Auto Update 2022/05/30 00:16:19

This commit is contained in:
motikan2010-bot 2022-05-30 09:16:19 +09:00
parent 2d599c9c94
commit 655cb7323c
11 changed files with 35 additions and 91 deletions

View file

@ -68,7 +68,7 @@
"fork": false,
"created_at": "2022-05-28T02:47:22Z",
"updated_at": "2022-05-28T15:06:54Z",
"pushed_at": "2022-05-29T18:04:26Z",
"pushed_at": "2022-05-29T18:04:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -936,17 +936,17 @@
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
"fork": false,
"created_at": "2015-03-08T19:54:33Z",
"updated_at": "2022-04-16T09:13:02Z",
"updated_at": "2022-05-29T23:35:24Z",
"pushed_at": "2021-02-20T19:41:03Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
"fork": false,
"created_at": "2022-05-26T01:13:42Z",
"updated_at": "2022-05-28T06:06:22Z",
"updated_at": "2022-05-29T23:05:25Z",
"pushed_at": "2022-05-26T19:14:20Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "proxylogon exploit - CVE-2021-26857",
"fork": false,
"created_at": "2021-03-11T17:32:32Z",
"updated_at": "2022-05-29T16:59:18Z",
"updated_at": "2022-05-29T22:51:56Z",
"pushed_at": "2021-03-11T17:34:15Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 112,
"watchers": 113,
"score": 0
},
{

View file

@ -2176,7 +2176,7 @@
"fork": false,
"created_at": "2022-01-28T13:38:24Z",
"updated_at": "2022-01-28T13:42:53Z",
"pushed_at": "2022-02-09T01:24:59Z",
"pushed_at": "2022-05-29T20:00:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -313,14 +313,14 @@
"pushed_at": "2022-02-24T12:04:51Z",
"stargazers_count": 987,
"watchers_count": 987,
"forks_count": 437,
"forks_count": 438,
"allow_forking": true,
"is_template": false,
"topics": [
"log4shell"
],
"visibility": "public",
"forks": 437,
"forks": 438,
"watchers": 987,
"score": 0
},
@ -358,33 +358,6 @@
"watchers": 123,
"score": 0
},
{
"id": 437026730,
"name": "VictimApp",
"full_name": "nkoneko\/VictimApp",
"owner": {
"login": "nkoneko",
"id": 1922341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4",
"html_url": "https:\/\/github.com\/nkoneko"
},
"html_url": "https:\/\/github.com\/nkoneko\/VictimApp",
"description": "Vulnerable to CVE-2021-44228. trustURLCodebase is not required.",
"fork": false,
"created_at": "2021-12-10T15:32:03Z",
"updated_at": "2021-12-15T14:43:30Z",
"pushed_at": "2021-12-10T22:40:15Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0
},
{
"id": 437031223,
"name": "pulsar-docker-images-patch-CVE-2021-44228",
@ -694,33 +667,6 @@
"watchers": 1377,
"score": 0
},
{
"id": 437141854,
"name": "cve-2021-44228-workaround-buildpack",
"full_name": "alexandreroman\/cve-2021-44228-workaround-buildpack",
"owner": {
"login": "alexandreroman",
"id": 665131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/665131?v=4",
"html_url": "https:\/\/github.com\/alexandreroman"
},
"html_url": "https:\/\/github.com\/alexandreroman\/cve-2021-44228-workaround-buildpack",
"description": "Buildpack providing a workaround for CVE-2021-44228 (Log4j RCE exploit)",
"fork": false,
"created_at": "2021-12-10T23:34:52Z",
"updated_at": "2022-01-04T17:48:12Z",
"pushed_at": "2021-12-10T23:47:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 437141974,
"name": "minecraft-log4j-honeypot",

View file

@ -1687,17 +1687,17 @@
"description": "This repository is developed to analysis and understand DirtyPipe exploit CVE-2022-0847",
"fork": false,
"created_at": "2022-05-17T04:23:34Z",
"updated_at": "2022-05-21T06:39:10Z",
"updated_at": "2022-05-29T18:38:57Z",
"pushed_at": "2022-05-21T05:43:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false,
"created_at": "2022-01-28T20:37:14Z",
"updated_at": "2022-05-26T10:43:41Z",
"updated_at": "2022-05-29T22:30:42Z",
"pushed_at": "2022-03-22T00:56:07Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 92,
"watchers": 93,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-05-27T17:42:20Z",
"updated_at": "2022-05-29T19:22:03Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 31,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 124,
"forks": 32,
"watchers": 125,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-05-23T04:13:02Z",
"updated_at": "2022-05-29T19:19:34Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 277,
"watchers_count": 277,
"stargazers_count": 278,
"watchers_count": 278,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
@ -25,7 +25,7 @@
],
"visibility": "public",
"forks": 65,
"watchers": 277,
"watchers": 278,
"score": 0
},
{
@ -414,7 +414,7 @@
"fork": false,
"created_at": "2022-05-26T22:02:45Z",
"updated_at": "2022-05-26T22:02:56Z",
"pushed_at": "2022-05-29T00:53:48Z",
"pushed_at": "2022-05-29T19:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -5555,7 +5555,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [simonis/Log4jPatch](https://github.com/simonis/Log4jPatch)
- [christophetd/log4shell-vulnerable-app](https://github.com/christophetd/log4shell-vulnerable-app)
- [NorthwaveSecurity/log4jcheck](https://github.com/NorthwaveSecurity/log4jcheck)
- [nkoneko/VictimApp](https://github.com/nkoneko/VictimApp)
- [lhotari/pulsar-docker-images-patch-CVE-2021-44228](https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228)
- [KosmX/CVE-2021-44228-example](https://github.com/KosmX/CVE-2021-44228-example)
- [greymd/CVE-2021-44228](https://github.com/greymd/CVE-2021-44228)
@ -5566,7 +5565,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [Azeemering/CVE-2021-44228-DFIR-Notes](https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes)
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
- [alexandreroman/cve-2021-44228-workaround-buildpack](https://github.com/alexandreroman/cve-2021-44228-workaround-buildpack)
- [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot)
- [racoon-rac/CVE-2021-44228](https://github.com/racoon-rac/CVE-2021-44228)
- [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC)