mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/10/05 06:16:59
This commit is contained in:
parent
21a298190a
commit
60774911b8
48 changed files with 320 additions and 469 deletions
|
@ -129,13 +129,13 @@
|
|||
"pushed_at": "2021-09-28T16:14:13Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 9,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 8,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-04T06:04:27Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1515,
|
||||
"watchers_count": 1515,
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1515,
|
||||
"watchers": 1516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-04T06:04:27Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1515,
|
||||
"watchers_count": 1515,
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1515,
|
||||
"watchers": 1516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-04T06:04:27Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1515,
|
||||
"watchers_count": 1515,
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1515,
|
||||
"watchers": 1516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2019-03-25T02:38:06Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 28,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"forks": 27,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -135,13 +135,13 @@
|
|||
"pushed_at": "2021-10-31T07:06:25Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 26,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2018-12-05T21:42:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 15,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 14,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -549,10 +549,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-04T06:04:27Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1515,
|
||||
"watchers_count": 1515,
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -581,7 +581,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1515,
|
||||
"watchers": 1516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,13 +45,13 @@
|
|||
"pushed_at": "2018-11-13T00:26:18Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 45,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 44,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -45,13 +45,13 @@
|
|||
"pushed_at": "2019-12-13T02:24:39Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 61,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"forks": 60,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2018-12-30T11:53:08Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 115,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"forks": 114,
|
||||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2019-03-25T12:10:40Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 19,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 18,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2019-04-09T16:49:19Z",
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"forks_count": 103,
|
||||
"forks_count": 102,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"forks": 102,
|
||||
"watchers": 236,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-07-26T03:24:38Z",
|
||||
"updated_at": "2022-06-09T10:28:40Z",
|
||||
"pushed_at": "2022-01-21T23:27:44Z",
|
||||
"pushed_at": "2022-10-05T03:18:22Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -27,54 +27,6 @@
|
|||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 252131233,
|
||||
"name": "exphub",
|
||||
"full_name": "zhzyker\/exphub",
|
||||
"owner": {
|
||||
"login": "zhzyker",
|
||||
"id": 32918050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918050?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhzyker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhzyker\/exphub",
|
||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-10-03T08:03:59Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3562,
|
||||
"watchers_count": 3562,
|
||||
"forks_count": 1042,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-10199",
|
||||
"cve-2020-10204",
|
||||
"cve-2020-11444",
|
||||
"cve-2020-14882",
|
||||
"cve-2020-1938",
|
||||
"cve-2020-2551",
|
||||
"cve-2020-2555",
|
||||
"cve-2020-2883",
|
||||
"cve-2020-5902",
|
||||
"drupal",
|
||||
"exp",
|
||||
"exploit",
|
||||
"getshell",
|
||||
"nexus",
|
||||
"poc",
|
||||
"tomcat",
|
||||
"vulnerability",
|
||||
"weblogic",
|
||||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1042,
|
||||
"watchers": 3562,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 284893505,
|
||||
"name": "Solr_CVE-2019-17558",
|
||||
|
|
|
@ -181,10 +181,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-04T06:04:27Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1515,
|
||||
"watchers_count": 1515,
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -213,7 +213,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1515,
|
||||
"watchers": 1516,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2019-03-20T18:47:25Z",
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"forks_count": 88,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"forks": 87,
|
||||
"watchers": 257,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-11-23T11:35:34Z",
|
||||
"updated_at": "2022-05-17T22:04:12Z",
|
||||
"updated_at": "2022-10-05T05:25:44Z",
|
||||
"pushed_at": "2019-11-25T06:09:35Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-09-01T08:56:40Z",
|
||||
"stargazers_count": 655,
|
||||
"watchers_count": 655,
|
||||
"forks_count": 136,
|
||||
"forks_count": 135,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"forks": 135,
|
||||
"watchers": 655,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T15:44:29Z",
|
||||
"updated_at": "2022-09-12T09:41:38Z",
|
||||
"updated_at": "2022-10-05T01:43:43Z",
|
||||
"pushed_at": "2020-05-24T16:28:46Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -55,7 +55,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2019-03-25T02:41:43Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 14,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 13,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six unfixed Window DOS Vulnerabilities.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-23T11:10:49Z",
|
||||
"updated_at": "2022-07-21T15:56:08Z",
|
||||
"updated_at": "2022-10-05T05:55:32Z",
|
||||
"pushed_at": "2020-02-22T13:57:48Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2022-09-20T06:33:02Z",
|
||||
"updated_at": "2022-10-05T04:39:49Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 623,
|
||||
"watchers_count": 623,
|
||||
"stargazers_count": 624,
|
||||
"watchers_count": 624,
|
||||
"forks_count": 204,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -138,7 +138,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 204,
|
||||
"watchers": 623,
|
||||
"watchers": 624,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-21T14:56:30Z",
|
||||
"updated_at": "2022-07-25T13:36:09Z",
|
||||
"pushed_at": "2021-12-09T22:20:43Z",
|
||||
"pushed_at": "2022-10-05T04:29:23Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-26T15:11:03Z",
|
||||
"updated_at": "2022-02-23T14:25:48Z",
|
||||
"pushed_at": "2021-12-09T22:25:16Z",
|
||||
"pushed_at": "2022-10-05T04:30:54Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager role to RCE.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-28T19:46:55Z",
|
||||
"updated_at": "2022-08-05T17:46:44Z",
|
||||
"updated_at": "2022-10-05T05:49:41Z",
|
||||
"pushed_at": "2021-12-03T03:56:29Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -55,7 +55,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,52 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 252131233,
|
||||
"name": "exphub",
|
||||
"full_name": "zhzyker\/exphub",
|
||||
"owner": {
|
||||
"login": "zhzyker",
|
||||
"id": 32918050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918050?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhzyker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhzyker\/exphub",
|
||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-10-03T08:03:59Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3562,
|
||||
"watchers_count": 3562,
|
||||
"forks_count": 1042,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-10199",
|
||||
"cve-2020-10204",
|
||||
"cve-2020-11444",
|
||||
"cve-2020-14882",
|
||||
"cve-2020-1938",
|
||||
"cve-2020-2551",
|
||||
"cve-2020-2555",
|
||||
"cve-2020-2883",
|
||||
"cve-2020-5902",
|
||||
"drupal",
|
||||
"exp",
|
||||
"exploit",
|
||||
"getshell",
|
||||
"nexus",
|
||||
"poc",
|
||||
"tomcat",
|
||||
"vulnerability",
|
||||
"weblogic",
|
||||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1042,
|
||||
"watchers": 3562,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 307998445,
|
||||
"name": "CVE-2020-14882",
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-27T13:42:11Z",
|
||||
"updated_at": "2022-02-23T14:25:46Z",
|
||||
"pushed_at": "2021-12-09T22:26:54Z",
|
||||
"pushed_at": "2022-10-05T04:31:10Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-04T06:04:27Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1515,
|
||||
"watchers_count": 1515,
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1515,
|
||||
"watchers": 1516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/13852\/commits\/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s):\/\/IP:Port",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T18:45:53Z",
|
||||
"updated_at": "2022-07-03T15:31:30Z",
|
||||
"updated_at": "2022-10-05T05:49:41Z",
|
||||
"pushed_at": "2020-07-21T18:50:07Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -138,33 +138,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 544564976,
|
||||
"name": "CVE-2021-3493",
|
||||
"full_name": "Senz4wa\/CVE-2021-3493",
|
||||
"owner": {
|
||||
"login": "Senz4wa",
|
||||
"id": 82728308,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82728308?v=4",
|
||||
"html_url": "https:\/\/github.com\/Senz4wa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Senz4wa\/CVE-2021-3493",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-02T19:44:45Z",
|
||||
"updated_at": "2022-10-02T19:45:20Z",
|
||||
"pushed_at": "2022-10-02T19:45:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -145,38 +145,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 452094681,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "arthepsy\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "arthepsy",
|
||||
"id": 7356025,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7356025?v=4",
|
||||
"html_url": "https:\/\/github.com\/arthepsy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/arthepsy\/CVE-2021-4034",
|
||||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2022-09-26T06:22:30Z",
|
||||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 908,
|
||||
"watchers_count": 908,
|
||||
"forks_count": 298,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2021-4034",
|
||||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 298,
|
||||
"watchers": 908,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 452096662,
|
||||
"name": "CVE-2021-4034",
|
||||
|
@ -4292,33 +4260,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 544564312,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "Senz4wa\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "Senz4wa",
|
||||
"id": 82728308,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82728308?v=4",
|
||||
"html_url": "https:\/\/github.com\/Senz4wa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Senz4wa\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-02T19:42:24Z",
|
||||
"updated_at": "2022-10-02T19:43:01Z",
|
||||
"pushed_at": "2022-10-02T19:43:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1066,43 +1066,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 542775271,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "Juuso1337\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "Juuso1337",
|
||||
"id": 106491133,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106491133?v=4",
|
||||
"html_url": "https:\/\/github.com\/Juuso1337"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Juuso1337\/CVE-2021-41773",
|
||||
"description": "Apache 2.4.49 & 2.4.50 Path Traversal to RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-28T20:12:34Z",
|
||||
"updated_at": "2022-10-03T17:16:18Z",
|
||||
"pushed_at": "2022-09-30T00:07:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apache",
|
||||
"apache2",
|
||||
"cve",
|
||||
"cve-2021-41773",
|
||||
"cve-2021-42013",
|
||||
"cybersecurity",
|
||||
"exploit",
|
||||
"httpd",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2022-10-02T18:30:16Z",
|
||||
"updated_at": "2022-10-05T00:26:43Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1145,
|
||||
"watchers_count": 1145,
|
||||
"stargazers_count": 1146,
|
||||
"watchers_count": 1146,
|
||||
"forks_count": 299,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 299,
|
||||
"watchers": 1145,
|
||||
"watchers": 1146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 543157100,
|
||||
"name": "Golang-CVE-2021-44077-POC",
|
||||
"full_name": "pizza-power\/Golang-CVE-2021-44077-POC",
|
||||
"owner": {
|
||||
"login": "pizza-power",
|
||||
"id": 6135659,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
|
||||
"html_url": "https:\/\/github.com\/pizza-power"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pizza-power\/Golang-CVE-2021-44077-POC",
|
||||
"description": "Golang Proof of Concept Exploit for CVE-2021-44077: PreAuth RCE in ManageEngine ServiceDesk Plus < 11306",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-29T14:07:54Z",
|
||||
"updated_at": "2022-09-29T14:30:51Z",
|
||||
"pushed_at": "2022-10-02T19:35:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -69,10 +69,10 @@
|
|||
"description": "Remote Code Injection In Log4j",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T05:23:44Z",
|
||||
"updated_at": "2022-09-28T10:05:52Z",
|
||||
"updated_at": "2022-10-05T05:24:13Z",
|
||||
"pushed_at": "2022-01-18T12:01:52Z",
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"stargazers_count": 402,
|
||||
"watchers_count": 402,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +80,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 401,
|
||||
"watchers": 402,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -795,6 +795,34 @@
|
|||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437381453,
|
||||
"name": "CVE-2021-44228_Example",
|
||||
"full_name": "chilliwebs\/CVE-2021-44228_Example",
|
||||
"owner": {
|
||||
"login": "chilliwebs",
|
||||
"id": 6079309,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6079309?v=4",
|
||||
"html_url": "https:\/\/github.com\/chilliwebs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chilliwebs\/CVE-2021-44228_Example",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T20:25:08Z",
|
||||
"updated_at": "2022-01-03T13:51:27Z",
|
||||
"pushed_at": "2021-12-15T20:27:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437419010,
|
||||
"name": "log4j-detector",
|
||||
|
@ -2199,10 +2227,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2022-10-04T02:23:59Z",
|
||||
"updated_at": "2022-10-05T05:25:47Z",
|
||||
"pushed_at": "2022-04-24T08:56:47Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2216,7 +2244,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 355,
|
||||
"watchers": 354,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2402,6 +2430,38 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438409343,
|
||||
"name": "log4j-remediation-tools",
|
||||
"full_name": "stripe\/log4j-remediation-tools",
|
||||
"owner": {
|
||||
"login": "stripe",
|
||||
"id": 856813,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/856813?v=4",
|
||||
"html_url": "https:\/\/github.com\/stripe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stripe\/log4j-remediation-tools",
|
||||
"description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T21:47:04Z",
|
||||
"updated_at": "2022-06-15T13:53:21Z",
|
||||
"pushed_at": "2021-12-15T20:37:05Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"log4j2",
|
||||
"remediation",
|
||||
"tools"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438417506,
|
||||
"name": "log4jshield",
|
||||
|
@ -2497,10 +2557,10 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2022-09-12T15:50:28Z",
|
||||
"updated_at": "2022-10-05T03:44:21Z",
|
||||
"pushed_at": "2022-03-23T18:12:51Z",
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2508,7 +2568,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 338,
|
||||
"watchers": 339,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2539,6 +2599,34 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438469428,
|
||||
"name": "CVE-2021-44228_scanner",
|
||||
"full_name": "jeremyrsellars\/CVE-2021-44228_scanner",
|
||||
"owner": {
|
||||
"login": "jeremyrsellars",
|
||||
"id": 1396319,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1396319?v=4",
|
||||
"html_url": "https:\/\/github.com\/jeremyrsellars"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jeremyrsellars\/CVE-2021-44228_scanner",
|
||||
"description": "Aims to find JndiLookup.class in nearly any directory or zip, jar, ear, war file, even deeply nested.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T02:31:14Z",
|
||||
"updated_at": "2021-12-15T22:30:35Z",
|
||||
"pushed_at": "2021-12-15T22:30:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438480170,
|
||||
"name": "C1-WS-LOG4SHELL",
|
||||
|
@ -2977,6 +3065,62 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438745261,
|
||||
"name": "log4j",
|
||||
"full_name": "alenazi90\/log4j",
|
||||
"owner": {
|
||||
"login": "alenazi90",
|
||||
"id": 3836915,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3836915?v=4",
|
||||
"html_url": "https:\/\/github.com\/alenazi90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alenazi90\/log4j",
|
||||
"description": "An automated header extensive scanner for detecting log4j RCE CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T19:15:00Z",
|
||||
"updated_at": "2021-12-16T15:10:52Z",
|
||||
"pushed_at": "2021-12-15T19:21:02Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438747026,
|
||||
"name": "log4j-cve-2021-44228",
|
||||
"full_name": "pmontesd\/log4j-cve-2021-44228",
|
||||
"owner": {
|
||||
"login": "pmontesd",
|
||||
"id": 8183561,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8183561?v=4",
|
||||
"html_url": "https:\/\/github.com\/pmontesd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pmontesd\/log4j-cve-2021-44228",
|
||||
"description": "Very simple Ansible playbook that scan filesystem for JAR files vulnerable to Log4Shell",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T19:21:39Z",
|
||||
"updated_at": "2022-01-12T13:13:44Z",
|
||||
"pushed_at": "2021-12-15T20:39:16Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438756678,
|
||||
"name": "log4shell",
|
||||
|
@ -4796,7 +4940,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-20T01:31:06Z",
|
||||
"updated_at": "2021-12-24T18:06:45Z",
|
||||
"pushed_at": "2022-09-09T18:22:24Z",
|
||||
"pushed_at": "2022-10-05T06:17:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -6143,37 +6287,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 443941194,
|
||||
"name": "log4j2-test",
|
||||
"full_name": "mklinkj\/log4j2-test",
|
||||
"owner": {
|
||||
"login": "mklinkj",
|
||||
"id": 96992046,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96992046?v=4",
|
||||
"html_url": "https:\/\/github.com\/mklinkj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mklinkj\/log4j2-test",
|
||||
"description": "Log4j2 LDAP 취약점 테스트 (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-03T04:36:41Z",
|
||||
"updated_at": "2022-01-09T19:59:25Z",
|
||||
"pushed_at": "2022-10-04T23:41:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-44228",
|
||||
"log4j2"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 444275342,
|
||||
"name": "4jfinder.github.io",
|
||||
|
|
|
@ -114,6 +114,34 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438746535,
|
||||
"name": "log4j2-CVE-2021-45046",
|
||||
"full_name": "pravin-pp\/log4j2-CVE-2021-45046",
|
||||
"owner": {
|
||||
"login": "pravin-pp",
|
||||
"id": 12995541,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4",
|
||||
"html_url": "https:\/\/github.com\/pravin-pp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-45046",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T19:19:52Z",
|
||||
"updated_at": "2021-12-15T19:42:14Z",
|
||||
"pushed_at": "2021-12-15T19:42:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439085356,
|
||||
"name": "log4j-samples",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T19:06:33Z",
|
||||
"updated_at": "2022-10-04T14:50:42Z",
|
||||
"updated_at": "2022-10-05T03:42:58Z",
|
||||
"pushed_at": "2022-04-03T15:07:31Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -89,10 +89,10 @@
|
|||
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T02:28:50Z",
|
||||
"updated_at": "2022-09-06T12:44:06Z",
|
||||
"updated_at": "2022-10-05T05:06:11Z",
|
||||
"pushed_at": "2022-01-20T02:07:59Z",
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -100,7 +100,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 364,
|
||||
"watchers": 365,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -153,10 +153,10 @@
|
|||
"description": "PoC of CVE-2022-24086",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-01T13:53:49Z",
|
||||
"updated_at": "2022-10-01T13:53:49Z",
|
||||
"updated_at": "2022-10-05T05:13:21Z",
|
||||
"pushed_at": "2022-10-01T13:54:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-10-04T17:37:38Z",
|
||||
"updated_at": "2022-10-05T03:41:48Z",
|
||||
"pushed_at": "2022-09-29T05:09:10Z",
|
||||
"stargazers_count": 791,
|
||||
"watchers_count": 791,
|
||||
|
|
|
@ -297,10 +297,10 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2022-10-02T03:31:42Z",
|
||||
"updated_at": "2022-10-05T06:15:47Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -308,7 +308,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 315,
|
||||
"watchers": 316,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -305,10 +305,10 @@
|
|||
"description": "Atlassian Bitbucket Server and Data Center - Command Injection Vulnerability (CVE-2022-36804)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T08:26:12Z",
|
||||
"updated_at": "2022-10-04T08:26:12Z",
|
||||
"updated_at": "2022-10-05T01:29:06Z",
|
||||
"pushed_at": "2022-10-04T08:51:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -316,7 +316,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -97,10 +97,10 @@
|
|||
"description": "CVE-2022-39197(CobaltStrike XSS <=4.7) POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-23T08:20:07Z",
|
||||
"updated_at": "2022-10-04T05:06:09Z",
|
||||
"updated_at": "2022-10-05T03:19:11Z",
|
||||
"pushed_at": "2022-09-30T06:31:11Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -213,10 +213,10 @@
|
|||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:58:21Z",
|
||||
"updated_at": "2022-10-04T09:15:29Z",
|
||||
"updated_at": "2022-10-05T03:59:47Z",
|
||||
"pushed_at": "2022-09-26T13:20:38Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -228,7 +228,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,33 +82,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 545619910,
|
||||
"name": "CVE-2022-41040-RCE-POC",
|
||||
"full_name": "kevin-beaum0nt\/CVE-2022-41040-RCE-POC",
|
||||
"owner": {
|
||||
"login": "kevin-beaum0nt",
|
||||
"id": 115032217,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115032217?v=4",
|
||||
"html_url": "https:\/\/github.com\/kevin-beaum0nt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kevin-beaum0nt\/CVE-2022-41040-RCE-POC",
|
||||
"description": "CVE-2022-41040-RCE-POC aka ProxyNotShell",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T17:36:06Z",
|
||||
"updated_at": "2022-10-04T17:42:39Z",
|
||||
"pushed_at": "2022-10-04T17:48:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -28,23 +28,23 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 545618174,
|
||||
"name": "CVE-2022-41082-RCE-POC",
|
||||
"full_name": "kevin-beaum0nt\/CVE-2022-41082-RCE-POC",
|
||||
"id": 545838270,
|
||||
"name": "CVE-2022-41082-RCE",
|
||||
"full_name": "V1v3ns\/CVE-2022-41082-RCE",
|
||||
"owner": {
|
||||
"login": "kevin-beaum0nt",
|
||||
"id": 115032217,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115032217?v=4",
|
||||
"html_url": "https:\/\/github.com\/kevin-beaum0nt"
|
||||
"login": "V1v3ns",
|
||||
"id": 115058707,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115058707?v=4",
|
||||
"html_url": "https:\/\/github.com\/V1v3ns"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kevin-beaum0nt\/CVE-2022-41082-RCE-POC",
|
||||
"description": "CVE-2022-41082-RCE-POC aka ProxyNotShell",
|
||||
"html_url": "https:\/\/github.com\/V1v3ns\/CVE-2022-41082-RCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T17:32:17Z",
|
||||
"updated_at": "2022-10-04T17:42:32Z",
|
||||
"pushed_at": "2022-10-04T17:33:31Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"created_at": "2022-10-05T04:03:27Z",
|
||||
"updated_at": "2022-10-05T04:03:40Z",
|
||||
"pushed_at": "2022-10-05T04:03:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Vulnerability Details for CVE-2022-41218",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-30T07:12:23Z",
|
||||
"updated_at": "2022-09-30T16:44:36Z",
|
||||
"updated_at": "2022-10-05T05:56:04Z",
|
||||
"pushed_at": "2022-10-01T12:01:06Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -3797,7 +3797,6 @@ Microsoft Exchange Server Elevation of Privilege Vulnerability.
|
|||
- [numanturle/CVE-2022-41040](https://github.com/numanturle/CVE-2022-41040)
|
||||
- [CentarisCyber/CVE-2022-41040_Mitigation](https://github.com/CentarisCyber/CVE-2022-41040_Mitigation)
|
||||
- [r3dcl1ff/CVE-2022-41040](https://github.com/r3dcl1ff/CVE-2022-41040)
|
||||
- [kevin-beaum0nt/CVE-2022-41040-RCE-POC](https://github.com/kevin-beaum0nt/CVE-2022-41040-RCE-POC)
|
||||
|
||||
### CVE-2022-41082 (2022-10-02)
|
||||
|
||||
|
@ -3806,7 +3805,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability.
|
|||
</code>
|
||||
|
||||
- [Diverto/nse-exchange](https://github.com/Diverto/nse-exchange)
|
||||
- [kevin-beaum0nt/CVE-2022-41082-RCE-POC](https://github.com/kevin-beaum0nt/CVE-2022-41082-RCE-POC)
|
||||
- [V1v3ns/CVE-2022-41082-RCE](https://github.com/V1v3ns/CVE-2022-41082-RCE)
|
||||
|
||||
### CVE-2022-41218 (2022-09-21)
|
||||
|
||||
|
@ -4773,7 +4772,6 @@ The overlayfs implementation in the linux kernel did not properly validate with
|
|||
- [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493)
|
||||
- [AmIAHuman/OverlayFS-CVE-2021-3493](https://github.com/AmIAHuman/OverlayFS-CVE-2021-3493)
|
||||
- [Ishan3011/CVE-2021-3493](https://github.com/Ishan3011/CVE-2021-3493)
|
||||
- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
|
||||
|
||||
### CVE-2021-3560 (2022-02-16)
|
||||
|
||||
|
@ -4860,7 +4858,6 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
|||
- [berdav/CVE-2021-4034](https://github.com/berdav/CVE-2021-4034)
|
||||
- [clubby789/CVE-2021-4034](https://github.com/clubby789/CVE-2021-4034)
|
||||
- [gbrsh/CVE-2021-4034](https://github.com/gbrsh/CVE-2021-4034)
|
||||
- [arthepsy/CVE-2021-4034](https://github.com/arthepsy/CVE-2021-4034)
|
||||
- [JohnHammond/CVE-2021-4034](https://github.com/JohnHammond/CVE-2021-4034)
|
||||
- [Audiobahn/CVE-2021-4034](https://github.com/Audiobahn/CVE-2021-4034)
|
||||
- [dzonerzy/poc-cve-2021-4034](https://github.com/dzonerzy/poc-cve-2021-4034)
|
||||
|
@ -5003,7 +5000,6 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
|||
- [Naughty-SEC/pkexec-shell-executor](https://github.com/Naughty-SEC/pkexec-shell-executor)
|
||||
- [1337Rin/CVE-2021-4034](https://github.com/1337Rin/CVE-2021-4034)
|
||||
- [flux10n/CVE-2021-4034](https://github.com/flux10n/CVE-2021-4034)
|
||||
- [Senz4wa/CVE-2021-4034](https://github.com/Senz4wa/CVE-2021-4034)
|
||||
|
||||
### CVE-2021-4043 (2022-02-04)
|
||||
|
||||
|
@ -7316,7 +7312,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [mightysai1997/CVE-2021-41773S](https://github.com/mightysai1997/CVE-2021-41773S)
|
||||
- [dileepdkumar/LayarKacaSiber-CVE-2021-41773](https://github.com/dileepdkumar/LayarKacaSiber-CVE-2021-41773)
|
||||
- [sne4ker/apache-CVE-2021-41773-CVE-2021-42013](https://github.com/sne4ker/apache-CVE-2021-41773-CVE-2021-42013)
|
||||
- [Juuso1337/CVE-2021-41773](https://github.com/Juuso1337/CVE-2021-41773)
|
||||
|
||||
### CVE-2021-41946 (2022-05-18)
|
||||
|
||||
|
@ -7791,14 +7786,6 @@ The software allows the attacker to upload or transfer files of dangerous types
|
|||
|
||||
- [LongWayHomie/CVE-2021-43936](https://github.com/LongWayHomie/CVE-2021-43936)
|
||||
|
||||
### CVE-2021-44077 (2021-11-28)
|
||||
|
||||
<code>
|
||||
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.
|
||||
</code>
|
||||
|
||||
- [pizza-power/Golang-CVE-2021-44077-POC](https://github.com/pizza-power/Golang-CVE-2021-44077-POC)
|
||||
|
||||
### CVE-2021-44117 (2022-06-10)
|
||||
|
||||
<code>
|
||||
|
@ -7864,6 +7851,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [datadavev/test-44228](https://github.com/datadavev/test-44228)
|
||||
- [LemonCraftRu/JndiRemover](https://github.com/LemonCraftRu/JndiRemover)
|
||||
- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
|
||||
- [chilliwebs/CVE-2021-44228_Example](https://github.com/chilliwebs/CVE-2021-44228_Example)
|
||||
- [mergebase/log4j-detector](https://github.com/mergebase/log4j-detector)
|
||||
- [corretto/hotpatch-for-apache-log4j2](https://github.com/corretto/hotpatch-for-apache-log4j2)
|
||||
- [alexandre-lavoie/python-log4rce](https://github.com/alexandre-lavoie/python-log4rce)
|
||||
|
@ -7917,10 +7905,12 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [BinaryDefense/log4j-honeypot-flask](https://github.com/BinaryDefense/log4j-honeypot-flask)
|
||||
- [MalwareTech/Log4jTools](https://github.com/MalwareTech/Log4jTools)
|
||||
- [guerzon/log4shellpoc](https://github.com/guerzon/log4shellpoc)
|
||||
- [stripe/log4j-remediation-tools](https://github.com/stripe/log4j-remediation-tools)
|
||||
- [xsultan/log4jshield](https://github.com/xsultan/log4jshield)
|
||||
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
|
||||
- [CERTCC/CVE-2021-44228_scanner](https://github.com/CERTCC/CVE-2021-44228_scanner)
|
||||
- [dbzoo/log4j_scanner](https://github.com/dbzoo/log4j_scanner)
|
||||
- [jeremyrsellars/CVE-2021-44228_scanner](https://github.com/jeremyrsellars/CVE-2021-44228_scanner)
|
||||
- [JustinDPerkins/C1-WS-LOG4SHELL](https://github.com/JustinDPerkins/C1-WS-LOG4SHELL)
|
||||
- [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul)
|
||||
- [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228)
|
||||
|
@ -7936,6 +7926,8 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)
|
||||
- [MkTech-0-8YT3/CVE-2021-44228](https://github.com/MkTech-0-8YT3/CVE-2021-44228)
|
||||
- [VerveIndustrialProtection/CVE-2021-44228-Log4j](https://github.com/VerveIndustrialProtection/CVE-2021-44228-Log4j)
|
||||
- [alenazi90/log4j](https://github.com/alenazi90/log4j)
|
||||
- [pmontesd/log4j-cve-2021-44228](https://github.com/pmontesd/log4j-cve-2021-44228)
|
||||
- [LiveOverflow/log4shell](https://github.com/LiveOverflow/log4shell)
|
||||
- [aws-samples/kubernetes-log4j-cve-2021-44228-node-agent](https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent)
|
||||
- [michaelsanford/Log4Shell-Honeypot](https://github.com/michaelsanford/Log4Shell-Honeypot)
|
||||
|
@ -8045,7 +8037,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
|
||||
- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
|
||||
- [marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV](https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV)
|
||||
- [mklinkj/log4j2-test](https://github.com/mklinkj/log4j2-test)
|
||||
- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io)
|
||||
- [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-)
|
||||
- [kanitan/log4j2-web-vulnerable](https://github.com/kanitan/log4j2-web-vulnerable)
|
||||
|
@ -8227,6 +8218,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i
|
|||
- [cckuailong/Log4j_CVE-2021-45046](https://github.com/cckuailong/Log4j_CVE-2021-45046)
|
||||
- [BobTheShoplifter/CVE-2021-45046-Info](https://github.com/BobTheShoplifter/CVE-2021-45046-Info)
|
||||
- [tejas-nagchandi/CVE-2021-45046](https://github.com/tejas-nagchandi/CVE-2021-45046)
|
||||
- [pravin-pp/log4j2-CVE-2021-45046](https://github.com/pravin-pp/log4j2-CVE-2021-45046)
|
||||
- [mergebase/log4j-samples](https://github.com/mergebase/log4j-samples)
|
||||
- [lukepasek/log4jjndilookupremove](https://github.com/lukepasek/log4jjndilookupremove)
|
||||
- [ludy-dev/cve-2021-45046](https://github.com/ludy-dev/cve-2021-45046)
|
||||
|
@ -12113,7 +12105,6 @@ Vulnerability in the Oracle Solaris product of Oracle Systems (component: Plugga
|
|||
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [zhzyker/exphub](https://github.com/zhzyker/exphub)
|
||||
- [jas502n/CVE-2020-14882](https://github.com/jas502n/CVE-2020-14882)
|
||||
- [s1kr10s/CVE-2020-14882](https://github.com/s1kr10s/CVE-2020-14882)
|
||||
- [Umarovm/-Patched-McMaster-University-Blind-Command-Injection](https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection)
|
||||
|
@ -17302,7 +17293,6 @@ Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution
|
|||
</code>
|
||||
|
||||
- [SDNDTeam/CVE-2019-17558_Solr_Vul_Tool](https://github.com/SDNDTeam/CVE-2019-17558_Solr_Vul_Tool)
|
||||
- [zhzyker/exphub](https://github.com/zhzyker/exphub)
|
||||
- [Ma1Dong/Solr_CVE-2019-17558](https://github.com/Ma1Dong/Solr_CVE-2019-17558)
|
||||
- [xkyrage/Exploit_CVE-2019-17558-RCE](https://github.com/xkyrage/Exploit_CVE-2019-17558-RCE)
|
||||
|
||||
|
|
Loading…
Reference in a new issue