Auto Update 2022/05/17 06:15:55

This commit is contained in:
motikan2010-bot 2022-05-17 15:15:55 +09:00
parent 9bdde3f34c
commit 50eab077e9
39 changed files with 250 additions and 223 deletions

View file

@ -13,17 +13,17 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2022-05-06T13:20:50Z",
"updated_at": "2022-05-17T03:36:18Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2273,
"watchers_count": 2273,
"stargazers_count": 2272,
"watchers_count": 2272,
"forks_count": 483,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 483,
"watchers": 2273,
"watchers": 2272,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-16T02:18:34Z",
"updated_at": "2022-05-17T01:01:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1354,
"watchers_count": 1354,
"stargazers_count": 1355,
"watchers_count": 1355,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1354,
"watchers": 1355,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-16T02:18:34Z",
"updated_at": "2022-05-17T01:01:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1354,
"watchers_count": 1354,
"stargazers_count": 1355,
"watchers_count": 1355,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1354,
"watchers": 1355,
"score": 0
},
{

View file

@ -179,12 +179,12 @@
"pushed_at": "2018-01-26T14:28:58Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 40,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 39,
"watchers": 119,
"score": 0
},

View file

@ -1,29 +1,29 @@
[
{
"id": 123458951,
"id": 141677703,
"name": "Jackson-CVE-2017-17485",
"full_name": "maxbitcoin\/Jackson-CVE-2017-17485",
"full_name": "rootsecurity\/Jackson-CVE-2017-17485",
"owner": {
"login": "maxbitcoin",
"id": 5998127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5998127?v=4",
"html_url": "https:\/\/github.com\/maxbitcoin"
"login": "rootsecurity",
"id": 3953477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3953477?v=4",
"html_url": "https:\/\/github.com\/rootsecurity"
},
"html_url": "https:\/\/github.com\/maxbitcoin\/Jackson-CVE-2017-17485",
"html_url": "https:\/\/github.com\/rootsecurity\/Jackson-CVE-2017-17485",
"description": "Jackson 反序列化",
"fork": false,
"created_at": "2018-03-01T16:09:20Z",
"updated_at": "2021-01-03T06:19:34Z",
"pushed_at": "2018-01-24T03:03:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 9,
"created_at": "2018-07-20T07:18:09Z",
"updated_at": "2022-05-17T03:24:41Z",
"pushed_at": "2018-05-09T19:26:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 1,
"forks": 0,
"watchers": 0,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-16T02:18:34Z",
"updated_at": "2022-05-17T01:01:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1354,
"watchers_count": 1354,
"stargazers_count": 1355,
"watchers_count": 1355,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1354,
"watchers": 1355,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2017-07-26T13:07:51Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 60,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 60,
"forks": 59,
"watchers": 181,
"score": 0
},
@ -71,7 +71,7 @@
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 308,
"watchers_count": 308,
"forks_count": 105,
"forks_count": 104,
"allow_forking": true,
"is_template": false,
"topics": [
@ -82,7 +82,7 @@
"sambacry"
],
"visibility": "public",
"forks": 105,
"forks": 104,
"watchers": 308,
"score": 0
},
@ -131,12 +131,12 @@
"pushed_at": "2021-10-31T07:06:25Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 25,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 24,
"watchers": 43,
"score": 0
},

View file

@ -148,17 +148,17 @@
"description": "CVE-2018-14667-poc Richfaces漏洞环境及PoC",
"fork": false,
"created_at": "2019-09-23T07:45:01Z",
"updated_at": "2021-01-07T08:24:16Z",
"updated_at": "2022-05-17T01:44:07Z",
"pushed_at": "2019-09-24T05:00:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -148,7 +148,7 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2022-03-29T14:48:08Z",
"updated_at": "2022-05-17T00:52:14Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 33,
"watchers_count": 33,
@ -175,17 +175,17 @@
"description": "Laravel RCE exploit. CVE-2018-15133",
"fork": false,
"created_at": "2020-12-21T22:02:08Z",
"updated_at": "2022-05-16T21:25:32Z",
"updated_at": "2022-05-17T05:09:02Z",
"pushed_at": "2022-03-22T17:56:41Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 9,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 21,
"forks": 10,
"watchers": 23,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2018-2628 & CVE-2018-2893",
"fork": false,
"created_at": "2018-04-18T05:41:23Z",
"updated_at": "2022-05-04T13:21:42Z",
"updated_at": "2022-05-17T02:14:07Z",
"pushed_at": "2018-07-20T01:24:36Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 79,
"watchers": 80,
"score": 0
},
{
@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-16T02:18:34Z",
"updated_at": "2022-05-17T01:01:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1354,
"watchers_count": 1354,
"stargazers_count": 1355,
"watchers_count": 1355,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1354,
"watchers": 1355,
"score": 0
},
{

View file

@ -98,12 +98,12 @@
"pushed_at": "2018-10-24T17:42:47Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 26,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 25,
"watchers": 62,
"score": 0
},

View file

@ -310,10 +310,10 @@
"description": "Tries to exploit a WordPress vulnerability (CVE-2018-6389) which can be used to cause a Denial of Service.",
"fork": false,
"created_at": "2018-03-04T13:33:15Z",
"updated_at": "2018-09-18T13:02:37Z",
"updated_at": "2022-05-17T03:08:33Z",
"pushed_at": "2018-03-10T11:57:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -328,7 +328,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2022-05-14T07:51:10Z",
"updated_at": "2022-05-17T05:49:17Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1717,
"watchers_count": 1717,
"stargazers_count": 1718,
"watchers_count": 1718,
"forks_count": 262,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 262,
"watchers": 1717,
"watchers": 1718,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 99,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 99,
"forks": 100,
"watchers": 179,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "LPE Exploit For CVE-2019-12181 (Serv-U FTP 15.1.6)",
"fork": false,
"created_at": "2019-06-12T22:18:45Z",
"updated_at": "2021-12-05T22:08:03Z",
"updated_at": "2022-05-17T03:03:55Z",
"pushed_at": "2019-10-20T21:36:23Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-12725 ZeroShell 远程命令执行漏洞",
"fork": false,
"created_at": "2021-04-27T03:36:33Z",
"updated_at": "2021-12-18T11:13:16Z",
"updated_at": "2022-05-17T02:20:21Z",
"pushed_at": "2021-07-02T06:51:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-05-16T10:05:56Z",
"updated_at": "2022-05-17T05:39:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3314,
"watchers_count": 3314,
"forks_count": 993,
"stargazers_count": 3315,
"watchers_count": 3315,
"forks_count": 994,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 993,
"watchers": 3314,
"forks": 994,
"watchers": 3315,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-16T02:18:34Z",
"updated_at": "2022-05-17T01:01:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1354,
"watchers_count": 1354,
"stargazers_count": 1355,
"watchers_count": 1355,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1354,
"watchers": 1355,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2022-04-26T07:11:35Z",
"updated_at": "2022-05-17T02:17:05Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 582,
"watchers_count": 582,
"stargazers_count": 583,
"watchers_count": 583,
"forks_count": 155,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 155,
"watchers": 582,
"watchers": 583,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-05-16T10:05:56Z",
"updated_at": "2022-05-17T05:39:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3314,
"watchers_count": 3314,
"forks_count": 993,
"stargazers_count": 3315,
"watchers_count": 3315,
"forks_count": 994,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 993,
"watchers": 3314,
"forks": 994,
"watchers": 3315,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-16T02:18:34Z",
"updated_at": "2022-05-17T01:01:44Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1354,
"watchers_count": 1354,
"stargazers_count": 1355,
"watchers_count": 1355,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1354,
"watchers": 1355,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2022-01-13T11:57:21Z",
"updated_at": "2022-05-17T01:10:34Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 101,
"watchers": 102,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-05-16T03:00:23Z",
"updated_at": "2022-05-17T04:47:22Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1560,
"watchers_count": 1560,
"stargazers_count": 1561,
"watchers_count": 1561,
"forks_count": 561,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 561,
"watchers": 1560,
"watchers": 1561,
"score": 0
},
{

View file

@ -152,17 +152,17 @@
"description": "CVE-2021-25646 Apache Druid 远程代码执行漏洞 Wker脚本",
"fork": false,
"created_at": "2021-04-14T15:36:04Z",
"updated_at": "2021-04-22T07:56:07Z",
"updated_at": "2022-05-17T02:20:31Z",
"pushed_at": "2021-04-15T09:55:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2022-05-13T12:52:39Z",
"updated_at": "2022-05-17T01:55:13Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 211,
"watchers": 212,
"score": 0
},
{
@ -260,17 +260,17 @@
"description": "Add revert shell ",
"fork": false,
"created_at": "2022-04-08T06:34:17Z",
"updated_at": "2022-05-16T16:20:14Z",
"updated_at": "2022-05-17T05:08:54Z",
"pushed_at": "2022-04-08T06:59:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -875,10 +875,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-05-12T15:15:43Z",
"updated_at": "2022-05-17T05:55:17Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 505,
"watchers_count": 505,
"stargazers_count": 506,
"watchers_count": 506,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
@ -887,7 +887,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 505,
"watchers": 506,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 exploits in powershell",
"fork": false,
"created_at": "2022-04-01T09:10:14Z",
"updated_at": "2022-04-25T14:08:56Z",
"updated_at": "2022-05-17T03:29:04Z",
"pushed_at": "2022-04-04T08:33:41Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -107,37 +107,6 @@
"watchers": 12,
"score": 0
},
{
"id": 435877595,
"name": "CVE-2021-43798",
"full_name": "Mr-xn\/CVE-2021-43798",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-07T12:47:58Z",
"updated_at": "2022-04-11T04:08:51Z",
"pushed_at": "2021-12-07T16:27:56Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"grafana",
"vulnerability"
],
"visibility": "public",
"forks": 8,
"watchers": 29,
"score": 0
},
{
"id": 435904073,
"name": "CVE-2021-43798-Grafana-Exp",

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-12-15T06:18:15Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 12,
"score": 0
},
@ -2306,10 +2306,10 @@
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
"fork": false,
"created_at": "2021-12-12T11:26:42Z",
"updated_at": "2022-05-15T16:56:25Z",
"updated_at": "2022-05-17T04:56:08Z",
"pushed_at": "2021-12-12T17:37:11Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -2324,7 +2324,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 58,
"watchers": 59,
"score": 0
},
{
@ -3406,17 +3406,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-05-16T19:48:10Z",
"updated_at": "2022-05-17T05:02:46Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2879,
"watchers_count": 2879,
"stargazers_count": 2880,
"watchers_count": 2880,
"forks_count": 709,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 709,
"watchers": 2879,
"watchers": 2880,
"score": 0
},
{
@ -9393,10 +9393,10 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2022-05-05T06:12:56Z",
"updated_at": "2022-05-17T04:22:44Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@ -9408,7 +9408,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 95,
"watchers": 96,
"score": 0
},
{
@ -9554,6 +9554,36 @@
"watchers": 0,
"score": 0
},
{
"id": 443941194,
"name": "log4j2-test",
"full_name": "mklinkj\/log4j2-test",
"owner": {
"login": "mklinkj",
"id": 96992046,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96992046?v=4",
"html_url": "https:\/\/github.com\/mklinkj"
},
"html_url": "https:\/\/github.com\/mklinkj\/log4j2-test",
"description": "Log4j2 LDAP 취약점 테스트 (CVE-2021-44228)",
"fork": false,
"created_at": "2022-01-03T04:36:41Z",
"updated_at": "2022-01-09T19:59:25Z",
"pushed_at": "2022-05-17T05:17:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"log4j2"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 444275342,
"name": "4jfinder.github.io",

View file

@ -283,17 +283,17 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2022-05-16T14:05:14Z",
"updated_at": "2022-05-17T04:29:10Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 189,
"watchers_count": 189,
"forks_count": 28,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 189,
"forks": 29,
"watchers": 192,
"score": 0
},
{
@ -310,10 +310,10 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-05-09T14:01:38Z",
"updated_at": "2022-05-16T12:50:20Z",
"updated_at": "2022-05-17T01:16:18Z",
"pushed_at": "2022-05-09T14:20:40Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -323,7 +323,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -425,12 +425,12 @@
"pushed_at": "2022-05-09T16:14:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -1254,5 +1254,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 493080053,
"name": "F5-BIG-IP-exploit",
"full_name": "getdrive\/F5-BIG-IP-exploit",
"owner": {
"login": "getdrive",
"id": 20697688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20697688?v=4",
"html_url": "https:\/\/github.com\/getdrive"
},
"html_url": "https:\/\/github.com\/getdrive\/F5-BIG-IP-exploit",
"description": "CVE-2022-1388",
"fork": false,
"created_at": "2022-05-17T03:23:39Z",
"updated_at": "2022-05-17T03:24:54Z",
"pushed_at": "2022-05-17T03:35:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": " The plugin, used as a companion for the Discy and Himer themes, does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacks",
"fork": false,
"created_at": "2022-05-16T15:33:48Z",
"updated_at": "2022-05-16T15:33:48Z",
"updated_at": "2022-05-17T03:10:49Z",
"pushed_at": "2022-05-16T15:53:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -47,12 +47,12 @@
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 44,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 44,
"forks": 45,
"watchers": 258,
"score": 0
},

View file

@ -1070,17 +1070,17 @@
"description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)",
"fork": false,
"created_at": "2022-04-04T21:01:26Z",
"updated_at": "2022-05-02T18:26:49Z",
"updated_at": "2022-05-17T01:58:50Z",
"pushed_at": "2022-04-07T16:04:53Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-05-16T09:05:09Z",
"updated_at": "2022-05-17T00:48:44Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 104,
"watchers": 105,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.",
"fork": false,
"created_at": "2022-05-14T09:27:06Z",
"updated_at": "2022-05-16T11:08:46Z",
"updated_at": "2022-05-17T05:45:38Z",
"pushed_at": "2022-05-14T20:56:39Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"forks": 3,
"watchers": 10,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Django QuerySet.annotate(), aggregate(), extra() SQL 注入",
"fork": false,
"created_at": "2022-04-26T14:47:56Z",
"updated_at": "2022-05-16T00:54:14Z",
"updated_at": "2022-05-17T02:28:35Z",
"pushed_at": "2022-05-13T08:58:13Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-05-16T09:18:47Z",
"updated_at": "2022-05-17T05:09:21Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 658,
"watchers_count": 658,
"stargazers_count": 661,
"watchers_count": 661,
"forks_count": 107,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 658,
"watchers": 661,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-22T10:06:59Z",
"updated_at": "2022-05-16T19:17:33Z",
"updated_at": "2022-05-17T04:57:51Z",
"pushed_at": "2022-05-14T06:21:21Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"forks": 1,
"watchers": 10,
"score": 0
},
{

View file

@ -330,6 +330,7 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
- [PsychoSec2/CVE-2022-1388-POC](https://github.com/PsychoSec2/CVE-2022-1388-POC)
- [iveresk/cve-2022-1388-iveresk-command-shell](https://github.com/iveresk/cve-2022-1388-iveresk-command-shell)
- [Wrin9/CVE-2022-1388](https://github.com/Wrin9/CVE-2022-1388)
- [getdrive/F5-BIG-IP-exploit](https://github.com/getdrive/F5-BIG-IP-exploit)
### CVE-2022-1598
- [V35HR4J/CVE-2022-1598](https://github.com/V35HR4J/CVE-2022-1598)
@ -5133,7 +5134,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
- [Mr-xn/CVE-2021-43798](https://github.com/Mr-xn/CVE-2021-43798)
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
- [j-jasson/CVE-2021-43798-grafana_fileread](https://github.com/j-jasson/CVE-2021-43798-grafana_fileread)
@ -5610,6 +5610,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
- [marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV](https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV)
- [mklinkj/log4j2-test](https://github.com/mklinkj/log4j2-test)
- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io)
- [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-)
- [kanitan/log4j2-web-vulnerable](https://github.com/kanitan/log4j2-web-vulnerable)
@ -20707,7 +20708,7 @@ Huawei HG255s-10 V100R001C163B025SP02 has a path traversal vulnerability due to
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
</code>
- [maxbitcoin/Jackson-CVE-2017-17485](https://github.com/maxbitcoin/Jackson-CVE-2017-17485)
- [rootsecurity/Jackson-CVE-2017-17485](https://github.com/rootsecurity/Jackson-CVE-2017-17485)
- [tafamace/CVE-2017-17485](https://github.com/tafamace/CVE-2017-17485)
- [x7iaob/cve-2017-17485](https://github.com/x7iaob/cve-2017-17485)
- [Al1ex/CVE-2017-17485](https://github.com/Al1ex/CVE-2017-17485)