Auto Update 2022/01/09 12:13:49

This commit is contained in:
motikan2010-bot 2022-01-09 21:13:49 +09:00
parent 680b20bca2
commit 3df7cc6eb4
14 changed files with 133 additions and 124 deletions

View file

@ -44,12 +44,12 @@
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 100,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 100,
"forks": 101,
"watchers": 313,
"score": 0
}

View file

@ -44,12 +44,12 @@
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 100,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 100,
"forks": 101,
"watchers": 313,
"score": 0
}

View file

@ -206,12 +206,12 @@
"pushed_at": "2021-01-19T07:17:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 2,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2021-12-28T06:15:47Z",
"updated_at": "2022-01-09T07:47:35Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 166,
"watchers": 167,
"score": 0
},
{

View file

@ -148,10 +148,10 @@
"description": "Android privilege escalation via an use-after-free in binder.c",
"fork": false,
"created_at": "2020-02-17T11:53:54Z",
"updated_at": "2021-11-18T09:33:08Z",
"updated_at": "2022-01-09T07:14:56Z",
"pushed_at": "2020-04-14T07:04:15Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -160,7 +160,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 31,
"watchers": 30,
"score": 0
},
{

View file

@ -45,17 +45,17 @@
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-10T02:38:15Z",
"updated_at": "2022-01-06T21:46:16Z",
"updated_at": "2022-01-09T09:07:04Z",
"pushed_at": "2020-10-09T16:39:54Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
"fork": false,
"created_at": "2021-09-01T22:59:29Z",
"updated_at": "2022-01-08T15:49:01Z",
"updated_at": "2022-01-09T10:06:52Z",
"pushed_at": "2021-09-03T10:24:34Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 80,
"watchers": 79,
"score": 0
}
]

View file

@ -179,17 +179,17 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2022-01-07T09:33:18Z",
"updated_at": "2022-01-09T12:03:47Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 32,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 66,
"forks": 33,
"watchers": 67,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Dahua IPC\/VTH\/VTO devices auth bypass exploit",
"fork": false,
"created_at": "2021-10-18T16:02:41Z",
"updated_at": "2022-01-06T06:05:32Z",
"updated_at": "2022-01-09T11:24:12Z",
"pushed_at": "2021-10-18T16:09:44Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"watchers": 8,
"score": 0
}
]

29
2021/CVE-2021-38619.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 395501049,
"name": "CVE-2021-38619",
"full_name": "charlesbickel\/CVE-2021-38619",
"owner": {
"login": "charlesbickel",
"id": 6393058,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6393058?v=4",
"html_url": "https:\/\/github.com\/charlesbickel"
},
"html_url": "https:\/\/github.com\/charlesbickel\/CVE-2021-38619",
"description": null,
"fork": false,
"created_at": "2021-08-13T02:42:25Z",
"updated_at": "2021-08-14T12:17:15Z",
"pushed_at": "2021-08-13T13:40:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -49,12 +49,12 @@
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 35,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"forks": 36,
"watchers": 188,
"score": 0
},

View file

@ -121,10 +121,10 @@
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
"fork": false,
"created_at": "2021-12-10T06:15:38Z",
"updated_at": "2022-01-07T16:45:41Z",
"updated_at": "2022-01-09T07:50:37Z",
"pushed_at": "2021-12-16T01:33:48Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -139,7 +139,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 178,
"watchers": 179,
"score": 0
},
{
@ -858,10 +858,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-01-09T05:04:15Z",
"updated_at": "2022-01-09T11:23:04Z",
"pushed_at": "2021-12-31T11:47:19Z",
"stargazers_count": 588,
"watchers_count": 588,
"stargazers_count": 589,
"watchers_count": 589,
"forks_count": 88,
"allow_forking": true,
"is_template": false,
@ -888,7 +888,7 @@
],
"visibility": "public",
"forks": 88,
"watchers": 588,
"watchers": 589,
"score": 0
},
{
@ -905,11 +905,11 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-01-09T05:09:58Z",
"updated_at": "2022-01-09T10:03:46Z",
"pushed_at": "2022-01-02T07:12:10Z",
"stargazers_count": 1114,
"watchers_count": 1114,
"forks_count": 280,
"stargazers_count": 1116,
"watchers_count": 1116,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
"topics": [
@ -919,8 +919,8 @@
"security"
],
"visibility": "public",
"forks": 280,
"watchers": 1114,
"forks": 281,
"watchers": 1116,
"score": 0
},
{
@ -964,10 +964,10 @@
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
"fork": false,
"created_at": "2021-12-10T23:35:31Z",
"updated_at": "2022-01-02T16:40:20Z",
"updated_at": "2022-01-09T12:12:14Z",
"pushed_at": "2021-12-14T13:43:35Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -979,7 +979,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 69,
"watchers": 70,
"score": 0
},
{
@ -1233,11 +1233,11 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-01-09T04:37:39Z",
"updated_at": "2022-01-09T07:17:21Z",
"pushed_at": "2022-01-07T06:07:32Z",
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 52,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1247,8 +1247,8 @@
"log4jshell"
],
"visibility": "public",
"forks": 52,
"watchers": 167,
"forks": 53,
"watchers": 168,
"score": 0
},
{
@ -1373,10 +1373,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-01-08T23:39:32Z",
"updated_at": "2022-01-09T10:37:44Z",
"pushed_at": "2022-01-05T02:28:40Z",
"stargazers_count": 721,
"watchers_count": 721,
"stargazers_count": 723,
"watchers_count": 723,
"forks_count": 145,
"allow_forking": true,
"is_template": false,
@ -1393,7 +1393,7 @@
],
"visibility": "public",
"forks": 145,
"watchers": 721,
"watchers": 723,
"score": 0
},
{
@ -1885,10 +1885,10 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-01-07T23:58:36Z",
"updated_at": "2022-01-09T11:43:58Z",
"pushed_at": "2022-01-07T09:40:06Z",
"stargazers_count": 562,
"watchers_count": 562,
"stargazers_count": 563,
"watchers_count": 563,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -1907,7 +1907,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 562,
"watchers": 563,
"score": 0
},
{
@ -2929,17 +2929,17 @@
"description": "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-12T16:49:45Z",
"updated_at": "2022-01-09T02:23:31Z",
"updated_at": "2022-01-09T06:27:11Z",
"pushed_at": "2021-12-12T21:48:06Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -3538,17 +3538,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-09T05:20:01Z",
"updated_at": "2022-01-09T09:17:41Z",
"pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2541,
"watchers_count": 2541,
"forks_count": 603,
"stargazers_count": 2542,
"watchers_count": 2542,
"forks_count": 604,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 603,
"watchers": 2541,
"forks": 604,
"watchers": 2542,
"score": 0
},
{
@ -3565,17 +3565,17 @@
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T04:14:18Z",
"updated_at": "2022-01-08T18:12:25Z",
"updated_at": "2022-01-09T12:01:17Z",
"pushed_at": "2022-01-05T20:33:01Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 87,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 87,
"watchers": 248,
"watchers": 249,
"score": 0
},
{
@ -5416,7 +5416,7 @@
"pushed_at": "2022-01-03T01:27:06Z",
"stargazers_count": 376,
"watchers_count": 376,
"forks_count": 76,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
"topics": [
@ -5430,7 +5430,7 @@
"python"
],
"visibility": "public",
"forks": 76,
"forks": 77,
"watchers": 376,
"score": 0
},
@ -6715,17 +6715,17 @@
"description": "Small example repo for looking into log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-15T19:59:38Z",
"updated_at": "2022-01-02T14:56:03Z",
"updated_at": "2022-01-09T12:12:43Z",
"pushed_at": "2021-12-24T15:44:53Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 48,
"watchers": 49,
"score": 0
},
{
@ -6801,17 +6801,17 @@
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-15T22:30:34Z",
"updated_at": "2022-01-09T00:30:25Z",
"updated_at": "2022-01-09T12:10:49Z",
"pushed_at": "2022-01-09T00:30:22Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 51,
"watchers": 52,
"score": 0
},
{
@ -10083,33 +10083,6 @@
"watchers": 0,
"score": 0
},
{
"id": 444948987,
"name": "log4j-CVE-2021-44228",
"full_name": "cryptoforcecommand\/log4j-CVE-2021-44228",
"owner": {
"login": "cryptoforcecommand",
"id": 97143513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97143513?v=4",
"html_url": "https:\/\/github.com\/cryptoforcecommand"
},
"html_url": "https:\/\/github.com\/cryptoforcecommand\/log4j-CVE-2021-44228",
"description": "latest developments and resources on log4j vulnerability CVE-2021-44228",
"fork": false,
"created_at": "2022-01-05T21:00:44Z",
"updated_at": "2022-01-05T21:53:05Z",
"pushed_at": "2022-01-08T06:29:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 444967250,
"name": "Log4jHorizon",
@ -10178,8 +10151,8 @@
"description": "A vulnerable Java based REST API for demonstrating CVE-2021-44228 (log4shell).",
"fork": false,
"created_at": "2022-01-08T06:45:44Z",
"updated_at": "2022-01-08T06:45:48Z",
"pushed_at": "2022-01-08T06:45:45Z",
"updated_at": "2022-01-09T08:47:31Z",
"pushed_at": "2022-01-09T08:47:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -232,17 +232,17 @@
"description": "CVE-2021-45232-RCE-多线程批量漏洞检测",
"fork": false,
"created_at": "2022-01-05T04:13:10Z",
"updated_at": "2022-01-08T15:34:06Z",
"updated_at": "2022-01-09T08:06:08Z",
"pushed_at": "2022-01-06T04:12:02Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 25,
"watchers": 26,
"score": 0
},
{

View file

@ -2500,6 +2500,14 @@ The Gutenberg Template Library &amp; Redux Framework plugin &lt;= 4.2.11 for Wor
- [phrantom/cve-2021-38314](https://github.com/phrantom/cve-2021-38314)
- [shubhayu-64/CVE-2021-38314](https://github.com/shubhayu-64/CVE-2021-38314)
### CVE-2021-38619 (2021-08-13)
<code>
openBaraza HCM 3.1.6 does not properly neutralize user-controllable input: an unauthenticated remote attacker can conduct a stored cross-site scripting (XSS) attack against an administrative user from hr/subscription.jsp and hr/application.jsp and and hr/index.jsp (with view=).
</code>
- [charlesbickel/CVE-2021-38619](https://github.com/charlesbickel/CVE-2021-38619)
### CVE-2021-38639 (2021-09-15)
<code>
@ -3943,7 +3951,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [kanitan/log4j2-web-vulnerable](https://github.com/kanitan/log4j2-web-vulnerable)
- [mr-r3b00t/CVE-2021-44228](https://github.com/mr-r3b00t/CVE-2021-44228)
- [ChandanShastri/Log4j_Vulnerability_Demo](https://github.com/ChandanShastri/Log4j_Vulnerability_Demo)
- [cryptoforcecommand/log4j-CVE-2021-44228](https://github.com/cryptoforcecommand/log4j-CVE-2021-44228)
- [puzzlepeaches/Log4jHorizon](https://github.com/puzzlepeaches/Log4jHorizon)
- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
- [nix-xin/vuln4japi](https://github.com/nix-xin/vuln4japi)