Auto Update 2023/07/06 18:35:16

This commit is contained in:
motikan2010-bot 2023-07-07 03:35:16 +09:00
parent 136048ee24
commit 48f20c750d
74 changed files with 221 additions and 1748 deletions

View file

@ -777,6 +777,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
}
]

View file

@ -57,6 +57,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
}
]

View file

@ -35,6 +35,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
}
]

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ",
"fork": false,
"created_at": "2017-06-06T12:00:27Z",
"updated_at": "2023-04-08T22:51:25Z",
"updated_at": "2023-07-06T14:28:41Z",
"pushed_at": "2017-08-30T15:17:08Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 18
},

View file

@ -43,10 +43,10 @@
"description": "BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063",
"fork": false,
"created_at": "2018-01-24T16:03:22Z",
"updated_at": "2022-11-03T20:03:32Z",
"updated_at": "2023-07-06T14:16:26Z",
"pushed_at": "2020-04-17T14:38:14Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 3
}

View file

@ -754,7 +754,7 @@
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 318228897,

View file

@ -73,10 +73,10 @@
"description": "CVE-2017-12149 JBOSS RCE (TESTED) ",
"fork": false,
"created_at": "2017-12-22T07:30:29Z",
"updated_at": "2023-05-31T03:07:56Z",
"updated_at": "2023-07-06T17:48:03Z",
"pushed_at": "2017-12-23T06:43:16Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2023-06-12T13:44:53Z",
"updated_at": "2023-07-06T14:15:51Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 152,
"watchers": 153,
"score": 0,
"subscribers_count": 8
},
@ -212,6 +212,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
}
]

View file

@ -104,11 +104,11 @@
"fork": false,
"created_at": "2020-03-02T16:53:02Z",
"updated_at": "2023-05-23T08:11:39Z",
"pushed_at": "2023-07-05T22:46:43Z",
"pushed_at": "2023-07-06T13:45:21Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 7,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -129,7 +129,7 @@
"vagrant"
],
"visibility": "public",
"forks": 7,
"forks": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1

View file

@ -1888,10 +1888,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-07-05T10:09:25Z",
"updated_at": "2023-07-06T14:23:51Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1140,
"watchers_count": 1140,
"stargazers_count": 1141,
"watchers_count": 1141,
"has_discussions": false,
"forks_count": 354,
"allow_forking": true,
@ -1900,7 +1900,7 @@
"topics": [],
"visibility": "public",
"forks": 354,
"watchers": 1140,
"watchers": 1141,
"score": 0,
"subscribers_count": 69
},

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2023-06-15T12:24:38Z",
"updated_at": "2023-07-06T15:51:04Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 615,
"watchers_count": 615,
"stargazers_count": 616,
"watchers_count": 616,
"has_discussions": false,
"forks_count": 168,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 168,
"watchers": 615,
"watchers": 616,
"score": 0,
"subscribers_count": 13
},

View file

@ -1,38 +1,4 @@
[
{
"id": 446650428,
"name": "badblood",
"full_name": "jbaines-r7\/badblood",
"owner": {
"login": "jbaines-r7",
"id": 91965877,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
"html_url": "https:\/\/github.com\/jbaines-r7"
},
"html_url": "https:\/\/github.com\/jbaines-r7\/badblood",
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
"fork": false,
"created_at": "2022-01-11T02:25:25Z",
"updated_at": "2023-07-05T11:29:25Z",
"pushed_at": "2022-01-11T11:22:06Z",
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-20038",
"exploit",
"rce"
],
"visibility": "public",
"forks": 26,
"watchers": 89,
"score": 0,
"subscribers_count": 4
},
{
"id": 522394217,
"name": "CVE-2021-20038-SonicWall-RCE",

View file

@ -856,7 +856,7 @@
"stargazers_count": 964,
"watchers_count": 964,
"has_discussions": false,
"forks_count": 121,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -869,7 +869,7 @@
"vcenter"
],
"visibility": "public",
"forks": 121,
"forks": 123,
"watchers": 964,
"score": 0,
"subscribers_count": 10

View file

@ -299,36 +299,6 @@
"score": 0,
"subscribers_count": 5
},
{
"id": 444978473,
"name": "testanull-CVE-2021-22005.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:22:08Z",
"updated_at": "2023-04-08T20:15:10Z",
"pushed_at": "2022-01-05T23:22:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 505737586,
"name": "cve-2021-22005",

View file

@ -88,43 +88,5 @@
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 444302213,
"name": "GitLab-SSRF-CVE-2021-22214",
"full_name": "kh4sh3i\/GitLab-SSRF-CVE-2021-22214",
"owner": {
"login": "kh4sh3i",
"id": 64693844,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64693844?v=4",
"html_url": "https:\/\/github.com\/kh4sh3i"
},
"html_url": "https:\/\/github.com\/kh4sh3i\/GitLab-SSRF-CVE-2021-22214",
"description": "POC for CVE-2021-22214: Gitlab SSRF",
"fork": false,
"created_at": "2022-01-04T05:52:57Z",
"updated_at": "2022-12-15T07:44:49Z",
"pushed_at": "2022-01-04T12:10:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"git",
"gitlab",
"poc",
"ssrf",
"ssrf-payload",
"ssrf-tool"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 443710863,
"name": "CVE-2021-24307-all-in-one-seo-pack-admin-rce",
"full_name": "darkpills\/CVE-2021-24307-all-in-one-seo-pack-admin-rce",
"owner": {
"login": "darkpills",
"id": 209987,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209987?v=4",
"html_url": "https:\/\/github.com\/darkpills"
},
"html_url": "https:\/\/github.com\/darkpills\/CVE-2021-24307-all-in-one-seo-pack-admin-rce",
"description": null,
"fork": false,
"created_at": "2022-01-02T07:50:09Z",
"updated_at": "2022-09-16T22:23:18Z",
"pushed_at": "2022-01-02T08:27:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1083,36 +1083,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 447489190,
"name": "CVE-2021-26084",
"full_name": "antx-code\/CVE-2021-26084",
"owner": {
"login": "antx-code",
"id": 7877940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
"html_url": "https:\/\/github.com\/antx-code"
},
"html_url": "https:\/\/github.com\/antx-code\/CVE-2021-26084",
"description": "POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.",
"fork": false,
"created_at": "2022-01-13T06:29:51Z",
"updated_at": "2022-08-31T06:03:44Z",
"pushed_at": "2022-01-14T04:21:27Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 0
},
{
"id": 661577991,
"name": "CVE-2021-26084-EXP",

View file

@ -554,10 +554,10 @@
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
"fork": false,
"created_at": "2021-03-11T20:51:48Z",
"updated_at": "2023-06-02T14:48:38Z",
"updated_at": "2023-07-06T14:30:27Z",
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -566,7 +566,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 5
},
@ -1369,36 +1369,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 591884657,
"name": "Zirconium",
"full_name": "byinarie\/Zirconium",
"owner": {
"login": "byinarie",
"id": 20119926,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20119926?v=4",
"html_url": "https:\/\/github.com\/byinarie"
},
"html_url": "https:\/\/github.com\/byinarie\/Zirconium",
"description": "Tool to search for IOCs related to HAFNIUM: CVE-2021-26855 CVE-2021-26857 CVE-2021-26858 CVE-2021-27065",
"fork": false,
"created_at": "2023-01-22T07:59:10Z",
"updated_at": "2023-01-24T07:13:00Z",
"pushed_at": "2021-03-05T23:56:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 596567126,
"name": "Microsoft-Exchange-RCE",

View file

@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2023-06-11T15:46:19Z",
"updated_at": "2023-07-06T17:42:08Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": true,
"forks_count": 22,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 110,
"watchers": 111,
"score": 0,
"subscribers_count": 11
}

View file

@ -58,35 +58,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 444979391,
"name": "testanull-CVE-2021-28482.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-28482.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-28482.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:26:58Z",
"updated_at": "2023-04-08T20:15:02Z",
"pushed_at": "2022-01-05T23:27:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 444335154,
"name": "CVE-2021-28750-site",
"full_name": "PfalzPrince\/CVE-2021-28750-site",
"owner": {
"login": "PfalzPrince",
"id": 96906354,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96906354?v=4",
"html_url": "https:\/\/github.com\/PfalzPrince"
},
"html_url": "https:\/\/github.com\/PfalzPrince\/CVE-2021-28750-site",
"description": "PoC Site for tsunami-security-scanner-plugins. ",
"fork": false,
"created_at": "2022-01-04T08:05:03Z",
"updated_at": "2022-01-04T09:01:44Z",
"pushed_at": "2022-01-04T09:02:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 443862591,
"name": "CVE-2021-30853",
"full_name": "shubham0d\/CVE-2021-30853",
"owner": {
"login": "shubham0d",
"id": 12750163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
"html_url": "https:\/\/github.com\/shubham0d"
},
"html_url": "https:\/\/github.com\/shubham0d\/CVE-2021-30853",
"description": "A sample POC to test CVE-2021-30853",
"fork": false,
"created_at": "2022-01-02T20:24:11Z",
"updated_at": "2022-09-02T00:56:43Z",
"pushed_at": "2022-01-02T20:50:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 446889760,
"name": "CVE-2021-31956-EXP",
"full_name": "aazhuliang\/CVE-2021-31956-EXP",
"owner": {
"login": "aazhuliang",
"id": 48093339,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48093339?v=4",
"html_url": "https:\/\/github.com\/aazhuliang"
},
"html_url": "https:\/\/github.com\/aazhuliang\/CVE-2021-31956-EXP",
"description": null,
"fork": false,
"created_at": "2022-01-11T16:03:38Z",
"updated_at": "2023-03-28T18:22:16Z",
"pushed_at": "2022-01-11T16:52:16Z",
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 36,
"score": 0,
"subscribers_count": 4
},
{
"id": 531882270,
"name": "CVE-2021-31956",

View file

@ -1,64 +1,4 @@
[
{
"id": 446732690,
"name": "CVE-2021-32099",
"full_name": "zjicmDarkWing\/CVE-2021-32099",
"owner": {
"login": "zjicmDarkWing",
"id": 8244926,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8244926?v=4",
"html_url": "https:\/\/github.com\/zjicmDarkWing"
},
"html_url": "https:\/\/github.com\/zjicmDarkWing\/CVE-2021-32099",
"description": "Just for HTB",
"fork": false,
"created_at": "2022-01-11T08:14:06Z",
"updated_at": "2023-01-31T18:44:55Z",
"pushed_at": "2022-01-11T08:15:09Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 3
},
{
"id": 447197307,
"name": "CVE-2021-32099",
"full_name": "ibnuuby\/CVE-2021-32099",
"owner": {
"login": "ibnuuby",
"id": 28418984,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28418984?v=4",
"html_url": "https:\/\/github.com\/ibnuuby"
},
"html_url": "https:\/\/github.com\/ibnuuby\/CVE-2021-32099",
"description": "CVE-2021-32099",
"fork": false,
"created_at": "2022-01-12T11:48:34Z",
"updated_at": "2023-06-26T01:48:32Z",
"pushed_at": "2022-01-12T11:49:20Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 22,
"score": 0,
"subscribers_count": 2
},
{
"id": 450330045,
"name": "CVE-2021-32099_SQLi",

View file

@ -1,34 +1,4 @@
[
{
"id": 448021889,
"name": "CVE-2021-32648",
"full_name": "Immersive-Labs-Sec\/CVE-2021-32648",
"owner": {
"login": "Immersive-Labs-Sec",
"id": 79456607,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
"html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
},
"html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/CVE-2021-32648",
"description": "Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648",
"fork": false,
"created_at": "2022-01-14T15:50:11Z",
"updated_at": "2023-05-17T10:59:32Z",
"pushed_at": "2022-01-14T16:03:50Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"score": 0,
"subscribers_count": 0
},
{
"id": 450032325,
"name": "CVE-2021-32648",

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2023-06-29T06:07:14Z",
"updated_at": "2023-07-06T17:04:04Z",
"pushed_at": "2022-06-02T17:56:26Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 271,
"watchers_count": 271,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 270,
"watchers": 271,
"score": 0,
"subscribers_count": 8
},

View file

@ -58,35 +58,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 447857478,
"name": "CVE-2021-35211",
"full_name": "BishopFox\/CVE-2021-35211",
"owner": {
"login": "BishopFox",
"id": 4523757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
"html_url": "https:\/\/github.com\/BishopFox"
},
"html_url": "https:\/\/github.com\/BishopFox\/CVE-2021-35211",
"description": null,
"fork": false,
"created_at": "2022-01-14T05:52:17Z",
"updated_at": "2023-06-05T13:02:53Z",
"pushed_at": "2022-01-14T05:56:09Z",
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 28,
"score": 0,
"subscribers_count": 4
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 446554914,
"name": "CVE-2021-39623",
"full_name": "marcinguy\/CVE-2021-39623",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/CVE-2021-39623",
"description": null,
"fork": false,
"created_at": "2022-01-10T19:25:28Z",
"updated_at": "2023-02-08T01:49:39Z",
"pushed_at": "2022-01-11T09:05:45Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 15,
"score": 0,
"subscribers_count": 8
}
]

View file

@ -28,35 +28,5 @@
"watchers": 19,
"score": 0,
"subscribers_count": 3
},
{
"id": 446349513,
"name": "log4j",
"full_name": "open-AIMS\/log4j",
"owner": {
"login": "open-AIMS",
"id": 68976138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68976138?v=4",
"html_url": "https:\/\/github.com\/open-AIMS"
},
"html_url": "https:\/\/github.com\/open-AIMS\/log4j",
"description": "Log4j version 1.2.17 without the offending class responsible for CVE-2021-4104.",
"fork": false,
"created_at": "2022-01-10T09:01:46Z",
"updated_at": "2022-01-11T02:43:30Z",
"pushed_at": "2022-01-13T03:57:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 4
}
]

View file

@ -280,36 +280,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 446249616,
"name": "CVE-2021-41277_SSRF",
"full_name": "sasukeourad\/CVE-2021-41277_SSRF",
"owner": {
"login": "sasukeourad",
"id": 11887583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11887583?v=4",
"html_url": "https:\/\/github.com\/sasukeourad"
},
"html_url": "https:\/\/github.com\/sasukeourad\/CVE-2021-41277_SSRF",
"description": "CVE-2021-41277 can be extended to an SSRF ",
"fork": false,
"created_at": "2022-01-10T01:52:10Z",
"updated_at": "2023-02-07T11:44:35Z",
"pushed_at": "2022-01-10T02:36:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 449795168,
"name": "Metabase_Nmap_Script",

View file

@ -1,38 +1,4 @@
[
{
"id": 445117173,
"name": "CVE-2021-41349",
"full_name": "exploit-io\/CVE-2021-41349",
"owner": {
"login": "exploit-io",
"id": 71645666,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71645666?v=4",
"html_url": "https:\/\/github.com\/exploit-io"
},
"html_url": "https:\/\/github.com\/exploit-io\/CVE-2021-41349",
"description": "Exploiting: CVE-2021-41349",
"fork": false,
"created_at": "2022-01-06T09:44:15Z",
"updated_at": "2023-04-20T17:12:10Z",
"pushed_at": "2022-01-06T10:57:17Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-41349",
"microsoft-exchange",
"vulnerability"
],
"visibility": "public",
"forks": 5,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 519490745,
"name": "CVE-2021-41349",

View file

@ -2282,36 +2282,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
"updated_at": "2022-01-12T18:26:57Z",
"pushed_at": "2022-01-13T16:18:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",

View file

@ -309,36 +309,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 445382835,
"name": "CVE-2021-42013",
"full_name": "rnsss\/CVE-2021-42013",
"owner": {
"login": "rnsss",
"id": 48343279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4",
"html_url": "https:\/\/github.com\/rnsss"
},
"html_url": "https:\/\/github.com\/rnsss\/CVE-2021-42013",
"description": "CVE-2021-42013-exp",
"fork": false,
"created_at": "2022-01-07T03:12:45Z",
"updated_at": "2022-01-07T03:12:50Z",
"pushed_at": "2022-01-07T03:12:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 455174932,
"name": "CVE-2021-42013-LAB",

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 444977303,
"name": "testanull-CVE-2021-42321_poc.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:15:55Z",
"updated_at": "2023-04-08T20:14:09Z",
"pushed_at": "2022-01-05T23:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 535520694,
"name": "cve-2021-42321",

View file

@ -28,35 +28,5 @@
"watchers": 21,
"score": 0,
"subscribers_count": 2
},
{
"id": 444456600,
"name": "CVE-2021-42342",
"full_name": "Mr-xn\/CVE-2021-42342",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-42342",
"description": "CVE-2021-42342 RCE",
"fork": false,
"created_at": "2022-01-04T14:48:59Z",
"updated_at": "2023-03-28T13:34:20Z",
"pushed_at": "2022-01-04T14:54:39Z",
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 41,
"score": 0,
"subscribers_count": 4
}
]

View file

@ -707,96 +707,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 445007761,
"name": "CVE-2021-43798",
"full_name": "light-Life\/CVE-2021-43798",
"owner": {
"login": "light-Life",
"id": 53685855,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53685855?v=4",
"html_url": "https:\/\/github.com\/light-Life"
},
"html_url": "https:\/\/github.com\/light-Life\/CVE-2021-43798",
"description": "运用golang写的grafana批量验证脚本内置48个验证",
"fork": false,
"created_at": "2022-01-06T01:54:26Z",
"updated_at": "2022-08-15T15:41:35Z",
"pushed_at": "2022-01-11T08:12:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 445112055,
"name": "CVE-2021-43798-poc",
"full_name": "rnsss\/CVE-2021-43798-poc",
"owner": {
"login": "rnsss",
"id": 48343279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4",
"html_url": "https:\/\/github.com\/rnsss"
},
"html_url": "https:\/\/github.com\/rnsss\/CVE-2021-43798-poc",
"description": "Grafana8.x 任意文件读取",
"fork": false,
"created_at": "2022-01-06T09:25:35Z",
"updated_at": "2022-01-07T03:09:48Z",
"pushed_at": "2022-01-07T03:09:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 445709435,
"name": "CVE-2021-43798-mass_scanner",
"full_name": "rodpwn\/CVE-2021-43798-mass_scanner",
"owner": {
"login": "rodpwn",
"id": 95486831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95486831?v=4",
"html_url": "https:\/\/github.com\/rodpwn"
},
"html_url": "https:\/\/github.com\/rodpwn\/CVE-2021-43798-mass_scanner",
"description": null,
"fork": false,
"created_at": "2022-01-08T02:58:18Z",
"updated_at": "2022-07-14T10:43:16Z",
"pushed_at": "2022-01-11T01:28:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 449447091,
"name": "CVE-2021-43798_exploit",
@ -887,66 +797,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 475197658,
"name": "CVE-2021-43798-Grafana-File-Read",
"full_name": "BJLIYANLIANG\/CVE-2021-43798-Grafana-File-Read",
"owner": {
"login": "BJLIYANLIANG",
"id": 34064679,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34064679?v=4",
"html_url": "https:\/\/github.com\/BJLIYANLIANG"
},
"html_url": "https:\/\/github.com\/BJLIYANLIANG\/CVE-2021-43798-Grafana-File-Read",
"description": null,
"fork": false,
"created_at": "2022-03-28T22:23:34Z",
"updated_at": "2022-03-04T03:10:30Z",
"pushed_at": "2021-12-11T08:35:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 499301850,
"name": "CVE-2021-43798",
"full_name": "lalkaltest\/CVE-2021-43798",
"owner": {
"login": "lalkaltest",
"id": 23642499,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23642499?v=4",
"html_url": "https:\/\/github.com\/lalkaltest"
},
"html_url": "https:\/\/github.com\/lalkaltest\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2022-06-02T21:55:28Z",
"updated_at": "2022-12-15T10:25:38Z",
"pushed_at": "2021-12-09T12:34:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 547929236,
"name": "CVE-2021-43798",

View file

@ -1,34 +1,4 @@
[
{
"id": 444133204,
"name": "CVE-2021-43857",
"full_name": "LongWayHomie\/CVE-2021-43857",
"owner": {
"login": "LongWayHomie",
"id": 63229183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
"html_url": "https:\/\/github.com\/LongWayHomie"
},
"html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43857",
"description": "Gerapy prior to version 0.9.8 is vulnerable to remote code execution. This issue is patched in version 0.9.8.",
"fork": false,
"created_at": "2022-01-03T16:47:42Z",
"updated_at": "2023-03-29T02:26:23Z",
"pushed_at": "2022-01-03T16:53:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 485594121,
"name": "CVE-2021-43857",

View file

@ -1,34 +1,4 @@
[
{
"id": 444140549,
"name": "cve-2021-43858",
"full_name": "0rx1\/cve-2021-43858",
"owner": {
"login": "0rx1",
"id": 12779060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
"html_url": "https:\/\/github.com\/0rx1"
},
"html_url": "https:\/\/github.com\/0rx1\/cve-2021-43858",
"description": null,
"fork": false,
"created_at": "2022-01-03T17:11:54Z",
"updated_at": "2022-06-10T03:20:10Z",
"pushed_at": "2022-01-03T14:15:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 626802613,
"name": "CVE-2021-43858-MinIO",

View file

@ -3703,19 +3703,19 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-07-06T07:01:15Z",
"updated_at": "2023-07-06T15:15:46Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3264,
"watchers_count": 3264,
"stargazers_count": 3265,
"watchers_count": 3265,
"has_discussions": true,
"forks_count": 743,
"forks_count": 744,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 743,
"watchers": 3264,
"forks": 744,
"watchers": 3265,
"score": 0,
"subscribers_count": 60
},
@ -10446,69 +10446,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 443563564,
"name": "-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"full_name": "marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"owner": {
"login": "marklindsey11",
"id": 81498475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
"html_url": "https:\/\/github.com\/marklindsey11"
},
"html_url": "https:\/\/github.com\/marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"description": "Log4j Vulnerability Scanner",
"fork": false,
"created_at": "2022-01-01T15:13:22Z",
"updated_at": "2023-03-07T19:39:44Z",
"pushed_at": "2022-01-01T15:31:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": true,
"web_commit_signoff_required": false,
"topics": [
"hunting",
"threat"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 443614046,
"name": "gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
"full_name": "marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
"owner": {
"login": "marklindsey11",
"id": 81498475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
"html_url": "https:\/\/github.com\/marklindsey11"
},
"html_url": "https:\/\/github.com\/marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
"description": "Log4j-Scanner",
"fork": false,
"created_at": "2022-01-01T20:01:01Z",
"updated_at": "2022-01-01T20:01:06Z",
"pushed_at": "2022-01-01T20:01:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 443941194,
"name": "log4j2-test",
@ -10602,126 +10539,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 444719044,
"name": "log4j2-web-vulnerable",
"full_name": "kanitan\/log4j2-web-vulnerable",
"owner": {
"login": "kanitan",
"id": 26276619,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26276619?v=4",
"html_url": "https:\/\/github.com\/kanitan"
},
"html_url": "https:\/\/github.com\/kanitan\/log4j2-web-vulnerable",
"description": "A vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test.",
"fork": false,
"created_at": "2022-01-05T08:13:32Z",
"updated_at": "2022-01-05T09:11:45Z",
"pushed_at": "2022-01-05T09:11:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 444777926,
"name": "CVE-2021-44228",
"full_name": "mr-r3b00t\/CVE-2021-44228",
"owner": {
"login": "mr-r3b00t",
"id": 14963690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
"html_url": "https:\/\/github.com\/mr-r3b00t"
},
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-44228",
"description": "Backdoor detection for VMware view",
"fork": false,
"created_at": "2022-01-05T11:27:16Z",
"updated_at": "2022-11-09T18:14:59Z",
"pushed_at": "2022-01-05T12:37:39Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 12,
"score": 0,
"subscribers_count": 4
},
{
"id": 444852717,
"name": "Log4j_Vulnerability_Demo",
"full_name": "ChandanShastri\/Log4j_Vulnerability_Demo",
"owner": {
"login": "ChandanShastri",
"id": 25263964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25263964?v=4",
"html_url": "https:\/\/github.com\/ChandanShastri"
},
"html_url": "https:\/\/github.com\/ChandanShastri\/Log4j_Vulnerability_Demo",
"description": "A simple program to demonstrate how Log4j vulnerability can be exploited ( CVE-2021-44228 ) ",
"fork": false,
"created_at": "2022-01-05T15:24:20Z",
"updated_at": "2023-03-04T10:10:26Z",
"pushed_at": "2022-01-12T04:36:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 444967250,
"name": "Log4jHorizon",
"full_name": "puzzlepeaches\/Log4jHorizon",
"owner": {
"login": "puzzlepeaches",
"id": 8538866,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
"html_url": "https:\/\/github.com\/puzzlepeaches"
},
"html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jHorizon",
"description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.",
"fork": false,
"created_at": "2022-01-05T22:25:42Z",
"updated_at": "2023-06-02T15:24:47Z",
"pushed_at": "2022-01-10T19:26:59Z",
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 106,
"score": 0,
"subscribers_count": 5
},
{
"id": 445474259,
"name": "log4jshell_CVE-2021-44228",
@ -10782,186 +10599,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 445745731,
"name": "vuln4japi",
"full_name": "nix-xin\/vuln4japi",
"owner": {
"login": "nix-xin",
"id": 9593989,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9593989?v=4",
"html_url": "https:\/\/github.com\/nix-xin"
},
"html_url": "https:\/\/github.com\/nix-xin\/vuln4japi",
"description": "A vulnerable Java based REST API for demonstrating CVE-2021-44228 (log4shell).",
"fork": false,
"created_at": "2022-01-08T06:45:44Z",
"updated_at": "2022-01-10T08:20:25Z",
"pushed_at": "2022-01-10T08:20:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 446098711,
"name": "CVE-2021-44228",
"full_name": "maximofernandezriera\/CVE-2021-44228",
"owner": {
"login": "maximofernandezriera",
"id": 43608040,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43608040?v=4",
"html_url": "https:\/\/github.com\/maximofernandezriera"
},
"html_url": "https:\/\/github.com\/maximofernandezriera\/CVE-2021-44228",
"description": "This Log4j RCE exploit originated from https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce",
"fork": false,
"created_at": "2022-01-09T13:38:38Z",
"updated_at": "2022-01-30T06:01:01Z",
"pushed_at": "2022-01-09T13:43:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 447404470,
"name": "log4shell",
"full_name": "jxerome\/log4shell",
"owner": {
"login": "jxerome",
"id": 1355634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4",
"html_url": "https:\/\/github.com\/jxerome"
},
"html_url": "https:\/\/github.com\/jxerome\/log4shell",
"description": "Démo du fonctionnement de log4shell (CVE-2021-44228)",
"fork": false,
"created_at": "2022-01-12T23:44:20Z",
"updated_at": "2022-01-12T23:59:13Z",
"pushed_at": "2022-01-14T14:03:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 447615580,
"name": "Log4j-CVE-2021-44228",
"full_name": "solitarysp\/Log4j-CVE-2021-44228",
"owner": {
"login": "solitarysp",
"id": 20993683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20993683?v=4",
"html_url": "https:\/\/github.com\/solitarysp"
},
"html_url": "https:\/\/github.com\/solitarysp\/Log4j-CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2022-01-13T13:46:12Z",
"updated_at": "2022-01-13T13:46:52Z",
"pushed_at": "2022-01-13T14:43:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 447682859,
"name": "log4j-exploit-builder",
"full_name": "atlassion\/log4j-exploit-builder",
"owner": {
"login": "atlassion",
"id": 49542929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49542929?v=4",
"html_url": "https:\/\/github.com\/atlassion"
},
"html_url": "https:\/\/github.com\/atlassion\/log4j-exploit-builder",
"description": "Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell",
"fork": false,
"created_at": "2022-01-13T17:03:54Z",
"updated_at": "2022-06-30T18:53:34Z",
"pushed_at": "2021-12-29T18:34:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 447683203,
"name": "RS4LOGJ-CVE-2021-44228",
"full_name": "atlassion\/RS4LOGJ-CVE-2021-44228",
"owner": {
"login": "atlassion",
"id": 49542929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49542929?v=4",
"html_url": "https:\/\/github.com\/atlassion"
},
"html_url": "https:\/\/github.com\/atlassion\/RS4LOGJ-CVE-2021-44228",
"description": "Fix: CVE-2021-44228 4LOGJ",
"fork": false,
"created_at": "2022-01-13T17:04:52Z",
"updated_at": "2022-01-19T12:29:27Z",
"pushed_at": "2021-12-28T13:50:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 447754863,
"name": "log4j_github_repository",
@ -11665,36 +11302,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 494502983,
"name": "log4j",
"full_name": "hassaanahmad813\/log4j",
"owner": {
"login": "hassaanahmad813",
"id": 77528817,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77528817?v=4",
"html_url": "https:\/\/github.com\/hassaanahmad813"
},
"html_url": "https:\/\/github.com\/hassaanahmad813\/log4j",
"description": "CVE-2021-44228 vulnerability in Apache Log4j library",
"fork": false,
"created_at": "2022-05-20T14:48:29Z",
"updated_at": "2023-04-10T12:51:15Z",
"pushed_at": "2021-12-17T08:49:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 496048138,
"name": "CVE-2021-44228-Apache-Log4j-Rce",

View file

@ -305,35 +305,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 447444851,
"name": "log4j-poc",
"full_name": "taise-hub\/log4j-poc",
"owner": {
"login": "taise-hub",
"id": 59153204,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59153204?v=4",
"html_url": "https:\/\/github.com\/taise-hub"
},
"html_url": "https:\/\/github.com\/taise-hub\/log4j-poc",
"description": "Explanation of CVE-2021-45046 for classroom use",
"fork": false,
"created_at": "2022-01-13T03:02:47Z",
"updated_at": "2022-01-13T03:09:10Z",
"pushed_at": "2022-01-13T03:15:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -212,66 +212,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 443609406,
"name": "-cve-2021-45232",
"full_name": "itxfahdi\/-cve-2021-45232",
"owner": {
"login": "itxfahdi",
"id": 67527602,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67527602?v=4",
"html_url": "https:\/\/github.com\/itxfahdi"
},
"html_url": "https:\/\/github.com\/itxfahdi\/-cve-2021-45232",
"description": "The vulnerability affects Apache APISIX Dashboard version 2.10.1",
"fork": false,
"created_at": "2022-01-01T19:31:13Z",
"updated_at": "2022-01-01T20:22:16Z",
"pushed_at": "2022-01-01T20:22:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 444659919,
"name": "CVE-2021-45232-RCE",
"full_name": "GYLQ\/CVE-2021-45232-RCE",
"owner": {
"login": "GYLQ",
"id": 15842234,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15842234?v=4",
"html_url": "https:\/\/github.com\/GYLQ"
},
"html_url": "https:\/\/github.com\/GYLQ\/CVE-2021-45232-RCE",
"description": "CVE-2021-45232-RCE-多线程批量漏洞检测",
"fork": false,
"created_at": "2022-01-05T04:13:10Z",
"updated_at": "2023-05-20T08:08:09Z",
"pushed_at": "2022-01-13T05:12:49Z",
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 36,
"score": 0,
"subscribers_count": 0
},
{
"id": 444735399,
"name": "CVE-2021-45232-RCE",
@ -302,66 +242,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 445756387,
"name": "Demo",
"full_name": "yggcwhat\/Demo",
"owner": {
"login": "yggcwhat",
"id": 91769835,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91769835?v=4",
"html_url": "https:\/\/github.com\/yggcwhat"
},
"html_url": "https:\/\/github.com\/yggcwhat\/Demo",
"description": "CVE-2021-45232批量一键检测",
"fork": false,
"created_at": "2022-01-08T07:42:43Z",
"updated_at": "2022-01-08T07:42:43Z",
"pushed_at": "2022-01-08T07:42:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 445762780,
"name": "CVE-2021-45232",
"full_name": "yggcwhat\/CVE-2021-45232",
"owner": {
"login": "yggcwhat",
"id": 91769835,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91769835?v=4",
"html_url": "https:\/\/github.com\/yggcwhat"
},
"html_url": "https:\/\/github.com\/yggcwhat\/CVE-2021-45232",
"description": "一键批量检测poc",
"fork": false,
"created_at": "2022-01-08T08:16:06Z",
"updated_at": "2022-01-08T08:28:20Z",
"pushed_at": "2022-01-08T08:27:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 490272524,
"name": "Apisix_Crack",

View file

@ -28,35 +28,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448017630,
"name": "CVE-2021-45744",
"full_name": "plsanu\/CVE-2021-45744",
"owner": {
"login": "plsanu",
"id": 61007700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
"html_url": "https:\/\/github.com\/plsanu"
},
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-45744",
"description": "CVE-2021-45744 - A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
"fork": false,
"created_at": "2022-01-14T15:36:21Z",
"updated_at": "2022-01-14T18:37:56Z",
"pushed_at": "2022-01-14T16:00:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,35 +28,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448040948,
"name": "CVE-2021-45745",
"full_name": "plsanu\/CVE-2021-45745",
"owner": {
"login": "plsanu",
"id": 61007700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
"html_url": "https:\/\/github.com\/plsanu"
},
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-45745",
"description": "CVE-2021-45745 - A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
"fork": false,
"created_at": "2022-01-14T16:52:08Z",
"updated_at": "2022-01-14T18:37:18Z",
"pushed_at": "2022-01-14T16:52:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,35 +28,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448068658,
"name": "CVE-2021-46069",
"full_name": "plsanu\/CVE-2021-46069",
"owner": {
"login": "plsanu",
"id": 61007700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
"html_url": "https:\/\/github.com\/plsanu"
},
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46069",
"description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
"fork": false,
"created_at": "2022-01-14T18:27:00Z",
"updated_at": "2022-01-14T18:29:45Z",
"pushed_at": "2022-01-14T18:27:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1215,7 +1215,7 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-07-06T12:17:04Z",
"updated_at": "2023-07-06T15:27:43Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 423,
"watchers_count": 423,

View file

@ -380,10 +380,10 @@
"description": "Exploit and Check Script for CVE 2022-1388",
"fork": false,
"created_at": "2022-05-09T11:30:09Z",
"updated_at": "2023-05-05T17:30:07Z",
"updated_at": "2023-07-06T16:09:35Z",
"pushed_at": "2022-05-26T23:51:01Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -392,7 +392,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 3
},

View file

@ -771,7 +771,7 @@
"stargazers_count": 964,
"watchers_count": 964,
"has_discussions": false,
"forks_count": 121,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -784,7 +784,7 @@
"vcenter"
],
"visibility": "public",
"forks": 121,
"forks": 123,
"watchers": 964,
"score": 0,
"subscribers_count": 10

View file

@ -13,10 +13,10 @@
"description": "Bypassing Linux Executable Space Protection using 20+ years old tools (CVE-2022-25265).",
"fork": false,
"created_at": "2022-02-16T12:42:24Z",
"updated_at": "2023-06-09T11:26:28Z",
"updated_at": "2023-07-06T17:44:56Z",
"pushed_at": "2022-02-19T18:06:01Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}

View file

@ -138,10 +138,10 @@
"description": "Zimbra CVE-2022-27925 PoC",
"fork": false,
"created_at": "2022-08-20T15:58:29Z",
"updated_at": "2023-06-17T13:10:04Z",
"updated_at": "2023-07-06T17:16:54Z",
"pushed_at": "2022-08-27T20:30:21Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -156,7 +156,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2022-37042 Zimbra Auth Bypass leads to RCE",
"fork": false,
"created_at": "2022-10-24T10:10:45Z",
"updated_at": "2023-04-11T17:05:00Z",
"updated_at": "2023-07-06T14:48:36Z",
"pushed_at": "2022-12-09T02:45:14Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 2
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"unisoc"
],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 30,
"score": 0,
"subscribers_count": 4

View file

@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2023-07-06T05:30:29Z",
"updated_at": "2023-07-06T16:59:11Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 48,
"watchers": 265,
"watchers": 266,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "Zimbra <9.0.0.p27 RCE",
"fork": false,
"created_at": "2022-11-11T20:58:08Z",
"updated_at": "2023-04-26T06:38:33Z",
"updated_at": "2023-07-06T15:10:30Z",
"pushed_at": "2022-11-24T14:59:35Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -62,7 +62,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 2
},

View file

@ -280,10 +280,10 @@
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
"fork": false,
"created_at": "2022-10-19T11:49:08Z",
"updated_at": "2023-06-15T00:24:08Z",
"updated_at": "2023-07-06T15:13:57Z",
"pushed_at": "2023-01-21T01:52:51Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -304,7 +304,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-43684",
"fork": false,
"created_at": "2023-07-05T20:53:42Z",
"updated_at": "2023-07-06T12:27:31Z",
"updated_at": "2023-07-06T18:25:56Z",
"pushed_at": "2023-07-05T21:00:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Nexxt Router 15.03.06.60 Authentication Bypass and Remote Command Execution",
"fork": false,
"created_at": "2023-07-04T08:31:04Z",
"updated_at": "2023-07-04T08:31:42Z",
"updated_at": "2023-07-06T15:44:25Z",
"pushed_at": "2023-07-04T08:31:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

32
2022/CVE-2022-4611.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 663142991,
"name": "CVE-2022-4611",
"full_name": "Phamchie\/CVE-2022-4611",
"owner": {
"login": "Phamchie",
"id": 97181079,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97181079?v=4",
"html_url": "https:\/\/github.com\/Phamchie"
},
"html_url": "https:\/\/github.com\/Phamchie\/CVE-2022-4611",
"description": null,
"fork": false,
"created_at": "2023-07-06T16:40:08Z",
"updated_at": "2023-07-06T16:55:52Z",
"pushed_at": "2023-07-06T16:50:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-06-28T08:20:52Z",
"updated_at": "2023-07-06T14:26:39Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 356,
"watchers_count": 356,
"stargazers_count": 357,
"watchers_count": 357,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 356,
"watchers": 357,
"score": 0,
"subscribers_count": 11
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.",
"fork": false,
"created_at": "2023-07-04T00:29:56Z",
"updated_at": "2023-07-04T00:54:22Z",
"updated_at": "2023-07-06T17:07:06Z",
"pushed_at": "2023-07-04T00:40:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "POC for CVE-2023-24488",
"fork": false,
"created_at": "2023-07-04T18:02:50Z",
"updated_at": "2023-07-05T03:20:04Z",
"updated_at": "2023-07-06T15:44:39Z",
"pushed_at": "2023-07-04T18:39:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -103,10 +103,10 @@
"description": "CVE-2023-24488 By codeb0ss",
"fork": false,
"created_at": "2023-07-06T03:07:09Z",
"updated_at": "2023-07-06T03:07:09Z",
"updated_at": "2023-07-06T18:25:10Z",
"pushed_at": "2023-07-06T03:07:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -115,7 +115,37 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 663114176,
"name": "CVE-2023-24488-SIEM-Sigma-Rule",
"full_name": "NSTCyber\/CVE-2023-24488-SIEM-Sigma-Rule",
"owner": {
"login": "NSTCyber",
"id": 128680605,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128680605?v=4",
"html_url": "https:\/\/github.com\/NSTCyber"
},
"html_url": "https:\/\/github.com\/NSTCyber\/CVE-2023-24488-SIEM-Sigma-Rule",
"description": "Detect CVE-2023-24488 Exploitation Attempts",
"fork": false,
"created_at": "2023-07-06T15:23:45Z",
"updated_at": "2023-07-06T18:24:56Z",
"pushed_at": "2023-07-06T16:32:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2023-07-04T08:55:49Z",
"updated_at": "2023-07-06T15:32:57Z",
"pushed_at": "2023-06-03T19:35:51Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 137,
"watchers": 138,
"score": 0,
"subscribers_count": 2
}

View file

@ -103,10 +103,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2023-07-06T07:02:22Z",
"updated_at": "2023-07-06T16:59:54Z",
"pushed_at": "2023-06-20T21:32:56Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-28343",
"fork": false,
"created_at": "2023-07-03T11:48:21Z",
"updated_at": "2023-07-03T11:51:04Z",
"updated_at": "2023-07-06T15:42:44Z",
"pushed_at": "2023-07-03T11:50:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-06-07T07:51:59Z",
"updated_at": "2023-06-07T07:51:59Z",
"pushed_at": "2023-07-06T14:11:03Z",
"pushed_at": "2023-07-06T14:21:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -18,7 +18,7 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -78,7 +78,7 @@
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 24,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -88,7 +88,7 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 24,
"forks": 23,
"watchers": 59,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-07-06T14:10:38Z",
"updated_at": "2023-07-06T18:25:00Z",
"pushed_at": "2023-07-06T09:10:11Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 66,
"watchers": 83,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-34312",
"fork": false,
"created_at": "2023-05-27T12:44:42Z",
"updated_at": "2023-07-06T03:18:24Z",
"updated_at": "2023-07-06T16:59:44Z",
"pushed_at": "2023-05-27T12:45:10Z",
"stargazers_count": 377,
"watchers_count": 377,
"stargazers_count": 378,
"watchers_count": 378,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 377,
"watchers": 378,
"score": 0,
"subscribers_count": 3
}

View file

@ -103,19 +103,19 @@
"description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
"fork": false,
"created_at": "2023-06-12T12:56:12Z",
"updated_at": "2023-06-29T13:01:21Z",
"updated_at": "2023-07-06T15:17:31Z",
"pushed_at": "2023-06-13T08:46:03Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 56,
"forks": 22,
"watchers": 57,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-06-23T11:51:46Z",
"updated_at": "2023-07-05T07:00:14Z",
"updated_at": "2023-07-06T15:30:48Z",
"pushed_at": "2023-07-05T07:02:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -808,6 +808,7 @@
- [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488)
- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
- [codeb0ss/cve-2023-24488](https://github.com/codeb0ss/cve-2023-24488)
- [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
### CVE-2023-24610 (2023-02-01)
@ -2920,6 +2921,13 @@
- [adhikara13/CVE-2022-4510-WalkingPath](https://github.com/adhikara13/CVE-2022-4510-WalkingPath)
- [hheeyywweellccoommee/CVE-2022-4510-yjrvc](https://github.com/hheeyywweellccoommee/CVE-2022-4510-yjrvc)
### CVE-2022-4611 (2022-12-19)
<code>Es wurde eine problematische Schwachstelle in Click Studios Passwordstate and Passwordstate Browser Extension Chrome gefunden. Dabei betrifft es einen unbekannter Codeteil. Mit der Manipulation mit unbekannten Daten kann eine hard-coded credentials-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
</code>
- [Phamchie/CVE-2022-4611](https://github.com/Phamchie/CVE-2022-4611)
### CVE-2022-4616 (2023-01-12)
<code>The webserver in Delta DX-3021 versions prior to 1.24 is vulnerable to command injection through the network diagnosis page. This vulnerability could allow a remote unauthenticated user to add files, delete files, and change file permissions.
@ -9225,7 +9233,6 @@
</code>
- [cckuailong/log4shell_1.x](https://github.com/cckuailong/log4shell_1.x)
- [open-AIMS/log4j](https://github.com/open-AIMS/log4j)
### CVE-2021-4154 (2022-02-04)
@ -9266,7 +9273,6 @@
<code>A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
</code>
- [jbaines-r7/badblood](https://github.com/jbaines-r7/badblood)
- [vesperp/CVE-2021-20038-SonicWall-RCE](https://github.com/vesperp/CVE-2021-20038-SonicWall-RCE)
### CVE-2021-20138 (2021-12-09)
@ -9630,7 +9636,6 @@
- [TiagoSergio/CVE-2021-22005](https://github.com/TiagoSergio/CVE-2021-22005)
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
### CVE-2021-22006 (2021-09-23)
@ -9762,7 +9767,6 @@
- [aaminin/CVE-2021-22214](https://github.com/aaminin/CVE-2021-22214)
- [Vulnmachines/gitlab-cve-2021-22214](https://github.com/Vulnmachines/gitlab-cve-2021-22214)
- [antx-code/CVE-2021-22214](https://github.com/antx-code/CVE-2021-22214)
- [kh4sh3i/GitLab-SSRF-CVE-2021-22214](https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214)
### CVE-2021-22555 (2021-07-07)
@ -9951,13 +9955,6 @@
- [hnthuan1998/CVE-2021-24160](https://github.com/hnthuan1998/CVE-2021-24160)
- [hnthuan1998/Exploit-CVE-2021-24160](https://github.com/hnthuan1998/Exploit-CVE-2021-24160)
### CVE-2021-24307 (2021-05-24)
<code>The All in One SEO Best WordPress SEO Plugin Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with &quot;aioseo_tools_settings&quot; privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section &quot;Tool &gt; Import/Export&quot;. However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution.
</code>
- [darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce](https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce)
### CVE-2021-24347 (2021-06-14)
<code>The SP Project &amp; Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from &quot;php&quot; to &quot;pHP&quot;.
@ -10207,7 +10204,6 @@
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
- [R0OtAdm1n/CVE-2021-26084-EXP](https://github.com/R0OtAdm1n/CVE-2021-26084-EXP)
### CVE-2021-26085 (2021-08-02)
@ -10399,7 +10395,6 @@
- [1342486672/Flangvik](https://github.com/1342486672/Flangvik)
- [TheDudeD6/ExchangeSmash](https://github.com/TheDudeD6/ExchangeSmash)
- [kh4sh3i/ProxyLogon](https://github.com/kh4sh3i/ProxyLogon)
- [byinarie/Zirconium](https://github.com/byinarie/Zirconium)
- [heikanet/Microsoft-Exchange-RCE](https://github.com/heikanet/Microsoft-Exchange-RCE)
- [iceberg-N/cve-2021-26855](https://github.com/iceberg-N/cve-2021-26855)
@ -10663,7 +10658,6 @@
- [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC)
- [KevinWorst/CVE-2021-28482_Exploit](https://github.com/KevinWorst/CVE-2021-28482_Exploit)
- [timb-machine-mirrors/testanull-CVE-2021-28482.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-28482.py)
### CVE-2021-28663 (2021-05-10)
@ -10672,9 +10666,6 @@
- [lntrx/CVE-2021-28663](https://github.com/lntrx/CVE-2021-28663)
### CVE-2021-28750
- [PfalzPrince/CVE-2021-28750-site](https://github.com/PfalzPrince/CVE-2021-28750-site)
### CVE-2021-29003 (2021-04-13)
<code>Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.
@ -10915,13 +10906,6 @@
- [jsherman212/iomfb-exploit](https://github.com/jsherman212/iomfb-exploit)
- [30440r/gex](https://github.com/30440r/gex)
### CVE-2021-30853 (2021-08-24)
<code>This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6. A malicious application may bypass Gatekeeper checks.
</code>
- [shubham0d/CVE-2021-30853](https://github.com/shubham0d/CVE-2021-30853)
### CVE-2021-30858 (2021-08-24)
<code>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
@ -11107,7 +11091,6 @@
</code>
- [hzshang/CVE-2021-31956](https://github.com/hzshang/CVE-2021-31956)
- [aazhuliang/CVE-2021-31956-EXP](https://github.com/aazhuliang/CVE-2021-31956-EXP)
- [Y3A/CVE-2021-31956](https://github.com/Y3A/CVE-2021-31956)
- [hoangprod/CVE-2021-31956-POC](https://github.com/hoangprod/CVE-2021-31956-POC)
@ -11116,8 +11099,6 @@
<code>A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.
</code>
- [zjicmDarkWing/CVE-2021-32099](https://github.com/zjicmDarkWing/CVE-2021-32099)
- [ibnuuby/CVE-2021-32099](https://github.com/ibnuuby/CVE-2021-32099)
- [l3eol3eo/CVE-2021-32099_SQLi](https://github.com/l3eol3eo/CVE-2021-32099_SQLi)
- [akr3ch/CVE-2021-32099](https://github.com/akr3ch/CVE-2021-32099)
@ -11211,7 +11192,6 @@
<code>octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
</code>
- [Immersive-Labs-Sec/CVE-2021-32648](https://github.com/Immersive-Labs-Sec/CVE-2021-32648)
- [daftspunk/CVE-2021-32648](https://github.com/daftspunk/CVE-2021-32648)
### CVE-2021-32724 (2021-09-09)
@ -11534,7 +11514,6 @@
- [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211)
- [0xhaggis/CVE-2021-35211](https://github.com/0xhaggis/CVE-2021-35211)
- [BishopFox/CVE-2021-35211](https://github.com/BishopFox/CVE-2021-35211)
### CVE-2021-35215 (2021-09-01)
@ -12082,13 +12061,6 @@
### CVE-2021-39512
- [guusec/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver](https://github.com/guusec/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver)
### CVE-2021-39623 (2022-01-14)
<code>In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348
</code>
- [marcinguy/CVE-2021-39623](https://github.com/marcinguy/CVE-2021-39623)
### CVE-2021-39670 (2022-05-10)
<code>In setStream of WallpaperManager.java, there is a possible way to cause a permanent DoS due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-204087139
@ -12495,7 +12467,6 @@
- [Vulnmachines/Metabase_CVE-2021-41277](https://github.com/Vulnmachines/Metabase_CVE-2021-41277)
- [TheLastVvV/CVE-2021-41277](https://github.com/TheLastVvV/CVE-2021-41277)
- [zer0yu/CVE-2021-41277](https://github.com/zer0yu/CVE-2021-41277)
- [sasukeourad/CVE-2021-41277_SSRF](https://github.com/sasukeourad/CVE-2021-41277_SSRF)
- [frknktlca/Metabase_Nmap_Script](https://github.com/frknktlca/Metabase_Nmap_Script)
- [Chen-ling-afk/CVE-2021-41277](https://github.com/Chen-ling-afk/CVE-2021-41277)
- [RubXkuB/PoC-Metabase-CVE-2021-41277](https://github.com/RubXkuB/PoC-Metabase-CVE-2021-41277)
@ -12512,7 +12483,6 @@
<code>Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305.
</code>
- [exploit-io/CVE-2021-41349](https://github.com/exploit-io/CVE-2021-41349)
- [0xrobiul/CVE-2021-41349](https://github.com/0xrobiul/CVE-2021-41349)
### CVE-2021-41351 (2021-11-09)
@ -12702,7 +12672,6 @@
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
- [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773)
- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
@ -12804,7 +12773,6 @@
- [robotsense1337/CVE-2021-42013](https://github.com/robotsense1337/CVE-2021-42013)
- [xMohamed0/CVE-2021-42013-ApacheRCE](https://github.com/xMohamed0/CVE-2021-42013-ApacheRCE)
- [asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp](https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp)
- [rnsss/CVE-2021-42013](https://github.com/rnsss/CVE-2021-42013)
- [jas9reet/CVE-2021-42013-LAB](https://github.com/jas9reet/CVE-2021-42013-LAB)
- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway)
- [mauricelambert/CVE-2021-42013](https://github.com/mauricelambert/CVE-2021-42013)
@ -12914,7 +12882,6 @@
</code>
- [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321)
- [timb-machine-mirrors/testanull-CVE-2021-42321_poc.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-42321_poc.py)
- [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321)
- [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321)
@ -12938,7 +12905,6 @@
</code>
- [kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-](https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-)
- [Mr-xn/CVE-2021-42342](https://github.com/Mr-xn/CVE-2021-42342)
### CVE-2021-42362 (2021-11-17)
@ -13292,14 +13258,9 @@
- [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana)
- [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798)
- [halencarjunior/grafana-CVE-2021-43798](https://github.com/halencarjunior/grafana-CVE-2021-43798)
- [light-Life/CVE-2021-43798](https://github.com/light-Life/CVE-2021-43798)
- [rnsss/CVE-2021-43798-poc](https://github.com/rnsss/CVE-2021-43798-poc)
- [rodpwn/CVE-2021-43798-mass_scanner](https://github.com/rodpwn/CVE-2021-43798-mass_scanner)
- [aymenbouferroum/CVE-2021-43798_exploit](https://github.com/aymenbouferroum/CVE-2021-43798_exploit)
- [Jroo1053/GrafanaDirInclusion](https://github.com/Jroo1053/GrafanaDirInclusion)
- [yasin-cs-ko-ak/grafana-cve-2021-43798](https://github.com/yasin-cs-ko-ak/grafana-cve-2021-43798)
- [BJLIYANLIANG/CVE-2021-43798-Grafana-File-Read](https://github.com/BJLIYANLIANG/CVE-2021-43798-Grafana-File-Read)
- [lalkaltest/CVE-2021-43798](https://github.com/lalkaltest/CVE-2021-43798)
- [hupe1980/CVE-2021-43798](https://github.com/hupe1980/CVE-2021-43798)
- [YourKeeper/SunScope](https://github.com/YourKeeper/SunScope)
- [Ki11i0n4ir3/CVE-2021-43798](https://github.com/Ki11i0n4ir3/CVE-2021-43798)
@ -13339,7 +13300,6 @@
<code>Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
</code>
- [LongWayHomie/CVE-2021-43857](https://github.com/LongWayHomie/CVE-2021-43857)
- [lowkey0808/CVE-2021-43857](https://github.com/lowkey0808/CVE-2021-43857)
### CVE-2021-43858 (2021-12-27)
@ -13347,7 +13307,6 @@
<code>MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
</code>
- [0rx1/cve-2021-43858](https://github.com/0rx1/cve-2021-43858)
- [khuntor/CVE-2021-43858-MinIO](https://github.com/khuntor/CVE-2021-43858-MinIO)
### CVE-2021-43883 (2021-12-15)
@ -13775,23 +13734,11 @@
- [PoneyClairDeLune/LogJackFix](https://github.com/PoneyClairDeLune/LogJackFix)
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
- [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app)
- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
- [marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV](https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV)
- [mklinkj/log4j2-test](https://github.com/mklinkj/log4j2-test)
- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io)
- [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-)
- [kanitan/log4j2-web-vulnerable](https://github.com/kanitan/log4j2-web-vulnerable)
- [mr-r3b00t/CVE-2021-44228](https://github.com/mr-r3b00t/CVE-2021-44228)
- [ChandanShastri/Log4j_Vulnerability_Demo](https://github.com/ChandanShastri/Log4j_Vulnerability_Demo)
- [puzzlepeaches/Log4jHorizon](https://github.com/puzzlepeaches/Log4jHorizon)
- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
- [nix-xin/vuln4japi](https://github.com/nix-xin/vuln4japi)
- [maximofernandezriera/CVE-2021-44228](https://github.com/maximofernandezriera/CVE-2021-44228)
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228)
- [atlassion/log4j-exploit-builder](https://github.com/atlassion/log4j-exploit-builder)
- [atlassion/RS4LOGJ-CVE-2021-44228](https://github.com/atlassion/RS4LOGJ-CVE-2021-44228)
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
- [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)
@ -13814,7 +13761,6 @@
- [Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228](https://github.com/Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228)
- [r3kind1e/Log4Shell-obfuscated-payloads-generator](https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator)
- [Phineas09/CVE-2021-44228](https://github.com/Phineas09/CVE-2021-44228)
- [hassaanahmad813/log4j](https://github.com/hassaanahmad813/log4j)
- [yuuki1967/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/yuuki1967/CVE-2021-44228-Apache-Log4j-Rce)
- [moshuum/tf-log4j-aws-poc](https://github.com/moshuum/tf-log4j-aws-poc)
- [jaehnri/CVE-2021-44228](https://github.com/jaehnri/CVE-2021-44228)
@ -13966,7 +13912,6 @@
- [ludy-dev/cve-2021-45046](https://github.com/ludy-dev/cve-2021-45046)
- [lijiejie/log4j2_vul_local_scanner](https://github.com/lijiejie/log4j2_vul_local_scanner)
- [CaptanMoss/Log4Shell-Sandbox-Signature](https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature)
- [taise-hub/log4j-poc](https://github.com/taise-hub/log4j-poc)
### CVE-2021-45067 (2022-01-14)
@ -14002,11 +13947,7 @@
- [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE)
- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp)
- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
- [itxfahdi/-cve-2021-45232](https://github.com/itxfahdi/-cve-2021-45232)
- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
- [Kuibagit/CVE-2021-45232-RCE](https://github.com/Kuibagit/CVE-2021-45232-RCE)
- [yggcwhat/Demo](https://github.com/yggcwhat/Demo)
- [yggcwhat/CVE-2021-45232](https://github.com/yggcwhat/CVE-2021-45232)
- [YutuSec/Apisix_Crack](https://github.com/YutuSec/Apisix_Crack)
### CVE-2021-45416 (2022-02-01)
@ -14037,7 +13978,6 @@
</code>
- [plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS)
- [plsanu/CVE-2021-45744](https://github.com/plsanu/CVE-2021-45744)
### CVE-2021-45745 (2022-01-06)
@ -14045,7 +13985,6 @@
</code>
- [plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS)
- [plsanu/CVE-2021-45745](https://github.com/plsanu/CVE-2021-45745)
### CVE-2021-45897 (2022-01-28)
@ -14099,7 +14038,6 @@
</code>
- [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS)
- [plsanu/CVE-2021-46069](https://github.com/plsanu/CVE-2021-46069)
### CVE-2021-46070 (2022-01-06)