j2-web-vulnerable)
|
||||
- [mr-r3b00t/CVE-2021-44228](https://github.com/mr-r3b00t/CVE-2021-44228)
|
||||
- [ChandanShastri/Log4j_Vulnerability_Demo](https://github.com/ChandanShastri/Log4j_Vulnerability_Demo)
|
||||
- [cryptoforcecommand/log4j-CVE-2021-44228](https://github.com/cryptoforcecommand/log4j-CVE-2021-44228)
|
||||
- [puzzlepeaches/Log4jHorizon](https://github.com/puzzlepeaches/Log4jHorizon)
|
||||
- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
|
||||
- [nix-xin/vuln4japi](https://github.com/nix-xin/vuln4japi)
|
||||
|
|
Loading…
Add table
Reference in a new issue