mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/12/13 18:13:40
This commit is contained in:
parent
e822cbef67
commit
71461e0959
24 changed files with 968 additions and 402 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "MS16-032(CVE-2016-0099) for SERVICE ONLY",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-15T17:16:55Z",
|
||||
"updated_at": "2021-11-28T02:48:01Z",
|
||||
"updated_at": "2021-12-13T12:53:15Z",
|
||||
"pushed_at": "2017-03-15T17:24:59Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "OpenSSH Username Enumeration - CVE-2016-6210",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-25T07:23:44Z",
|
||||
"updated_at": "2019-09-12T12:42:39Z",
|
||||
"updated_at": "2021-12-13T17:44:28Z",
|
||||
"pushed_at": "2019-08-25T07:28:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-04T01:12:47Z",
|
||||
"updated_at": "2021-12-13T09:28:03Z",
|
||||
"updated_at": "2021-12-13T15:22:47Z",
|
||||
"pushed_at": "2018-11-18T11:14:20Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 89408243,
|
||||
"name": "Puma6Fail",
|
||||
"full_name": "TransLunarInjection\/Puma6Fail",
|
||||
"full_name": "LunNova\/Puma6Fail",
|
||||
"owner": {
|
||||
"login": "TransLunarInjection",
|
||||
"login": "LunNova",
|
||||
"id": 782440,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/782440?v=4",
|
||||
"html_url": "https:\/\/github.com\/TransLunarInjection"
|
||||
"html_url": "https:\/\/github.com\/LunNova"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TransLunarInjection\/Puma6Fail",
|
||||
"html_url": "https:\/\/github.com\/LunNova\/Puma6Fail",
|
||||
"description": "CVE-2017-5693 Denial of service vulnerability in Puma 6 modems",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-25T21:25:43Z",
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-12-10T01:43:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2021-10-13T07:19:35Z",
|
||||
"updated_at": "2021-12-13T15:47:52Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -54,7 +54,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-24T23:09:43Z",
|
||||
"updated_at": "2021-11-18T09:29:14Z",
|
||||
"updated_at": "2021-12-13T13:15:06Z",
|
||||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 141,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T13:16:02Z",
|
||||
"updated_at": "2021-12-05T05:51:38Z",
|
||||
"updated_at": "2021-12-13T13:14:56Z",
|
||||
"pushed_at": "2019-08-19T17:33:56Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,17 +98,17 @@
|
|||
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T09:40:15Z",
|
||||
"updated_at": "2021-10-10T10:37:54Z",
|
||||
"updated_at": "2021-12-13T12:47:16Z",
|
||||
"pushed_at": "2020-05-26T10:23:34Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1389,
|
||||
"watchers_count": 1389,
|
||||
"forks_count": 312,
|
||||
"forks_count": 313,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 312,
|
||||
"forks": 313,
|
||||
"watchers": 1389,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -155,17 +155,17 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-12-11T13:52:33Z",
|
||||
"updated_at": "2021-12-13T17:40:32Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 382,
|
||||
"watchers_count": 382,
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 382,
|
||||
"watchers": 383,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -221,17 +221,17 @@
|
|||
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-16T23:03:15Z",
|
||||
"updated_at": "2021-08-19T06:09:27Z",
|
||||
"updated_at": "2021-12-13T16:18:26Z",
|
||||
"pushed_at": "2020-10-16T23:12:52Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-5837 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T08:15:18Z",
|
||||
"updated_at": "2021-12-13T07:24:29Z",
|
||||
"updated_at": "2021-12-13T16:01:35Z",
|
||||
"pushed_at": "2020-05-13T09:45:12Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T01:40:47Z",
|
||||
"updated_at": "2021-12-07T06:26:12Z",
|
||||
"updated_at": "2021-12-13T16:27:37Z",
|
||||
"pushed_at": "2021-05-16T05:54:07Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 11,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 55,
|
||||
"forks": 12,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,7 +40,7 @@
|
|||
"description": "Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-30T14:56:04Z",
|
||||
"updated_at": "2021-12-06T15:09:00Z",
|
||||
"updated_at": "2021-12-13T12:31:35Z",
|
||||
"pushed_at": "2021-11-30T22:37:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -94,8 +94,8 @@
|
|||
"description": "CVE-2021-36260",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T09:23:36Z",
|
||||
"updated_at": "2021-12-13T09:49:11Z",
|
||||
"pushed_at": "2021-12-13T09:49:08Z",
|
||||
"updated_at": "2021-12-13T15:12:22Z",
|
||||
"pushed_at": "2021-12-13T15:12:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -126,17 +126,17 @@
|
|||
"description": "PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-22T03:07:56Z",
|
||||
"updated_at": "2021-12-02T23:09:54Z",
|
||||
"updated_at": "2021-12-13T14:07:29Z",
|
||||
"pushed_at": "2021-07-22T04:17:47Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-16T02:11:36Z",
|
||||
"updated_at": "2021-12-13T10:52:58Z",
|
||||
"updated_at": "2021-12-13T13:41:52Z",
|
||||
"pushed_at": "2021-09-16T10:39:04Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 181,
|
||||
"watchers": 180,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-12-12T21:52:33Z",
|
||||
"updated_at": "2021-12-13T14:31:25Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1325,
|
||||
"watchers_count": 1325,
|
||||
"stargazers_count": 1326,
|
||||
"watchers_count": 1326,
|
||||
"forks_count": 435,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 435,
|
||||
"watchers": 1325,
|
||||
"watchers": 1326,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2021-12-13T12:04:19Z",
|
||||
"updated_at": "2021-12-13T17:39:25Z",
|
||||
"pushed_at": "2021-12-11T15:43:11Z",
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 50,
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,8 +27,8 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 244,
|
||||
"forks": 55,
|
||||
"watchers": 277,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -45,17 +45,44 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2021-12-13T12:10:17Z",
|
||||
"pushed_at": "2021-12-13T10:28:47Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 4,
|
||||
"updated_at": "2021-12-13T17:22:34Z",
|
||||
"pushed_at": "2021-12-13T14:45:13Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 21,
|
||||
"forks": 5,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437924403,
|
||||
"name": "noPac",
|
||||
"full_name": "waterrr\/noPac",
|
||||
"owner": {
|
||||
"login": "waterrr",
|
||||
"id": 15225499,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15225499?v=4",
|
||||
"html_url": "https:\/\/github.com\/waterrr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/waterrr\/noPac",
|
||||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T15:24:59Z",
|
||||
"updated_at": "2021-12-13T15:40:17Z",
|
||||
"pushed_at": "2021-12-13T15:40:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2021-12-13T12:10:10Z",
|
||||
"updated_at": "2021-12-13T18:04:27Z",
|
||||
"pushed_at": "2021-12-12T10:50:54Z",
|
||||
"stargazers_count": 674,
|
||||
"watchers_count": 674,
|
||||
"forks_count": 177,
|
||||
"stargazers_count": 719,
|
||||
"watchers_count": 719,
|
||||
"forks_count": 186,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 177,
|
||||
"watchers": 674,
|
||||
"forks": 186,
|
||||
"watchers": 719,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-43326.json
Normal file
29
2021/CVE-2021-43326.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 437963336,
|
||||
"name": "CVE-2021-43326_Exploit",
|
||||
"full_name": "gfoss\/CVE-2021-43326_Exploit",
|
||||
"owner": {
|
||||
"login": "gfoss",
|
||||
"id": 727732,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/727732?v=4",
|
||||
"html_url": "https:\/\/github.com\/gfoss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gfoss\/CVE-2021-43326_Exploit",
|
||||
"description": "Automox Windows Agent Privilege Escalation Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:26:28Z",
|
||||
"updated_at": "2021-12-13T17:50:46Z",
|
||||
"pushed_at": "2021-12-13T17:50:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2021-12-13T08:05:10Z",
|
||||
"updated_at": "2021-12-13T15:38:47Z",
|
||||
"pushed_at": "2021-12-09T03:16:21Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 49,
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 214,
|
||||
"forks": 50,
|
||||
"watchers": 216,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -484,17 +484,17 @@
|
|||
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T18:49:30Z",
|
||||
"updated_at": "2021-12-13T01:26:18Z",
|
||||
"updated_at": "2021-12-13T12:46:42Z",
|
||||
"pushed_at": "2021-12-11T19:10:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:31:00Z",
|
||||
"updated_at": "2021-12-12T22:32:01Z",
|
||||
"pushed_at": "2021-12-12T22:31:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-12-13T15:36:45Z",
|
||||
"pushed_at": "2021-12-13T15:36:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
File diff suppressed because it is too large
Load diff
28
README.md
28
README.md
|
@ -3410,6 +3410,7 @@ Active Directory Domain Services Elevation of Privilege Vulnerability This CVE I
|
|||
|
||||
- [WazeHell/sam-the-admin](https://github.com/WazeHell/sam-the-admin)
|
||||
- [Ridter/noPac](https://github.com/Ridter/noPac)
|
||||
- [waterrr/noPac](https://github.com/waterrr/noPac)
|
||||
|
||||
### CVE-2021-42287 (2021-11-09)
|
||||
|
||||
|
@ -3601,6 +3602,9 @@ An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16.
|
|||
- [DarkSprings/CVE-2021-43267-POC](https://github.com/DarkSprings/CVE-2021-43267-POC)
|
||||
- [ohnonoyesyes/CVE-2021-43267](https://github.com/ohnonoyesyes/CVE-2021-43267)
|
||||
|
||||
### CVE-2021-43326
|
||||
- [gfoss/CVE-2021-43326_Exploit](https://github.com/gfoss/CVE-2021-43326_Exploit)
|
||||
|
||||
### CVE-2021-43361 (-)
|
||||
|
||||
<code>
|
||||
|
@ -3709,7 +3713,7 @@ Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 105
|
|||
### CVE-2021-44228 (2021-12-10)
|
||||
|
||||
<code>
|
||||
Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).
|
||||
Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see https://www.oracle.com/java/technologies/javase/8u121-relnotes.html) protects against remote code execution by defaulting "com.sun.jndi.rmi.object.trustURLCodebase" and "com.sun.jndi.cosnaming.object.trustURLCodebase" to "false".
|
||||
</code>
|
||||
|
||||
- [tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce)
|
||||
|
@ -3829,7 +3833,6 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
|
|||
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
|
||||
- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan)
|
||||
- [rubo77/log4j_checker_beta](https://github.com/rubo77/log4j_checker_beta)
|
||||
- [ahmad4fifz-dev/CVE-2021-44228](https://github.com/ahmad4fifz-dev/CVE-2021-44228)
|
||||
- [hupe1980/scan4log4shell](https://github.com/hupe1980/scan4log4shell)
|
||||
- [thecyberneh/Log4j-RCE-Exploiter](https://github.com/thecyberneh/Log4j-RCE-Exploiter)
|
||||
- [halibobor/log4j2](https://github.com/halibobor/log4j2)
|
||||
|
@ -3845,7 +3848,26 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
|
|||
- [lov3r/cve-2021-44228-log4j-exploits](https://github.com/lov3r/cve-2021-44228-log4j-exploits)
|
||||
- [sinakeshmiri/log4jScan](https://github.com/sinakeshmiri/log4jScan)
|
||||
- [0xDexter0us/Log4J-Scanner](https://github.com/0xDexter0us/Log4J-Scanner)
|
||||
- [LutziGoz/Log4Shell_Exploitation-Vulnerabiliy__CVE-2021-44228](https://github.com/LutziGoz/Log4Shell_Exploitation-Vulnerabiliy__CVE-2021-44228)
|
||||
- [0xsyr0/CVE-2021-44228-log4j-log4shell-Security-Research-Summary](https://github.com/0xsyr0/CVE-2021-44228-log4j-log4shell-Security-Research-Summary)
|
||||
- [ahmad4fifz/CVE-2021-44228-podman](https://github.com/ahmad4fifz/CVE-2021-44228-podman)
|
||||
- [jeffli1024/log4j-rce-test](https://github.com/jeffli1024/log4j-rce-test)
|
||||
- [zsolt-halo/CVE-2021-44228-Spring-Boot-Test-Service](https://github.com/zsolt-halo/CVE-2021-44228-Spring-Boot-Test-Service)
|
||||
- [manuel-alvarez-alvarez/log4j-cve-2021-44228](https://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228)
|
||||
- [VNYui/CVE-2021-44228](https://github.com/VNYui/CVE-2021-44228)
|
||||
- [flxhaas/Scan-CVE-2021-44228](https://github.com/flxhaas/Scan-CVE-2021-44228)
|
||||
- [justakazh/Log4j-CVE-2021-44228](https://github.com/justakazh/Log4j-CVE-2021-44228)
|
||||
- [irgoncalves/f5-waf-quick-patch-cve-2021-44228](https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228)
|
||||
- [AdriDevelopsThings/check-log4j-vulnerability](https://github.com/AdriDevelopsThings/check-log4j-vulnerability)
|
||||
- [madCdan/JndiLookup](https://github.com/madCdan/JndiLookup)
|
||||
- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
|
||||
- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
|
||||
- [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228)
|
||||
- [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
|
||||
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
|
||||
- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
|
||||
- [Chelsea486MHz/ftp_over_log4j](https://github.com/Chelsea486MHz/ftp_over_log4j)
|
||||
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
|
||||
|
||||
### CVE-2021-44827
|
||||
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
|
||||
|
@ -16218,7 +16240,7 @@ An unprivileged network attacker could gain system privileges to provisioned Int
|
|||
Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic.
|
||||
</code>
|
||||
|
||||
- [TransLunarInjection/Puma6Fail](https://github.com/TransLunarInjection/Puma6Fail)
|
||||
- [LunNova/Puma6Fail](https://github.com/LunNova/Puma6Fail)
|
||||
|
||||
### CVE-2017-5715 (2018-01-04)
|
||||
|
||||
|
|
Loading…
Reference in a new issue