Auto Update 2022/01/12 12:18:50

This commit is contained in:
motikan2010-bot 2022-01-12 21:18:50 +09:00
parent 754ac06de6
commit 5ff92de83a
28 changed files with 280 additions and 196 deletions

View file

@ -13,19 +13,19 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2022-01-09T14:31:01Z",
"updated_at": "2022-01-12T10:42:45Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 329,
"watchers_count": 329,
"forks_count": 102,
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 103,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2008-0166"
],
"visibility": "public",
"forks": 102,
"watchers": 329,
"forks": 103,
"watchers": 330,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2021-12-15T14:35:46Z",
"updated_at": "2022-01-12T06:18:21Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 468,
"watchers_count": 468,
"stargazers_count": 469,
"watchers_count": 469,
"forks_count": 188,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 188,
"watchers": 468,
"watchers": 469,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 72,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 72,
"forks": 73,
"watchers": 287,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-01-11T13:35:38Z",
"updated_at": "2022-01-12T10:20:16Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3095,
"watchers_count": 3095,
"stargazers_count": 3096,
"watchers_count": 3096,
"forks_count": 916,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 916,
"watchers": 3095,
"watchers": 3096,
"score": 0
},
{

View file

@ -25,5 +25,32 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 447195023,
"name": "CVE-2019-18276",
"full_name": "SABI-Ensimag\/CVE-2019-18276",
"owner": {
"login": "SABI-Ensimag",
"id": 97602072,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97602072?v=4",
"html_url": "https:\/\/github.com\/SABI-Ensimag"
},
"html_url": "https:\/\/github.com\/SABI-Ensimag\/CVE-2019-18276",
"description": null,
"fork": false,
"created_at": "2022-01-12T11:40:57Z",
"updated_at": "2022-01-12T11:56:33Z",
"pushed_at": "2022-01-12T11:56:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4",
"fork": false,
"created_at": "2020-02-02T16:42:32Z",
"updated_at": "2021-09-04T04:30:33Z",
"updated_at": "2022-01-12T07:11:58Z",
"pushed_at": "2020-02-03T15:11:25Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 65,
"watchers": 64,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2021-12-15T14:38:23Z",
"updated_at": "2022-01-12T09:32:09Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 191,
"watchers": 192,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2022-01-09T18:01:54Z",
"updated_at": "2022-01-12T06:31:52Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 605,
"watchers_count": 605,
"stargazers_count": 606,
"watchers_count": 606,
"forks_count": 201,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 201,
"watchers": 605,
"watchers": 606,
"score": 0
},
{

View file

@ -25,5 +25,32 @@
"forks": 16,
"watchers": 43,
"score": 0
},
{
"id": 447177303,
"name": "linux-4.19.72_CVE-2020-14386",
"full_name": "artsking\/linux-4.19.72_CVE-2020-14386",
"owner": {
"login": "artsking",
"id": 87514725,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87514725?v=4",
"html_url": "https:\/\/github.com\/artsking"
},
"html_url": "https:\/\/github.com\/artsking\/linux-4.19.72_CVE-2020-14386",
"description": null,
"fork": false,
"created_at": "2022-01-12T10:41:44Z",
"updated_at": "2022-01-12T10:52:16Z",
"pushed_at": "2022-01-12T10:53:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-01-11T16:18:15Z",
"updated_at": "2022-01-12T06:48:35Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1408,
"watchers_count": 1408,
"stargazers_count": 1409,
"watchers_count": 1409,
"forks_count": 315,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 315,
"watchers": 1408,
"watchers": 1409,
"score": 0
},
{
@ -402,12 +402,12 @@
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 64,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-01-11T13:35:38Z",
"updated_at": "2022-01-12T10:20:16Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3095,
"watchers_count": 3095,
"stargazers_count": 3096,
"watchers_count": 3096,
"forks_count": 916,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 916,
"watchers": 3095,
"watchers": 3096,
"score": 0
},
{

29
2020/CVE-2020-15261.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 447164459,
"name": "CVE-2020-15261",
"full_name": "yaoyao-cool\/CVE-2020-15261",
"owner": {
"login": "yaoyao-cool",
"id": 61368305,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61368305?v=4",
"html_url": "https:\/\/github.com\/yaoyao-cool"
},
"html_url": "https:\/\/github.com\/yaoyao-cool\/CVE-2020-15261",
"description": "CVE-2020-15261 test",
"fork": false,
"created_at": "2022-01-12T10:00:39Z",
"updated_at": "2022-01-12T10:00:39Z",
"pushed_at": "2022-01-12T10:00:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Powershell implemetation of CVE-2020-7352",
"fork": false,
"created_at": "2022-01-05T00:11:58Z",
"updated_at": "2022-01-11T10:59:57Z",
"updated_at": "2022-01-12T09:04:59Z",
"pushed_at": "2022-01-11T10:58:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
"fork": false,
"created_at": "2021-03-08T05:07:15Z",
"updated_at": "2021-12-16T09:50:21Z",
"updated_at": "2022-01-12T12:17:01Z",
"pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
"fork": false,
"created_at": "2022-01-11T02:25:25Z",
"updated_at": "2022-01-11T11:25:40Z",
"updated_at": "2022-01-12T12:05:31Z",
"pushed_at": "2022-01-11T11:22:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,8 +26,8 @@
"rce"
],
"visibility": "public",
"forks": 4,
"watchers": 0,
"forks": 9,
"watchers": 18,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
"fork": false,
"created_at": "2021-06-22T03:04:50Z",
"updated_at": "2021-12-15T14:42:22Z",
"updated_at": "2022-01-12T06:57:08Z",
"pushed_at": "2021-06-22T04:35:08Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 60,
"watchers": 61,
"score": 0
},
{

View file

@ -1,29 +0,0 @@
[
{
"id": 396769362,
"name": "CVE-2021-25790-Multiple-Stored-XSS",
"full_name": "MrCraniums\/CVE-2021-25790-Multiple-Stored-XSS",
"owner": {
"login": "MrCraniums",
"id": 10303989,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10303989?v=4",
"html_url": "https:\/\/github.com\/MrCraniums"
},
"html_url": "https:\/\/github.com\/MrCraniums\/CVE-2021-25790-Multiple-Stored-XSS",
"description": "CVE-2021-25790-Multiple-Stored-XSS : Multiple Stored XSS in House Rental and Property Listing",
"fork": false,
"created_at": "2021-08-16T11:46:02Z",
"updated_at": "2021-08-16T11:50:43Z",
"pushed_at": "2021-08-16T11:50:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
"fork": false,
"created_at": "2021-03-03T17:36:18Z",
"updated_at": "2021-08-14T03:36:25Z",
"updated_at": "2022-01-12T11:59:39Z",
"pushed_at": "2021-03-05T17:09:01Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 20,
"watchers": 21,
"score": 0
},
{
@ -299,10 +299,10 @@
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
"fork": false,
"created_at": "2021-03-08T11:54:32Z",
"updated_at": "2021-12-15T14:41:37Z",
"updated_at": "2022-01-12T09:43:49Z",
"pushed_at": "2021-03-17T11:21:52Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -317,7 +317,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 135,
"watchers": 136,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-11T16:03:38Z",
"updated_at": "2022-01-12T03:59:23Z",
"updated_at": "2022-01-12T06:50:57Z",
"pushed_at": "2022-01-11T16:52:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -17,13 +17,40 @@
"pushed_at": "2022-01-11T08:15:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 447197307,
"name": "CVE-2021-32099",
"full_name": "ibnuuby\/CVE-2021-32099",
"owner": {
"login": "ibnuuby",
"id": 28418984,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28418984?v=4",
"html_url": "https:\/\/github.com\/ibnuuby"
},
"html_url": "https:\/\/github.com\/ibnuuby\/CVE-2021-32099",
"description": "CVE-2021-32099",
"fork": false,
"created_at": "2022-01-12T11:48:34Z",
"updated_at": "2022-01-12T11:48:34Z",
"pushed_at": "2022-01-12T11:49:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 38,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
"fork": false,
"created_at": "2021-06-28T09:43:31Z",
"updated_at": "2022-01-01T05:23:30Z",
"updated_at": "2022-01-12T10:36:26Z",
"pushed_at": "2021-08-03T14:48:27Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 35,
"watchers": 36,
"score": 0
}
]

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-01-11T09:21:46Z",
"updated_at": "2022-01-12T07:39:45Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1342,
"watchers_count": 1342,
"stargazers_count": 1343,
"watchers_count": 1343,
"forks_count": 442,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 442,
"watchers": 1342,
"watchers": 1343,
"score": 0
},
{
@ -923,17 +923,17 @@
"description": "CVE-2021-40444",
"fork": false,
"created_at": "2021-12-19T08:16:07Z",
"updated_at": "2022-01-12T05:45:03Z",
"updated_at": "2022-01-12T09:16:16Z",
"pushed_at": "2021-12-19T08:27:33Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 14,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 43,
"forks": 17,
"watchers": 45,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2022-01-06T12:35:56Z",
"updated_at": "2022-01-12T06:40:33Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 363,
"watchers_count": 363,
"stargazers_count": 364,
"watchers_count": 364,
"forks_count": 80,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 363,
"watchers": 364,
"score": 0
},
{

View file

@ -293,10 +293,10 @@
"description": "Apache 远程代码执行 CVE-2021-42013批量检测工具Apache HTTP Server是美国阿帕奇Apache基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
"fork": false,
"created_at": "2021-12-23T14:46:41Z",
"updated_at": "2022-01-10T02:26:59Z",
"updated_at": "2022-01-12T09:59:48Z",
"pushed_at": "2021-12-24T07:38:39Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -309,7 +309,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-01-12T03:54:49Z",
"updated_at": "2022-01-12T10:36:56Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 39,
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 192,
"forks": 40,
"watchers": 196,
"score": 0
},
{

View file

@ -156,10 +156,10 @@
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
"fork": false,
"created_at": "2021-12-10T06:42:37Z",
"updated_at": "2022-01-05T08:08:21Z",
"updated_at": "2022-01-12T09:40:34Z",
"pushed_at": "2021-12-11T02:49:41Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -179,7 +179,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 95,
"watchers": 99,
"score": 0
},
{
@ -390,17 +390,17 @@
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-01-12T03:23:45Z",
"updated_at": "2022-01-12T09:20:39Z",
"pushed_at": "2021-12-27T10:27:42Z",
"stargazers_count": 903,
"watchers_count": 903,
"stargazers_count": 904,
"watchers_count": 904,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 903,
"watchers": 904,
"score": 0
},
{
@ -786,14 +786,14 @@
{
"id": 437124793,
"name": "log4noshell",
"full_name": "alerithe\/log4noshell",
"full_name": "suhtiva\/log4noshell",
"owner": {
"login": "alerithe",
"login": "suhtiva",
"id": 31022473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4",
"html_url": "https:\/\/github.com\/alerithe"
"html_url": "https:\/\/github.com\/suhtiva"
},
"html_url": "https:\/\/github.com\/alerithe\/log4noshell",
"html_url": "https:\/\/github.com\/suhtiva\/log4noshell",
"description": "Java agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \"Log4Shell.\"",
"fork": false,
"created_at": "2021-12-10T21:59:31Z",
@ -905,11 +905,11 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-01-12T03:53:27Z",
"updated_at": "2022-01-12T10:27:35Z",
"pushed_at": "2022-01-02T07:12:10Z",
"stargazers_count": 1143,
"watchers_count": 1143,
"forks_count": 291,
"stargazers_count": 1145,
"watchers_count": 1145,
"forks_count": 293,
"allow_forking": true,
"is_template": false,
"topics": [
@ -919,8 +919,8 @@
"security"
],
"visibility": "public",
"forks": 291,
"watchers": 1143,
"forks": 293,
"watchers": 1145,
"score": 0
},
{
@ -1885,10 +1885,10 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-01-11T22:29:02Z",
"updated_at": "2022-01-12T07:24:58Z",
"pushed_at": "2022-01-07T09:40:06Z",
"stargazers_count": 569,
"watchers_count": 569,
"stargazers_count": 570,
"watchers_count": 570,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
@ -1907,7 +1907,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 569,
"watchers": 570,
"score": 0
},
{
@ -2348,10 +2348,10 @@
"description": "Log4J CVE-2021-44228 Minecraft PoC",
"fork": false,
"created_at": "2021-12-12T11:22:51Z",
"updated_at": "2021-12-20T05:53:38Z",
"updated_at": "2022-01-12T09:47:57Z",
"pushed_at": "2021-12-12T11:34:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -2363,7 +2363,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -2446,7 +2446,7 @@
"fork": false,
"created_at": "2021-12-12T11:28:34Z",
"updated_at": "2022-01-11T13:47:29Z",
"pushed_at": "2022-01-11T10:22:26Z",
"pushed_at": "2022-01-12T09:53:43Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 7,
@ -2507,17 +2507,17 @@
"description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.",
"fork": false,
"created_at": "2021-12-12T12:16:07Z",
"updated_at": "2022-01-05T11:19:28Z",
"updated_at": "2022-01-12T07:38:51Z",
"pushed_at": "2021-12-28T22:21:52Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 48,
"watchers": 49,
"score": 0
},
{
@ -3539,17 +3539,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-12T05:22:57Z",
"updated_at": "2022-01-12T08:34:50Z",
"pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2576,
"watchers_count": 2576,
"stargazers_count": 2580,
"watchers_count": 2580,
"forks_count": 615,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 615,
"watchers": 2576,
"watchers": 2580,
"score": 0
},
{
@ -5239,10 +5239,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-01-11T18:23:02Z",
"updated_at": "2022-01-12T11:42:16Z",
"pushed_at": "2021-12-27T15:12:20Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -5255,7 +5255,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 252,
"watchers": 253,
"score": 0
},
{
@ -5413,11 +5413,11 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-01-12T04:18:43Z",
"updated_at": "2022-01-12T10:05:37Z",
"pushed_at": "2022-01-12T03:31:50Z",
"stargazers_count": 383,
"watchers_count": 383,
"forks_count": 80,
"stargazers_count": 385,
"watchers_count": 385,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
"topics": [
@ -5431,8 +5431,8 @@
"python"
],
"visibility": "public",
"forks": 80,
"watchers": 383,
"forks": 82,
"watchers": 385,
"score": 0
},
{
@ -6000,12 +6000,12 @@
"pushed_at": "2022-01-12T03:28:41Z",
"stargazers_count": 314,
"watchers_count": 314,
"forks_count": 85,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 85,
"forks": 84,
"watchers": 314,
"score": 0
},
@ -7066,7 +7066,7 @@
"fork": false,
"created_at": "2021-12-16T12:20:00Z",
"updated_at": "2021-12-20T15:36:11Z",
"pushed_at": "2021-12-20T15:36:08Z",
"pushed_at": "2022-01-12T08:53:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -8691,12 +8691,12 @@
"pushed_at": "2021-12-21T06:11:58Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0
},
@ -10044,17 +10044,17 @@
"description": "Backdoor detection for VMware view",
"fork": false,
"created_at": "2022-01-05T11:27:16Z",
"updated_at": "2022-01-09T20:43:16Z",
"updated_at": "2022-01-12T09:25:48Z",
"pushed_at": "2022-01-05T12:37:39Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -10125,17 +10125,17 @@
"description": "Log4jshell - CVE-2021-44228",
"fork": false,
"created_at": "2022-01-07T09:56:30Z",
"updated_at": "2022-01-07T14:01:21Z",
"updated_at": "2022-01-12T06:44:17Z",
"pushed_at": "2022-01-07T14:01:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -1147,14 +1147,6 @@ A security issue was discovered in kube-apiserver that could allow node updates
- [darryk10/CVE-2021-25735](https://github.com/darryk10/CVE-2021-25735)
### CVE-2021-25790 (2021-07-23)
<code>
Multiple stored cross site scripting (XSS) vulnerabilities in the &quot;Register&quot; module of House Rental and Property Listing 1.0 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payloads in all text fields except for Phone Number and Alternate Phone Number.
</code>
- [MrCraniums/CVE-2021-25790-Multiple-Stored-XSS](https://github.com/MrCraniums/CVE-2021-25790-Multiple-Stored-XSS)
### CVE-2021-26084 (2021-08-30)
<code>
@ -2019,6 +2011,7 @@ A SQL injection vulnerability in the pandora_console component of Artica Pandora
</code>
- [zjicmDarkWing/CVE-2021-32099](https://github.com/zjicmDarkWing/CVE-2021-32099)
- [ibnuuby/CVE-2021-32099](https://github.com/ibnuuby/CVE-2021-32099)
### CVE-2021-32202 (2021-09-14)
@ -3614,7 +3607,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [StandB/CVE-2021-44228-poc](https://github.com/StandB/CVE-2021-44228-poc)
- [seamus-dev/CVE-2021-44228](https://github.com/seamus-dev/CVE-2021-44228)
- [takito1812/log4j-detect](https://github.com/takito1812/log4j-detect)
- [alerithe/log4noshell](https://github.com/alerithe/log4noshell)
- [suhtiva/log4noshell](https://github.com/suhtiva/log4noshell)
- [Azeemering/CVE-2021-44228-DFIR-Notes](https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes)
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
@ -7099,6 +7092,7 @@ A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be ex
</code>
- [cgwalters/cve-2020-14386](https://github.com/cgwalters/cve-2020-14386)
- [artsking/linux-4.19.72_CVE-2020-14386](https://github.com/artsking/linux-4.19.72_CVE-2020-14386)
### CVE-2020-14644 (2020-07-15)
@ -7301,6 +7295,14 @@ containerd is an industry-standard container runtime and is available as a daemo
- [nccgroup/abstractshimmer](https://github.com/nccgroup/abstractshimmer)
### CVE-2020-15261 (2020-10-19)
<code>
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.
</code>
- [yaoyao-cool/CVE-2020-15261](https://github.com/yaoyao-cool/CVE-2020-15261)
### CVE-2020-15349 (2020-11-16)
<code>
@ -12170,6 +12172,7 @@ An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0
</code>
- [M-ensimag/CVE-2019-18276](https://github.com/M-ensimag/CVE-2019-18276)
- [SABI-Ensimag/CVE-2019-18276](https://github.com/SABI-Ensimag/CVE-2019-18276)
### CVE-2019-18371 (2019-10-23)