From 49135072a0a2624e891eb440384d545f85d765af Mon Sep 17 00:00:00 2001 From: motikan2010-bot <k.agena1993@gmail.com> Date: Fri, 24 Dec 2021 21:13:37 +0900 Subject: [PATCH] Auto Update 2021/12/24 12:13:37 --- 2013/CVE-2013-2028.json | 8 +- 2014/CVE-2014-4210.json | 8 +- 2015/CVE-2015-6639.json | 6 +- 2016/CVE-2016-0638.json | 8 +- 2017/CVE-2017-3248.json | 8 +- 2018/CVE-2018-14847.json | 8 +- 2018/CVE-2018-2628.json | 8 +- 2018/CVE-2018-8065.json | 8 +- 2018/CVE-2018-8120.json | 8 +- 2019/CVE-2019-17558.json | 12 +- 2019/CVE-2019-2618.json | 8 +- 2019/CVE-2019-5736.json | 8 +- 2019/CVE-2019-8601.json | 12 +- 2020/CVE-2020-14386.json | 8 +- 2020/CVE-2020-1472.json | 8 +- 2020/CVE-2020-14882.json | 12 +- 2020/CVE-2020-14883.json | 8 +- 2020/CVE-2020-2551.json | 8 +- 2020/CVE-2020-2883.json | 4 +- 2020/CVE-2020-35729.json | 8 +- 2021/CVE-2021-21123.json | 8 +- 2021/CVE-2021-21985.json | 43 +---- 2021/CVE-2021-22005.json | 24 +-- 2021/CVE-2021-22205.json | 12 +- 2021/CVE-2021-25646.json | 4 +- 2021/CVE-2021-30461.json | 27 ---- 2021/CVE-2021-30632.json | 8 +- 2021/CVE-2021-3129.json | 16 +- 2021/CVE-2021-3156.json | 8 +- 2021/CVE-2021-34473.json | 4 +- 2021/CVE-2021-34496.json | 29 ---- 2021/CVE-2021-34527.json | 27 ---- 2021/CVE-2021-34558.json | 29 ---- 2021/CVE-2021-40444.json | 32 ++-- 2021/CVE-2021-40449.json | 8 +- 2021/CVE-2021-42013.json | 4 +- 2021/CVE-2021-42278.json | 28 ++-- 2021/CVE-2021-42287.json | 12 +- 2021/CVE-2021-43224.json | 8 +- 2021/CVE-2021-43798.json | 8 +- 2021/CVE-2021-44228.json | 328 ++++++++++++++++++++++++++------------- 2021/CVE-2021-44659.json | 8 +- 2021/CVE-2021-45046.json | 35 ++++- README.md | 26 +--- 44 files changed, 446 insertions(+), 456 deletions(-) delete mode 100644 2021/CVE-2021-34496.json delete mode 100644 2021/CVE-2021-34558.json diff --git a/2013/CVE-2013-2028.json b/2013/CVE-2013-2028.json index 82a0135499..d0165acc82 100644 --- a/2013/CVE-2013-2028.json +++ b/2013/CVE-2013-2028.json @@ -40,17 +40,17 @@ "description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow", "fork": false, "created_at": "2016-03-23T10:41:00Z", - "updated_at": "2021-08-03T01:32:00Z", + "updated_at": "2021-12-24T10:35:04Z", "pushed_at": "2016-03-23T12:05:38Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 20, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 20, - "watchers": 46, + "watchers": 47, "score": 0 }, { diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 52adb1e005..d9cd0fd400 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-23T09:07:38Z", + "updated_at": "2021-12-24T11:24:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1249, - "watchers_count": 1249, + "stargazers_count": 1251, + "watchers_count": 1251, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1249, + "watchers": 1251, "score": 0 }, { diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index 95fccec23b..f268352323 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -13,16 +13,16 @@ "description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)", "fork": false, "created_at": "2016-05-02T12:18:57Z", - "updated_at": "2021-11-14T06:34:24Z", + "updated_at": "2021-12-24T10:18:55Z", "pushed_at": "2019-08-13T07:14:01Z", "stargazers_count": 105, "watchers_count": 105, - "forks_count": 53, + "forks_count": 54, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 53, + "forks": 54, "watchers": 105, "score": 0 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 65524932d7..446ab8c9f7 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-23T09:07:38Z", + "updated_at": "2021-12-24T11:24:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1249, - "watchers_count": 1249, + "stargazers_count": 1251, + "watchers_count": 1251, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1249, + "watchers": 1251, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 2e1914d36f..3baee400ab 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-23T09:07:38Z", + "updated_at": "2021-12-24T11:24:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1249, - "watchers_count": 1249, + "stargazers_count": 1251, + "watchers_count": 1251, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1249, + "watchers": 1251, "score": 0 }, { diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 9bb31d2784..393d682ff7 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -175,10 +175,10 @@ "description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script", "fork": false, "created_at": "2019-09-29T12:21:16Z", - "updated_at": "2021-09-23T22:29:56Z", + "updated_at": "2021-12-24T11:09:47Z", "pushed_at": "2019-09-30T04:10:23Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -190,7 +190,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 11, + "watchers": 12, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 67f935a3ab..6bd7f73057 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-23T09:07:38Z", + "updated_at": "2021-12-24T11:24:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1249, - "watchers_count": 1249, + "stargazers_count": 1251, + "watchers_count": 1251, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1249, + "watchers": 1251, "score": 0 }, { diff --git a/2018/CVE-2018-8065.json b/2018/CVE-2018-8065.json index 9fa137d9b4..d558604217 100644 --- a/2018/CVE-2018-8065.json +++ b/2018/CVE-2018-8065.json @@ -13,17 +13,17 @@ "description": "Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit", "fork": false, "created_at": "2018-05-25T17:31:05Z", - "updated_at": "2021-08-07T16:45:57Z", + "updated_at": "2021-12-24T10:36:59Z", "pushed_at": "2018-09-03T18:25:53Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 8, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index f37732bd39..88a23fd36c 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -98,17 +98,17 @@ "description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ", "fork": false, "created_at": "2018-06-07T08:30:07Z", - "updated_at": "2021-12-15T14:34:16Z", + "updated_at": "2021-12-24T08:51:08Z", "pushed_at": "2018-08-08T05:48:24Z", - "stargazers_count": 287, - "watchers_count": 287, + "stargazers_count": 288, + "watchers_count": 288, "forks_count": 124, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 124, - "watchers": 287, + "watchers": 288, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 882fe8623b..3b8a4ad03d 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,11 +40,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-12-24T01:44:11Z", + "updated_at": "2021-12-24T08:41:05Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3064, - "watchers_count": 3064, - "forks_count": 909, + "stargazers_count": 3067, + "watchers_count": 3067, + "forks_count": 911, "allow_forking": true, "is_template": false, "topics": [ @@ -69,8 +69,8 @@ "webshell" ], "visibility": "public", - "forks": 909, - "watchers": 3064, + "forks": 911, + "watchers": 3067, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 78592ed569..0c0add30ae 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-23T09:07:38Z", + "updated_at": "2021-12-24T11:24:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1249, - "watchers_count": 1249, + "stargazers_count": 1251, + "watchers_count": 1251, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1249, + "watchers": 1251, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index f158ac65ad..884cb5167e 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -40,17 +40,17 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2021-12-21T22:20:09Z", + "updated_at": "2021-12-24T09:42:33Z", "pushed_at": "2019-02-19T11:45:13Z", - "stargazers_count": 548, - "watchers_count": 548, + "stargazers_count": 549, + "watchers_count": 549, "forks_count": 151, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 151, - "watchers": 548, + "watchers": 549, "score": 0 }, { diff --git a/2019/CVE-2019-8601.json b/2019/CVE-2019-8601.json index a0a0e9e63f..2bab3aaa03 100644 --- a/2019/CVE-2019-8601.json +++ b/2019/CVE-2019-8601.json @@ -13,17 +13,17 @@ "description": "Exploiting a patched vulnerability in JavaScriptCore", "fork": false, "created_at": "2020-01-02T00:12:22Z", - "updated_at": "2021-10-01T14:13:32Z", + "updated_at": "2021-12-24T08:06:47Z", "pushed_at": "2020-01-02T00:13:22Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 2, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 9, + "forks": 3, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14386.json b/2020/CVE-2020-14386.json index 6e75c5fa4d..2bbcc3f3e1 100644 --- a/2020/CVE-2020-14386.json +++ b/2020/CVE-2020-14386.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2020-09-17T21:25:18Z", - "updated_at": "2021-11-29T02:30:40Z", + "updated_at": "2021-12-24T06:50:06Z", "pushed_at": "2020-09-18T00:01:00Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, - "watchers": 42, + "watchers": 43, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 69c8163a0d..e695434d74 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -155,17 +155,17 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2021-12-23T09:27:27Z", + "updated_at": "2021-12-24T06:43:52Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 388, - "watchers_count": 388, + "stargazers_count": 389, + "watchers_count": 389, "forks_count": 118, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 118, - "watchers": 388, + "watchers": 389, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 0a1e48fe39..3143e141ae 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,11 +13,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-12-24T01:44:11Z", + "updated_at": "2021-12-24T08:41:05Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3064, - "watchers_count": 3064, - "forks_count": 909, + "stargazers_count": 3067, + "watchers_count": 3067, + "forks_count": 911, "allow_forking": true, "is_template": false, "topics": [ @@ -42,8 +42,8 @@ "webshell" ], "visibility": "public", - "forks": 909, - "watchers": 3064, + "forks": 911, + "watchers": 3067, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 513b368cfd..24827ab19e 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -44,12 +44,12 @@ "pushed_at": "2020-11-11T09:12:20Z", "stargazers_count": 7, "watchers_count": 7, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 7, "score": 0 }, @@ -125,7 +125,7 @@ "pushed_at": "2021-07-30T03:28:00Z", "stargazers_count": 912, "watchers_count": 912, - "forks_count": 285, + "forks_count": 286, "allow_forking": true, "is_template": false, "topics": [ @@ -134,7 +134,7 @@ "poc" ], "visibility": "public", - "forks": 285, + "forks": 286, "watchers": 912, "score": 0 } diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index d01f148a51..be4d231beb 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-23T09:07:38Z", + "updated_at": "2021-12-24T11:24:25Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1249, - "watchers_count": 1249, + "stargazers_count": 1251, + "watchers_count": 1251, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1249, + "watchers": 1251, "score": 0 }, { diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 6517563518..985d21276d 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -103,12 +103,12 @@ "pushed_at": "2020-08-25T03:17:32Z", "stargazers_count": 304, "watchers_count": 304, - "forks_count": 43, + "forks_count": 44, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 43, + "forks": 44, "watchers": 304, "score": 0 }, diff --git a/2020/CVE-2020-35729.json b/2020/CVE-2020-35729.json index 9db65929ad..6b84767dbb 100644 --- a/2020/CVE-2020-35729.json +++ b/2020/CVE-2020-35729.json @@ -13,10 +13,10 @@ "description": "CVE-2020-35729", "fork": false, "created_at": "2021-04-09T07:59:43Z", - "updated_at": "2021-10-24T06:20:50Z", + "updated_at": "2021-12-24T06:18:33Z", "pushed_at": "2021-04-09T08:00:19Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json index 55e80565aa..3d3818f442 100644 --- a/2021/CVE-2021-21123.json +++ b/2021/CVE-2021-21123.json @@ -13,10 +13,10 @@ "description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...", "fork": false, "created_at": "2021-03-22T11:53:57Z", - "updated_at": "2021-12-12T02:47:33Z", + "updated_at": "2021-12-24T10:11:49Z", "pushed_at": "2021-03-22T18:24:20Z", - "stargazers_count": 124, - "watchers_count": 124, + "stargazers_count": 125, + "watchers_count": 125, "forks_count": 22, "allow_forking": true, "is_template": false, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 22, - "watchers": 124, + "watchers": 125, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 88bbb7d279..2e228bba44 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -128,17 +128,17 @@ "description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)", "fork": false, "created_at": "2021-06-03T09:59:21Z", - "updated_at": "2021-12-23T18:09:04Z", + "updated_at": "2021-12-24T07:15:03Z", "pushed_at": "2021-06-09T10:13:56Z", - "stargazers_count": 305, - "watchers_count": 305, + "stargazers_count": 306, + "watchers_count": 306, "forks_count": 67, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 67, - "watchers": 305, + "watchers": 306, "score": 0 }, { @@ -155,17 +155,17 @@ "description": "cve-2021-21985 exploit", "fork": false, "created_at": "2021-06-03T12:17:06Z", - "updated_at": "2021-12-23T01:20:03Z", + "updated_at": "2021-12-24T11:45:26Z", "pushed_at": "2021-12-16T08:25:02Z", - "stargazers_count": 84, - "watchers_count": 84, + "stargazers_count": 85, + "watchers_count": 85, "forks_count": 28, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 28, - "watchers": 84, + "watchers": 85, "score": 0 }, { @@ -226,33 +226,6 @@ "watchers": 28, "score": 0 }, - { - "id": 384003238, - "name": "CVE-2021-21985", - "full_name": "haiclover\/CVE-2021-21985", - "owner": { - "login": "haiclover", - "id": 20736458, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4", - "html_url": "https:\/\/github.com\/haiclover" - }, - "html_url": "https:\/\/github.com\/haiclover\/CVE-2021-21985", - "description": null, - "fork": false, - "created_at": "2021-07-08T04:45:19Z", - "updated_at": "2021-07-12T11:04:39Z", - "pushed_at": "2021-07-12T11:04:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 426353517, "name": "CVE-2021-21985_PoC", diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index 42c41e2951..9b052bdf03 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -121,17 +121,17 @@ "description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE", "fork": false, "created_at": "2021-09-25T16:21:56Z", - "updated_at": "2021-12-24T03:25:45Z", + "updated_at": "2021-12-24T10:47:43Z", "pushed_at": "2021-10-02T03:17:45Z", - "stargazers_count": 191, - "watchers_count": 191, - "forks_count": 48, + "stargazers_count": 193, + "watchers_count": 193, + "forks_count": 49, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 48, - "watchers": 191, + "forks": 49, + "watchers": 193, "score": 0 }, { @@ -283,17 +283,17 @@ "description": null, "fork": false, "created_at": "2021-12-18T08:18:50Z", - "updated_at": "2021-12-24T06:11:26Z", + "updated_at": "2021-12-24T10:16:54Z", "pushed_at": "2021-12-22T10:32:37Z", - "stargazers_count": 54, - "watchers_count": 54, - "forks_count": 12, + "stargazers_count": 56, + "watchers_count": 56, + "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 12, - "watchers": 54, + "forks": 14, + "watchers": 56, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 17893e2eb3..39d9288d3e 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-06-05T15:42:16Z", - "updated_at": "2021-12-20T06:24:47Z", + "updated_at": "2021-12-24T09:05:20Z", "pushed_at": "2021-11-02T14:45:24Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "forks_count": 42, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 42, - "watchers": 170, + "watchers": 171, "score": 0 }, { @@ -125,14 +125,14 @@ "pushed_at": "2021-11-06T05:20:30Z", "stargazers_count": 118, "watchers_count": 118, - "forks_count": 49, + "forks_count": 50, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-22205" ], "visibility": "public", - "forks": 49, + "forks": 50, "watchers": 118, "score": 0 }, diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 117912f769..6f6f4c59ee 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -125,7 +125,7 @@ "pushed_at": "2021-07-30T03:28:00Z", "stargazers_count": 912, "watchers_count": 912, - "forks_count": 285, + "forks_count": 286, "allow_forking": true, "is_template": false, "topics": [ @@ -134,7 +134,7 @@ "poc" ], "visibility": "public", - "forks": 285, + "forks": 286, "watchers": 912, "score": 0 }, diff --git a/2021/CVE-2021-30461.json b/2021/CVE-2021-30461.json index 9a157d00eb..3a004bc4db 100644 --- a/2021/CVE-2021-30461.json +++ b/2021/CVE-2021-30461.json @@ -87,32 +87,5 @@ "forks": 5, "watchers": 14, "score": 0 - }, - { - "id": 386052413, - "name": "CVE-2021-30461", - "full_name": "puckiestyle\/CVE-2021-30461", - "owner": { - "login": "puckiestyle", - "id": 57447087, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", - "html_url": "https:\/\/github.com\/puckiestyle" - }, - "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-30461", - "description": null, - "fork": false, - "created_at": "2021-07-14T19:20:11Z", - "updated_at": "2021-07-14T19:20:24Z", - "pushed_at": "2021-07-14T19:20:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json index c2db3ed47d..4e4790534c 100644 --- a/2021/CVE-2021-30632.json +++ b/2021/CVE-2021-30632.json @@ -13,17 +13,17 @@ "description": "PoC CVE-2021-30632 - Out of bounds write in V8", "fork": false, "created_at": "2021-09-20T09:49:51Z", - "updated_at": "2021-11-30T11:23:11Z", + "updated_at": "2021-12-24T06:17:39Z", "pushed_at": "2021-09-20T09:52:06Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 13, - "watchers": 65, + "watchers": 66, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index aa134d6694..bb1f0fa8d9 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-13T12:52:20Z", - "updated_at": "2021-12-19T16:42:50Z", + "updated_at": "2021-12-24T06:36:04Z", "pushed_at": "2021-01-29T13:59:07Z", - "stargazers_count": 188, - "watchers_count": 188, + "stargazers_count": 189, + "watchers_count": 189, "forks_count": 52, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 52, - "watchers": 188, + "watchers": 189, "score": 0 }, { @@ -121,10 +121,10 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-27T10:16:35Z", - "updated_at": "2021-12-22T01:14:44Z", + "updated_at": "2021-12-24T06:42:35Z", "pushed_at": "2021-03-07T04:39:58Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "forks_count": 13, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 34, + "watchers": 35, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 5f87628d51..4063458188 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1158,17 +1158,17 @@ "description": "CVE-2021-3156 - Sudo Baron Samedit", "fork": false, "created_at": "2021-04-29T06:29:26Z", - "updated_at": "2021-12-18T05:37:22Z", + "updated_at": "2021-12-24T11:25:04Z", "pushed_at": "2021-08-11T15:52:19Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, - "watchers": 115, + "watchers": 116, "score": 0 }, { diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json index 2db5f44f85..ab7ccb050f 100644 --- a/2021/CVE-2021-34473.json +++ b/2021/CVE-2021-34473.json @@ -98,12 +98,12 @@ "pushed_at": "2021-09-07T15:18:45Z", "stargazers_count": 18, "watchers_count": 18, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 18, "score": 0 }, diff --git a/2021/CVE-2021-34496.json b/2021/CVE-2021-34496.json deleted file mode 100644 index 960516fd01..0000000000 --- a/2021/CVE-2021-34496.json +++ /dev/null @@ -1,29 +0,0 @@ -[ - { - "id": 386161559, - "name": "CVE-2021-34496", - "full_name": "fkm75P8YjLkb\/CVE-2021-34496", - "owner": { - "login": "fkm75P8YjLkb", - "id": 82131630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4", - "html_url": "https:\/\/github.com\/fkm75P8YjLkb" - }, - "html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-34496", - "description": null, - "fork": false, - "created_at": "2021-07-15T04:23:58Z", - "updated_at": "2021-07-15T04:23:58Z", - "pushed_at": "2021-07-15T04:23:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 4072469907..955bc0c9a1 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -1,31 +1,4 @@ [ - { - "id": 382267064, - "name": "PrintNightmare", - "full_name": "glshnu\/PrintNightmare", - "owner": { - "login": "glshnu", - "id": 7205231, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4", - "html_url": "https:\/\/github.com\/glshnu" - }, - "html_url": "https:\/\/github.com\/glshnu\/PrintNightmare", - "description": "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527", - "fork": false, - "created_at": "2021-07-02T07:30:52Z", - "updated_at": "2021-08-05T03:00:36Z", - "pushed_at": "2021-07-12T15:07:05Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 4, - "score": 0 - }, { "id": 382645654, "name": "PrintNightmare-CVE-2021-34527", diff --git a/2021/CVE-2021-34558.json b/2021/CVE-2021-34558.json deleted file mode 100644 index 45b2e9c764..0000000000 --- a/2021/CVE-2021-34558.json +++ /dev/null @@ -1,29 +0,0 @@ -[ - { - "id": 385496417, - "name": "cve-2021-34558", - "full_name": "alexzorin\/cve-2021-34558", - "owner": { - "login": "alexzorin", - "id": 311534, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/311534?v=4", - "html_url": "https:\/\/github.com\/alexzorin" - }, - "html_url": "https:\/\/github.com\/alexzorin\/cve-2021-34558", - "description": null, - "fork": false, - "created_at": "2021-07-13T06:15:21Z", - "updated_at": "2021-12-15T14:42:32Z", - "pushed_at": "2021-07-13T06:16:11Z", - "stargazers_count": 35, - "watchers_count": 35, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 35, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 2ac3a586a4..ca0f5860c7 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -229,17 +229,17 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2021-12-23T10:21:35Z", + "updated_at": "2021-12-24T06:31:03Z", "pushed_at": "2021-09-11T09:50:26Z", - "stargazers_count": 1331, - "watchers_count": 1331, + "stargazers_count": 1332, + "watchers_count": 1332, "forks_count": 437, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 437, - "watchers": 1331, + "watchers": 1332, "score": 0 }, { @@ -256,17 +256,17 @@ "description": null, "fork": false, "created_at": "2021-09-11T02:49:37Z", - "updated_at": "2021-12-15T14:42:58Z", + "updated_at": "2021-12-24T11:57:05Z", "pushed_at": "2021-09-11T02:49:31Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 6, + "watchers": 5, "score": 0 }, { @@ -553,10 +553,10 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2021-12-23T23:25:23Z", + "updated_at": "2021-12-24T11:05:28Z", "pushed_at": "2021-10-12T23:05:07Z", - "stargazers_count": 532, - "watchers_count": 532, + "stargazers_count": 536, + "watchers_count": 536, "forks_count": 120, "allow_forking": true, "is_template": false, @@ -570,7 +570,7 @@ ], "visibility": "public", "forks": 120, - "watchers": 532, + "watchers": 536, "score": 0 }, { @@ -923,17 +923,17 @@ "description": "CVE-2021-40444", "fork": false, "created_at": "2021-12-19T08:16:07Z", - "updated_at": "2021-12-24T03:57:30Z", + "updated_at": "2021-12-24T09:40:59Z", "pushed_at": "2021-12-19T08:27:33Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 30, + "watchers_count": 30, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, - "watchers": 28, + "watchers": 30, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 4c908f997d..144d01aab7 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -40,17 +40,17 @@ "description": "windows 10 14393 LPE", "fork": false, "created_at": "2021-10-20T09:24:36Z", - "updated_at": "2021-12-23T10:28:19Z", + "updated_at": "2021-12-24T10:53:29Z", "pushed_at": "2021-10-28T03:51:09Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 75, + "watchers_count": 75, "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 33, - "watchers": 74, + "watchers": 75, "score": 0 }, { diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index a9863a8131..7a7f5a2858 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -293,8 +293,8 @@ "description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。", "fork": false, "created_at": "2021-12-23T14:46:41Z", - "updated_at": "2021-12-23T15:51:43Z", - "pushed_at": "2021-12-23T15:51:41Z", + "updated_at": "2021-12-24T07:38:42Z", + "pushed_at": "2021-12-24T07:38:39Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index ad0d2a489e..c25db28f0c 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2021-12-24T05:59:54Z", + "updated_at": "2021-12-24T09:56:02Z", "pushed_at": "2021-12-21T10:11:05Z", - "stargazers_count": 647, - "watchers_count": 647, + "stargazers_count": 650, + "watchers_count": 650, "forks_count": 134, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 134, - "watchers": 647, + "watchers": 650, "score": 0 }, { @@ -45,17 +45,17 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2021-12-23T22:19:02Z", + "updated_at": "2021-12-24T09:28:32Z", "pushed_at": "2021-12-20T04:51:01Z", - "stargazers_count": 160, - "watchers_count": 160, + "stargazers_count": 161, + "watchers_count": 161, "forks_count": 29, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 29, - "watchers": 160, + "watchers": 161, "score": 0 }, { @@ -99,17 +99,17 @@ "description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)", "fork": false, "created_at": "2021-12-13T23:15:05Z", - "updated_at": "2021-12-22T10:08:04Z", + "updated_at": "2021-12-24T09:50:08Z", "pushed_at": "2021-12-13T23:15:47Z", - "stargazers_count": 162, - "watchers_count": 162, - "forks_count": 22, + "stargazers_count": 164, + "watchers_count": 164, + "forks_count": 23, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 22, - "watchers": 162, + "forks": 23, + "watchers": 164, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 6a5ed784fb..0685e72724 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,17 +13,17 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2021-12-24T05:14:10Z", + "updated_at": "2021-12-24T11:43:43Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 937, - "watchers_count": 937, - "forks_count": 245, + "stargazers_count": 939, + "watchers_count": 939, + "forks_count": 246, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 245, - "watchers": 937, + "forks": 246, + "watchers": 939, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-43224.json b/2021/CVE-2021-43224.json index bb977cafe3..285c2e6ec5 100644 --- a/2021/CVE-2021-43224.json +++ b/2021/CVE-2021-43224.json @@ -13,17 +13,17 @@ "description": "Windows Common Log File System Driver POC", "fork": false, "created_at": "2021-12-21T01:51:41Z", - "updated_at": "2021-12-24T04:02:58Z", + "updated_at": "2021-12-24T11:44:39Z", "pushed_at": "2021-12-21T06:57:06Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 57, + "watchers_count": 57, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, - "watchers": 54, + "watchers": 57, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index d5195c2f8f..e7b31f8cdd 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -183,10 +183,10 @@ "description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.", "fork": false, "created_at": "2021-12-07T15:11:34Z", - "updated_at": "2021-12-24T02:42:26Z", + "updated_at": "2021-12-24T08:41:37Z", "pushed_at": "2021-12-09T07:22:26Z", - "stargazers_count": 177, - "watchers_count": 177, + "stargazers_count": 176, + "watchers_count": 176, "forks_count": 24, "allow_forking": true, "is_template": false, @@ -197,7 +197,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 177, + "watchers": 176, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index a79c3e8de9..16537adeb7 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -94,17 +94,17 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2021-12-24T06:04:29Z", + "updated_at": "2021-12-24T08:54:55Z", "pushed_at": "2021-12-14T15:30:16Z", - "stargazers_count": 269, - "watchers_count": 269, - "forks_count": 75, + "stargazers_count": 272, + "watchers_count": 272, + "forks_count": 76, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 75, - "watchers": 269, + "forks": 76, + "watchers": 272, "score": 0 }, { @@ -390,17 +390,17 @@ "description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2021-12-24T04:32:26Z", - "pushed_at": "2021-12-20T22:54:49Z", - "stargazers_count": 827, - "watchers_count": 827, - "forks_count": 325, + "updated_at": "2021-12-24T10:17:16Z", + "pushed_at": "2021-12-24T08:51:30Z", + "stargazers_count": 829, + "watchers_count": 829, + "forks_count": 327, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 325, - "watchers": 827, + "forks": 327, + "watchers": 829, "score": 0 }, { @@ -858,10 +858,10 @@ "description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2021-12-23T19:33:22Z", + "updated_at": "2021-12-24T07:37:11Z", "pushed_at": "2021-12-20T18:11:42Z", - "stargazers_count": 538, - "watchers_count": 538, + "stargazers_count": 539, + "watchers_count": 539, "forks_count": 84, "allow_forking": true, "is_template": false, @@ -888,7 +888,7 @@ ], "visibility": "public", "forks": 84, - "watchers": 538, + "watchers": 539, "score": 0 }, { @@ -905,11 +905,11 @@ "description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2021-12-24T02:59:58Z", + "updated_at": "2021-12-24T09:30:01Z", "pushed_at": "2021-12-22T20:14:52Z", - "stargazers_count": 968, - "watchers_count": 968, - "forks_count": 233, + "stargazers_count": 975, + "watchers_count": 975, + "forks_count": 234, "allow_forking": true, "is_template": false, "topics": [ @@ -919,8 +919,8 @@ "security" ], "visibility": "public", - "forks": 233, - "watchers": 968, + "forks": 234, + "watchers": 975, "score": 0 }, { @@ -1233,11 +1233,11 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2021-12-24T05:35:50Z", - "pushed_at": "2021-12-23T15:22:33Z", - "stargazers_count": 135, - "watchers_count": 135, - "forks_count": 44, + "updated_at": "2021-12-24T08:18:36Z", + "pushed_at": "2021-12-24T07:00:13Z", + "stargazers_count": 138, + "watchers_count": 138, + "forks_count": 45, "allow_forking": true, "is_template": false, "topics": [ @@ -1246,8 +1246,8 @@ "log4j2" ], "visibility": "public", - "forks": 44, - "watchers": 135, + "forks": 45, + "watchers": 138, "score": 0 }, { @@ -1372,10 +1372,10 @@ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:18:46Z", - "updated_at": "2021-12-24T03:54:30Z", + "updated_at": "2021-12-24T09:26:08Z", "pushed_at": "2021-12-23T03:42:30Z", - "stargazers_count": 658, - "watchers_count": 658, + "stargazers_count": 660, + "watchers_count": 660, "forks_count": 130, "allow_forking": true, "is_template": false, @@ -1391,7 +1391,7 @@ ], "visibility": "public", "forks": 130, - "watchers": 658, + "watchers": 660, "score": 0 }, { @@ -1462,8 +1462,8 @@ "description": null, "fork": false, "created_at": "2021-12-11T12:16:45Z", - "updated_at": "2021-12-23T16:20:02Z", - "pushed_at": "2021-12-23T16:19:59Z", + "updated_at": "2021-12-24T11:01:22Z", + "pushed_at": "2021-12-24T11:02:55Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, @@ -1887,7 +1887,7 @@ "pushed_at": "2021-12-22T17:26:01Z", "stargazers_count": 523, "watchers_count": 523, - "forks_count": 83, + "forks_count": 84, "allow_forking": true, "is_template": false, "topics": [ @@ -1904,7 +1904,7 @@ "vulnerability-scanner" ], "visibility": "public", - "forks": 83, + "forks": 84, "watchers": 523, "score": 0 }, @@ -2504,17 +2504,17 @@ "description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.", "fork": false, "created_at": "2021-12-12T12:16:07Z", - "updated_at": "2021-12-23T19:53:53Z", + "updated_at": "2021-12-24T07:53:50Z", "pushed_at": "2021-12-23T19:53:50Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 41, + "watchers": 42, "score": 0 }, { @@ -2839,17 +2839,17 @@ "description": "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability.", "fork": false, "created_at": "2021-12-12T15:29:20Z", - "updated_at": "2021-12-22T08:29:14Z", + "updated_at": "2021-12-24T10:34:52Z", "pushed_at": "2021-12-22T16:09:08Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, - "watchers": 65, + "watchers": 66, "score": 0 }, { @@ -3536,17 +3536,17 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2021-12-24T05:47:23Z", + "updated_at": "2021-12-24T12:11:06Z", "pushed_at": "2021-12-23T17:05:14Z", - "stargazers_count": 2300, - "watchers_count": 2300, - "forks_count": 529, + "stargazers_count": 2315, + "watchers_count": 2315, + "forks_count": 530, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 529, - "watchers": 2300, + "forks": 530, + "watchers": 2315, "score": 0 }, { @@ -3567,12 +3567,12 @@ "pushed_at": "2021-12-22T18:22:42Z", "stargazers_count": 222, "watchers_count": 222, - "forks_count": 75, + "forks_count": 76, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 75, + "forks": 76, "watchers": 222, "score": 0 }, @@ -3979,17 +3979,17 @@ "description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.", "fork": false, "created_at": "2021-12-13T11:06:46Z", - "updated_at": "2021-12-24T02:03:55Z", + "updated_at": "2021-12-24T08:19:15Z", "pushed_at": "2021-12-16T06:53:21Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 14, - "watchers": 42, + "watchers": 43, "score": 0 }, { @@ -4377,6 +4377,41 @@ "watchers": 0, "score": 0 }, + { + "id": 437948564, + "name": "log4shell_ioc_ips", + "full_name": "hackinghippo\/log4shell_ioc_ips", + "owner": { + "login": "hackinghippo", + "id": 96073490, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96073490?v=4", + "html_url": "https:\/\/github.com\/hackinghippo" + }, + "html_url": "https:\/\/github.com\/hackinghippo\/log4shell_ioc_ips", + "description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)", + "fork": false, + "created_at": "2021-12-13T16:39:16Z", + "updated_at": "2021-12-24T12:00:31Z", + "pushed_at": "2021-12-24T12:00:29Z", + "stargazers_count": 22, + "watchers_count": 22, + "forks_count": 9, + "allow_forking": true, + "is_template": false, + "topics": [ + "cve", + "cve-2021-44228", + "ioc", + "list", + "log4j", + "log4shell", + "shell4log" + ], + "visibility": "public", + "forks": 9, + "watchers": 22, + "score": 0 + }, { "id": 437948858, "name": "log4j-1.2.15-mod", @@ -4858,17 +4893,17 @@ "description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs", "fork": false, "created_at": "2021-12-13T21:39:51Z", - "updated_at": "2021-12-23T21:09:08Z", + "updated_at": "2021-12-24T08:28:51Z", "pushed_at": "2021-12-21T01:24:46Z", - "stargazers_count": 255, - "watchers_count": 255, - "forks_count": 26, + "stargazers_count": 256, + "watchers_count": 256, + "forks_count": 27, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 26, - "watchers": 255, + "forks": 27, + "watchers": 256, "score": 0 }, { @@ -5402,11 +5437,11 @@ "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)", "fork": false, "created_at": "2021-12-14T10:04:42Z", - "updated_at": "2021-12-24T00:01:59Z", + "updated_at": "2021-12-24T11:58:29Z", "pushed_at": "2021-12-23T22:12:36Z", - "stargazers_count": 342, - "watchers_count": 342, - "forks_count": 63, + "stargazers_count": 346, + "watchers_count": 346, + "forks_count": 65, "allow_forking": true, "is_template": false, "topics": [ @@ -5420,8 +5455,8 @@ "python" ], "visibility": "public", - "forks": 63, - "watchers": 342, + "forks": 65, + "watchers": 346, "score": 0 }, { @@ -5438,17 +5473,17 @@ "description": null, "fork": false, "created_at": "2021-12-14T12:37:23Z", - "updated_at": "2021-12-24T05:56:54Z", + "updated_at": "2021-12-24T08:20:54Z", "pushed_at": "2021-12-23T15:14:47Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, - "watchers": 44, + "watchers": 45, "score": 0 }, { @@ -5708,17 +5743,17 @@ "description": "Tools for investigating Log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-14T19:08:14Z", - "updated_at": "2021-12-23T21:03:12Z", + "updated_at": "2021-12-24T10:51:40Z", "pushed_at": "2021-12-23T21:03:08Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 80, + "watchers_count": 80, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 79, + "watchers": 80, "score": 0 }, { @@ -5853,8 +5888,8 @@ "description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.", "fork": false, "created_at": "2021-12-14T22:19:29Z", - "updated_at": "2021-12-23T20:55:16Z", - "pushed_at": "2021-12-23T12:47:21Z", + "updated_at": "2021-12-24T08:58:53Z", + "pushed_at": "2021-12-24T08:58:51Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, @@ -5983,17 +6018,17 @@ "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-14T23:33:51Z", - "updated_at": "2021-12-24T04:03:41Z", + "updated_at": "2021-12-24T08:47:17Z", "pushed_at": "2021-12-23T20:16:12Z", - "stargazers_count": 237, - "watchers_count": 237, + "stargazers_count": 238, + "watchers_count": 238, "forks_count": 57, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 57, - "watchers": 237, + "watchers": 238, "score": 0 }, { @@ -6483,17 +6518,17 @@ "description": "we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them", "fork": false, "created_at": "2021-12-15T15:42:06Z", - "updated_at": "2021-12-21T22:56:53Z", + "updated_at": "2021-12-24T09:10:14Z", "pushed_at": "2021-12-17T16:00:03Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0 }, { @@ -6999,7 +7034,7 @@ "fork": false, "created_at": "2021-12-16T11:54:11Z", "updated_at": "2021-12-23T18:54:42Z", - "pushed_at": "2021-12-23T14:49:04Z", + "pushed_at": "2021-12-24T11:32:13Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, @@ -8149,6 +8184,33 @@ "watchers": 1, "score": 0 }, + { + "id": 439698618, + "name": "log4shell-docker-lab", + "full_name": "axelcurmi\/log4shell-docker-lab", + "owner": { + "login": "axelcurmi", + "id": 23001923, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23001923?v=4", + "html_url": "https:\/\/github.com\/axelcurmi" + }, + "html_url": "https:\/\/github.com\/axelcurmi\/log4shell-docker-lab", + "description": "Log4Shell (CVE-2021-44228) docker lab", + "fork": false, + "created_at": "2021-12-18T19:30:35Z", + "updated_at": "2021-12-24T10:28:50Z", + "pushed_at": "2021-12-24T10:28:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 439712818, "name": "log4j-2021-vulnerability-study", @@ -8244,8 +8306,8 @@ "description": "Vulnerability analysis, patch management and exploitation tool forCVE-2021-44228 \/ CVE-2021-45046 \/ CVE-2021-4104", "fork": false, "created_at": "2021-12-19T05:13:25Z", - "updated_at": "2021-12-19T18:11:23Z", - "pushed_at": "2021-12-19T18:11:20Z", + "updated_at": "2021-12-24T09:42:14Z", + "pushed_at": "2021-12-24T07:00:28Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, @@ -8894,11 +8956,11 @@ "description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)", "fork": false, "created_at": "2021-12-21T22:14:24Z", - "updated_at": "2021-12-24T03:45:39Z", + "updated_at": "2021-12-24T10:57:33Z", "pushed_at": "2021-12-23T22:22:23Z", - "stargazers_count": 44, - "watchers_count": 44, - "forks_count": 3, + "stargazers_count": 47, + "watchers_count": 47, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [ @@ -8910,8 +8972,8 @@ "security" ], "visibility": "public", - "forks": 3, - "watchers": 44, + "forks": 4, + "watchers": 47, "score": 0 }, { @@ -8928,8 +8990,8 @@ "description": "Log4Shell Demo with AWS", "fork": false, "created_at": "2021-12-22T03:34:40Z", - "updated_at": "2021-12-22T04:05:07Z", - "pushed_at": "2021-12-22T03:35:44Z", + "updated_at": "2021-12-24T08:56:47Z", + "pushed_at": "2021-12-24T08:56:44Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -9051,20 +9113,20 @@ }, { "id": 440898542, - "name": "Log4JChecker", - "full_name": "NatteeSetobol\/Log4JChecker", + "name": "Log4JPOC", + "full_name": "NatteeSetobol\/Log4JPOC", "owner": { "login": "NatteeSetobol", "id": 6789925, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6789925?v=4", "html_url": "https:\/\/github.com\/NatteeSetobol" }, - "html_url": "https:\/\/github.com\/NatteeSetobol\/Log4JChecker", - "description": "Log4JChecker checks for CVE-2021-44228 vulnerability", + "html_url": "https:\/\/github.com\/NatteeSetobol\/Log4JPOC", + "description": "POC for CVE-2021-44228 vulnerability", "fork": false, "created_at": "2021-12-22T15:15:12Z", - "updated_at": "2021-12-23T01:54:05Z", - "pushed_at": "2021-12-23T01:54:02Z", + "updated_at": "2021-12-24T10:15:11Z", + "pushed_at": "2021-12-24T10:14:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -9208,13 +9270,67 @@ "pushed_at": "2021-12-24T02:39:06Z", "stargazers_count": 2, "watchers_count": 2, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0 + }, + { + "id": 441364313, + "name": "log4j-CVE-2021-44228-workaround", + "full_name": "grimch\/log4j-CVE-2021-44228-workaround", + "owner": { + "login": "grimch", + "id": 58831200, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58831200?v=4", + "html_url": "https:\/\/github.com\/grimch" + }, + "html_url": "https:\/\/github.com\/grimch\/log4j-CVE-2021-44228-workaround", + "description": "general purpose workaround for the log4j CVE-2021-44228 vulnerability", + "fork": false, + "created_at": "2021-12-24T04:23:17Z", + "updated_at": "2021-12-24T06:54:25Z", + "pushed_at": "2021-12-24T06:54:22Z", + "stargazers_count": 0, + "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 0, + "score": 0 + }, + { + "id": 441423344, + "name": "log4j-shell-csw", + "full_name": "cybersecurityworks553\/log4j-shell-csw", + "owner": { + "login": "cybersecurityworks553", + "id": 63910792, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4", + "html_url": "https:\/\/github.com\/cybersecurityworks553" + }, + "html_url": "https:\/\/github.com\/cybersecurityworks553\/log4j-shell-csw", + "description": "A Proof-Of-Concept Exploit for CVE-2021-44228 vulnerability.", + "fork": false, + "created_at": "2021-12-24T09:26:38Z", + "updated_at": "2021-12-24T10:16:13Z", + "pushed_at": "2021-12-24T10:16:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44659.json b/2021/CVE-2021-44659.json index 10f1d53b4c..45dc99b06e 100644 --- a/2021/CVE-2021-44659.json +++ b/2021/CVE-2021-44659.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-12-22T14:46:21Z", - "updated_at": "2021-12-22T21:34:28Z", + "updated_at": "2021-12-24T06:56:19Z", "pushed_at": "2021-12-22T21:34:25Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-45046.json b/2021/CVE-2021-45046.json index fff54248ad..c0f96e3b18 100644 --- a/2021/CVE-2021-45046.json +++ b/2021/CVE-2021-45046.json @@ -209,17 +209,44 @@ "description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)", "fork": false, "created_at": "2021-12-20T12:07:41Z", - "updated_at": "2021-12-24T05:45:42Z", + "updated_at": "2021-12-24T07:31:24Z", "pushed_at": "2021-12-22T06:24:42Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 70, + "watchers_count": 70, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, - "watchers": 68, + "watchers": 70, + "score": 0 + }, + { + "id": 441418197, + "name": "Log4Shell-Sandbox-Signature", + "full_name": "CaptanMoss\/Log4Shell-Sandbox-Signature", + "owner": { + "login": "CaptanMoss", + "id": 10811344, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10811344?v=4", + "html_url": "https:\/\/github.com\/CaptanMoss" + }, + "html_url": "https:\/\/github.com\/CaptanMoss\/Log4Shell-Sandbox-Signature", + "description": "Log4Shell(CVE-2021-45046) Sandbox Signature", + "fork": false, + "created_at": "2021-12-24T09:02:55Z", + "updated_at": "2021-12-24T09:31:46Z", + "pushed_at": "2021-12-24T09:31:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 48583468f1..8b9e1e47dd 100644 --- a/README.md +++ b/README.md @@ -804,7 +804,6 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to - [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp) - [daedalus/CVE-2021-21985](https://github.com/daedalus/CVE-2021-21985) - [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC) -- [haiclover/CVE-2021-21985](https://github.com/haiclover/CVE-2021-21985) - [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC) ### CVE-2021-22005 (2021-09-23) @@ -1890,7 +1889,6 @@ A remote code execution issue was discovered in the web UI of VoIPmonitor before - [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461) - [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461) - [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461) -- [puckiestyle/CVE-2021-30461](https://github.com/puckiestyle/CVE-2021-30461) ### CVE-2021-30481 (2021-04-10) @@ -2328,14 +2326,6 @@ Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique - [KaLendsi/CVE-2021-34486](https://github.com/KaLendsi/CVE-2021-34486) - [b1tg/CVE-2021-34486-exp](https://github.com/b1tg/CVE-2021-34486-exp) -### CVE-2021-34496 (2021-07-14) - -<code> -Windows GDI Information Disclosure Vulnerability -</code> - -- [fkm75P8YjLkb/CVE-2021-34496](https://github.com/fkm75P8YjLkb/CVE-2021-34496) - ### CVE-2021-34523 (2021-07-14) <code> @@ -2350,21 +2340,12 @@ Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is un Windows Print Spooler Remote Code Execution Vulnerability </code> -- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare) - [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527) - [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream) - [0xirison/PrintNightmare-Patcher](https://github.com/0xirison/PrintNightmare-Patcher) - [Tomparte/PrintNightmare](https://github.com/Tomparte/PrintNightmare) - [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527) -### CVE-2021-34558 (2021-07-15) - -<code> -The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic. -</code> - -- [alexzorin/cve-2021-34558](https://github.com/alexzorin/cve-2021-34558) - ### CVE-2021-34646 (2021-08-30) <code> @@ -3899,6 +3880,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u - [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228) - [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test) - [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228) +- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips) - [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod) - [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell) - [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228) @@ -4032,6 +4014,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u - [shivakumarjayaraman/log4jvulnerability-CVE-2021-44228](https://github.com/shivakumarjayaraman/log4jvulnerability-CVE-2021-44228) - [j3kz/CVE-2021-44228-PoC](https://github.com/j3kz/CVE-2021-44228-PoC) - [Apipia/log4j-pcap-activity](https://github.com/Apipia/log4j-pcap-activity) +- [axelcurmi/log4shell-docker-lab](https://github.com/axelcurmi/log4shell-docker-lab) - [otaviokr/log4j-2021-vulnerability-study](https://github.com/otaviokr/log4j-2021-vulnerability-study) - [kkyehit/log4j_CVE-2021-44228](https://github.com/kkyehit/log4j_CVE-2021-44228) - [trickyearlobe/inspec-log4j](https://github.com/trickyearlobe/inspec-log4j) @@ -4064,12 +4047,14 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u - [ossie-git/log4shell_sentinel](https://github.com/ossie-git/log4shell_sentinel) - [r00thunter/Log4Shell](https://github.com/r00thunter/Log4Shell) - [asyzdykov/cve-2021-44228-fix-jars](https://github.com/asyzdykov/cve-2021-44228-fix-jars) -- [NatteeSetobol/Log4JChecker](https://github.com/NatteeSetobol/Log4JChecker) +- [NatteeSetobol/Log4JPOC](https://github.com/NatteeSetobol/Log4JPOC) - [BJLIYANLIANG/log4j-scanner](https://github.com/BJLIYANLIANG/log4j-scanner) - [0x3SC4L4T3/Apache-Log4j-POC](https://github.com/0x3SC4L4T3/Apache-Log4j-POC) - [TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit](https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit) - [lucab85/ansible-role-log4shell](https://github.com/lucab85/ansible-role-log4shell) - [ainrm/log4j-scan](https://github.com/ainrm/log4j-scan) +- [grimch/log4j-CVE-2021-44228-workaround](https://github.com/grimch/log4j-CVE-2021-44228-workaround) +- [cybersecurityworks553/log4j-shell-csw](https://github.com/cybersecurityworks553/log4j-shell-csw) ### CVE-2021-44659 (2021-12-22) @@ -4112,6 +4097,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i - [lukepasek/log4jjndilookupremove](https://github.com/lukepasek/log4jjndilookupremove) - [ludy-dev/cve-2021-45046](https://github.com/ludy-dev/cve-2021-45046) - [lijiejie/log4j2_vul_local_scanner](https://github.com/lijiejie/log4j2_vul_local_scanner) +- [CaptanMoss/Log4Shell-Sandbox-Signature](https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature) ### CVE-2021-45105 (2021-12-18)