mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2022/07/05 12:17:50
This commit is contained in:
parent
d162cb6f46
commit
811292d843
48 changed files with 662 additions and 546 deletions
2007
2017
2018
2019
2020
CVE-2020-0796.jsonCVE-2020-1472.jsonCVE-2020-14882.jsonCVE-2020-14883.jsonCVE-2020-16938.jsonCVE-2020-3956.jsonCVE-2020-5421.json
2021
CVE-2021-1675.jsonCVE-2021-21551.jsonCVE-2021-21985.jsonCVE-2021-22214.jsonCVE-2021-22986.jsonCVE-2021-25646.jsonCVE-2021-26855.jsonCVE-2021-27651.jsonCVE-2021-30632.jsonCVE-2021-31166.jsonCVE-2021-3129.jsonCVE-2021-4034.jsonCVE-2021-40444.jsonCVE-2021-41773.jsonCVE-2021-43798.jsonCVE-2021-44228.json
2022
CVE-2022-0543.jsonCVE-2022-1388.jsonCVE-2022-20124.jsonCVE-2022-20135.jsonCVE-2022-21882.jsonCVE-2022-22947.jsonCVE-2022-22965.jsonCVE-2022-22980.jsonCVE-2022-23222.jsonCVE-2022-24342.jsonCVE-2022-26134.jsonCVE-2022-27254.jsonCVE-2022-29464.jsonCVE-2022-29885.jsonCVE-2022-30190.jsonCVE-2022-30333.json
README.md
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 22,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 23,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -444,10 +444,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-06-28T08:15:09Z",
|
||||
"updated_at": "2022-07-05T07:36:05Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -455,7 +455,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 347,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T14:14:12Z",
|
||||
"updated_at": "2022-06-22T10:52:07Z",
|
||||
"updated_at": "2022-07-05T08:51:31Z",
|
||||
"pushed_at": "2022-03-29T21:56:08Z",
|
||||
"stargazers_count": 481,
|
||||
"watchers_count": 481,
|
||||
"stargazers_count": 482,
|
||||
"watchers_count": 482,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 481,
|
||||
"watchers": 482,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -209,10 +209,10 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2022-06-16T11:16:04Z",
|
||||
"updated_at": "2022-07-05T08:40:48Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -229,7 +229,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 126,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,7 +41,7 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-07-05T03:54:35Z",
|
||||
"updated_at": "2022-07-05T09:33:34Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3406,
|
||||
"watchers_count": 3406,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-06-28T08:15:09Z",
|
||||
"updated_at": "2022-07-05T07:36:05Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 347,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -181,10 +181,10 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2022-06-13T07:35:45Z",
|
||||
"updated_at": "2022-07-05T10:27:21Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 420,
|
||||
"watchers_count": 420,
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -192,7 +192,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 420,
|
||||
"watchers": 421,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-06T05:37:08Z",
|
||||
"updated_at": "2022-03-01T08:57:54Z",
|
||||
"updated_at": "2022-07-05T07:20:44Z",
|
||||
"pushed_at": "2021-10-02T00:15:11Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 57,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"forks": 56,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1054,10 +1054,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2022-07-03T15:31:26Z",
|
||||
"updated_at": "2022-07-05T09:34:29Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1200,
|
||||
"watchers_count": 1200,
|
||||
"stargazers_count": 1202,
|
||||
"watchers_count": 1202,
|
||||
"forks_count": 372,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1071,7 +1071,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 372,
|
||||
"watchers": 1200,
|
||||
"watchers": 1202,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1634,7 +1634,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-06-23T07:18:17Z",
|
||||
"updated_at": "2022-07-04T13:52:48Z",
|
||||
"pushed_at": "2022-07-04T06:45:59Z",
|
||||
"pushed_at": "2022-07-05T09:50:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-07-05T03:54:35Z",
|
||||
"updated_at": "2022-07-05T09:33:34Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3406,
|
||||
"watchers_count": 3406,
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2022-06-29T09:39:00Z",
|
||||
"updated_at": "2022-07-05T09:34:37Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 973,
|
||||
"watchers_count": 973,
|
||||
"stargazers_count": 974,
|
||||
"watchers_count": 974,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -140,7 +140,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 973,
|
||||
"watchers": 974,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-21T15:38:22Z",
|
||||
"updated_at": "2022-06-09T16:31:29Z",
|
||||
"updated_at": "2022-07-05T07:20:25Z",
|
||||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T18:26:32Z",
|
||||
"updated_at": "2022-06-20T12:51:13Z",
|
||||
"updated_at": "2022-07-05T07:20:48Z",
|
||||
"pushed_at": "2020-06-02T08:30:22Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 84,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spring 安全漏洞 CVE-2020-5421复现 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-10T12:26:00Z",
|
||||
"updated_at": "2021-06-28T01:37:18Z",
|
||||
"updated_at": "2022-07-05T09:12:58Z",
|
||||
"pushed_at": "2021-01-10T12:48:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-07-04T16:10:53Z",
|
||||
"updated_at": "2022-07-05T11:34:58Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1574,
|
||||
"watchers_count": 1574,
|
||||
"stargazers_count": 1575,
|
||||
"watchers_count": 1575,
|
||||
"forks_count": 567,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 567,
|
||||
"watchers": 1574,
|
||||
"watchers": 1575,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -196,10 +196,10 @@
|
|||
"description": "Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-25T11:13:45Z",
|
||||
"updated_at": "2022-07-01T19:02:02Z",
|
||||
"updated_at": "2022-07-05T09:47:54Z",
|
||||
"pushed_at": "2022-07-01T19:02:25Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -215,7 +215,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -132,10 +132,10 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2022-07-04T07:50:44Z",
|
||||
"updated_at": "2022-07-05T07:21:08Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -143,7 +143,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 342,
|
||||
"watchers": 341,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -160,10 +160,10 @@
|
|||
"description": "cve-2021-21985 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:17:06Z",
|
||||
"updated_at": "2022-06-28T14:16:29Z",
|
||||
"updated_at": "2022-07-05T07:21:08Z",
|
||||
"pushed_at": "2022-01-10T07:01:58Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -171,7 +171,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 101,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-22T03:04:50Z",
|
||||
"updated_at": "2022-06-17T03:05:38Z",
|
||||
"updated_at": "2022-07-05T07:21:08Z",
|
||||
"pushed_at": "2021-06-22T04:35:08Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 63,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -214,10 +214,10 @@
|
|||
"description": "F5 BIG-IP远程代码执行;cve-2021-22986,批量检测;命令执行利用",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T03:32:06Z",
|
||||
"updated_at": "2021-12-15T14:41:44Z",
|
||||
"updated_at": "2022-07-05T07:21:07Z",
|
||||
"pushed_at": "2021-03-26T05:09:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -225,7 +225,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2022-06-29T09:39:00Z",
|
||||
"updated_at": "2022-07-05T09:34:37Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 973,
|
||||
"watchers_count": 973,
|
||||
"stargazers_count": 974,
|
||||
"watchers_count": 974,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -140,7 +140,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 973,
|
||||
"watchers": 974,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -166,10 +166,10 @@
|
|||
"description": "PoC for CVE-2021-26855 -Just a checker-",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T23:12:22Z",
|
||||
"updated_at": "2022-05-03T06:37:51Z",
|
||||
"updated_at": "2022-07-05T07:21:07Z",
|
||||
"pushed_at": "2021-03-09T22:07:46Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -177,7 +177,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -281,10 +281,10 @@
|
|||
"description": "CVE-2021-26855 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T08:39:05Z",
|
||||
"updated_at": "2022-06-09T03:00:43Z",
|
||||
"updated_at": "2022-07-05T07:21:07Z",
|
||||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -292,7 +292,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"watchers": 112,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T01:40:47Z",
|
||||
"updated_at": "2022-06-30T07:46:24Z",
|
||||
"updated_at": "2022-07-05T12:00:48Z",
|
||||
"pushed_at": "2021-05-16T05:54:07Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 411162655,
|
||||
"name": "CVE-2021-30632",
|
||||
"full_name": "CrackerCat\/CVE-2021-30632",
|
||||
"owner": {
|
||||
"login": "CrackerCat",
|
||||
"id": 17995064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
|
||||
"html_url": "https:\/\/github.com\/CrackerCat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-30632",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-28T06:27:49Z",
|
||||
"updated_at": "2022-02-16T03:32:22Z",
|
||||
"pushed_at": "2021-12-13T06:02:21Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2022-07-03T06:04:11Z",
|
||||
"updated_at": "2022-07-05T07:21:08Z",
|
||||
"pushed_at": "2021-06-12T08:27:09Z",
|
||||
"stargazers_count": 813,
|
||||
"watchers_count": 813,
|
||||
"stargazers_count": 812,
|
||||
"watchers_count": 812,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 813,
|
||||
"watchers": 812,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2022-06-23T16:11:34Z",
|
||||
"updated_at": "2022-07-05T07:21:06Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -140,7 +140,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 54,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -75,10 +75,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-07-05T02:53:15Z",
|
||||
"updated_at": "2022-07-05T11:39:34Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1596,
|
||||
"watchers_count": 1596,
|
||||
"stargazers_count": 1597,
|
||||
"watchers_count": 1597,
|
||||
"forks_count": 462,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -86,7 +86,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 462,
|
||||
"watchers": 1596,
|
||||
"watchers": 1597,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -159,11 +159,11 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2022-07-03T21:31:34Z",
|
||||
"updated_at": "2022-07-05T09:34:55Z",
|
||||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 875,
|
||||
"watchers_count": 875,
|
||||
"forks_count": 285,
|
||||
"stargazers_count": 876,
|
||||
"watchers_count": 876,
|
||||
"forks_count": 286,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -173,8 +173,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 285,
|
||||
"watchers": 875,
|
||||
"forks": 286,
|
||||
"watchers": 876,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"pushed_at": "2022-06-22T20:21:42Z",
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"forks_count": 157,
|
||||
"forks_count": 158,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 157,
|
||||
"forks": 158,
|
||||
"watchers": 683,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T16:13:38Z",
|
||||
"updated_at": "2022-06-10T09:08:10Z",
|
||||
"updated_at": "2022-07-05T07:53:35Z",
|
||||
"pushed_at": "2022-03-10T14:02:09Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 11,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 39,
|
||||
"forks": 12,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -227,34 +227,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437761790,
|
||||
"name": "Grafana-CVE-2021-43798",
|
||||
"full_name": "Awrrays\/Grafana-CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "Awrrays",
|
||||
"id": 55682880,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55682880?v=4",
|
||||
"html_url": "https:\/\/github.com\/Awrrays"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Awrrays\/Grafana-CVE-2021-43798",
|
||||
"description": "Grafana任意文件读取",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T06:32:39Z",
|
||||
"updated_at": "2022-04-05T16:48:25Z",
|
||||
"pushed_at": "2021-12-13T06:36:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438335194,
|
||||
"name": "CVE-2021-43798",
|
||||
|
|
|
@ -525,10 +525,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-07-04T19:03:11Z",
|
||||
"updated_at": "2022-07-05T09:35:02Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 814,
|
||||
"watchers_count": 814,
|
||||
"stargazers_count": 815,
|
||||
"watchers_count": 815,
|
||||
"forks_count": 131,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -556,7 +556,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 814,
|
||||
"watchers": 815,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -689,34 +689,6 @@
|
|||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437170557,
|
||||
"name": "sample-ldap-exploit",
|
||||
"full_name": "phoswald\/sample-ldap-exploit",
|
||||
"owner": {
|
||||
"login": "phoswald",
|
||||
"id": 12776329,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4",
|
||||
"html_url": "https:\/\/github.com\/phoswald"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/phoswald\/sample-ldap-exploit",
|
||||
"description": "A short demo of CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T02:45:39Z",
|
||||
"updated_at": "2022-05-22T14:45:42Z",
|
||||
"pushed_at": "2021-12-13T09:20:35Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437174339,
|
||||
"name": "jndi-ldap-test-server",
|
||||
|
@ -765,10 +737,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2022-07-04T09:27:12Z",
|
||||
"updated_at": "2022-07-05T07:43:08Z",
|
||||
"pushed_at": "2022-06-02T02:16:13Z",
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"stargazers_count": 400,
|
||||
"watchers_count": 400,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -781,7 +753,35 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 399,
|
||||
"watchers": 400,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437248883,
|
||||
"name": "log4shell-mitigation-tester",
|
||||
"full_name": "lhotari\/log4shell-mitigation-tester",
|
||||
"owner": {
|
||||
"login": "lhotari",
|
||||
"id": 66864,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
|
||||
"html_url": "https:\/\/github.com\/lhotari"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester",
|
||||
"description": "Log4Shell CVE-2021-44228 mitigation tester",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T10:16:58Z",
|
||||
"updated_at": "2021-12-21T20:05:48Z",
|
||||
"pushed_at": "2021-12-13T17:24:37Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -853,34 +853,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437265792,
|
||||
"name": "log4j2021_vul_test",
|
||||
"full_name": "gauthamg\/log4j2021_vul_test",
|
||||
"owner": {
|
||||
"login": "gauthamg",
|
||||
"id": 8748677,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4",
|
||||
"html_url": "https:\/\/github.com\/gauthamg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test",
|
||||
"description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:41:04Z",
|
||||
"updated_at": "2021-12-13T06:49:35Z",
|
||||
"pushed_at": "2021-12-13T06:49:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437273514,
|
||||
"name": "CVE-2021-44228-playground",
|
||||
|
@ -965,34 +937,6 @@
|
|||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437316134,
|
||||
"name": "log4j2-vulnerable-spring-app",
|
||||
"full_name": "zzzz0317\/log4j2-vulnerable-spring-app",
|
||||
"owner": {
|
||||
"login": "zzzz0317",
|
||||
"id": 16097046,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4",
|
||||
"html_url": "https:\/\/github.com\/zzzz0317"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app",
|
||||
"description": "CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:18:42Z",
|
||||
"updated_at": "2022-03-23T06:42:48Z",
|
||||
"pushed_at": "2021-12-13T02:14:14Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437319619,
|
||||
"name": "test-44228",
|
||||
|
@ -1307,34 +1251,6 @@
|
|||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437518939,
|
||||
"name": "CVE-2021-44228-docker-example",
|
||||
"full_name": "DiCanio\/CVE-2021-44228-docker-example",
|
||||
"owner": {
|
||||
"login": "DiCanio",
|
||||
"id": 6052859,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4",
|
||||
"html_url": "https:\/\/github.com\/DiCanio"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T10:53:15Z",
|
||||
"updated_at": "2021-12-13T03:58:51Z",
|
||||
"pushed_at": "2021-12-13T00:03:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437526168,
|
||||
"name": "Log4JShell-Bytecode-Detector",
|
||||
|
@ -1550,34 +1466,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437574258,
|
||||
"name": "log4j-poc",
|
||||
"full_name": "fireflyingup\/log4j-poc",
|
||||
"owner": {
|
||||
"login": "fireflyingup",
|
||||
"id": 48504204,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4",
|
||||
"html_url": "https:\/\/github.com\/fireflyingup"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc",
|
||||
"description": "CVE-2021-44228 test demo",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T14:54:25Z",
|
||||
"updated_at": "2021-12-13T05:10:53Z",
|
||||
"pushed_at": "2021-12-13T05:10:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437582859,
|
||||
"name": "log4j-jndi-be-gone",
|
||||
|
@ -1792,43 +1680,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437660117,
|
||||
"name": "Log4j-RCE",
|
||||
"full_name": "momos1337\/Log4j-RCE",
|
||||
"owner": {
|
||||
"login": "momos1337",
|
||||
"id": 64172550,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4",
|
||||
"html_url": "https:\/\/github.com\/momos1337"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/momos1337\/Log4j-RCE",
|
||||
"description": "Log4j RCE - (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T21:26:44Z",
|
||||
"updated_at": "2021-12-23T14:39:40Z",
|
||||
"pushed_at": "2021-12-13T00:54:22Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"bughunter",
|
||||
"cve-2021-44228",
|
||||
"exploit",
|
||||
"hacking",
|
||||
"log4j",
|
||||
"log4j-rce",
|
||||
"rce",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437660360,
|
||||
"name": "cve-2021-44228-log4j-mitigation",
|
||||
|
@ -1919,6 +1770,41 @@
|
|||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437681598,
|
||||
"name": "CVE-2021-44228-PoC",
|
||||
"full_name": "sunnyvale-it\/CVE-2021-44228-PoC",
|
||||
"owner": {
|
||||
"login": "sunnyvale-it",
|
||||
"id": 44291039,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
|
||||
"html_url": "https:\/\/github.com\/sunnyvale-it"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC",
|
||||
"description": "CVE-2021-44228 (Log4Shell) Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T23:37:39Z",
|
||||
"updated_at": "2022-03-18T18:44:50Z",
|
||||
"pushed_at": "2021-12-13T21:23:25Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cybersecurity",
|
||||
"java",
|
||||
"log4j",
|
||||
"log4j2",
|
||||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437685288,
|
||||
"name": "log4j2-CVE-2021-44228",
|
||||
|
@ -2031,34 +1917,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437704633,
|
||||
"name": "Log4j-check",
|
||||
"full_name": "bigsizeme\/Log4j-check",
|
||||
"owner": {
|
||||
"login": "bigsizeme",
|
||||
"id": 17845094,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigsizeme"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check",
|
||||
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T01:55:51Z",
|
||||
"updated_at": "2022-06-29T07:51:19Z",
|
||||
"pushed_at": "2021-12-13T09:18:19Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437709337,
|
||||
"name": "exploit-CVE-2021-44228",
|
||||
|
@ -2343,41 +2201,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437784907,
|
||||
"name": "aws-log4j-mitigations",
|
||||
"full_name": "markuman\/aws-log4j-mitigations",
|
||||
"owner": {
|
||||
"login": "markuman",
|
||||
"id": 3920157,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4",
|
||||
"html_url": "https:\/\/github.com\/markuman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations",
|
||||
"description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T08:01:55Z",
|
||||
"updated_at": "2021-12-13T08:05:42Z",
|
||||
"pushed_at": "2021-12-13T08:03:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"ansible",
|
||||
"aws",
|
||||
"cve-2021-44228",
|
||||
"log4j",
|
||||
"mitigation",
|
||||
"waf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437788180,
|
||||
"name": "Log4shell",
|
||||
|
@ -2854,6 +2677,34 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437902732,
|
||||
"name": "JndiLookup",
|
||||
"full_name": "madCdan\/JndiLookup",
|
||||
"owner": {
|
||||
"login": "madCdan",
|
||||
"id": 10784600,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4",
|
||||
"html_url": "https:\/\/github.com\/madCdan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/madCdan\/JndiLookup",
|
||||
"description": "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T14:22:34Z",
|
||||
"updated_at": "2021-12-18T02:12:49Z",
|
||||
"pushed_at": "2021-12-13T17:07:42Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437904012,
|
||||
"name": "MC-Log4j-Patcher",
|
||||
|
@ -3064,6 +2915,34 @@
|
|||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437960695,
|
||||
"name": "CVE-2021-44228",
|
||||
"full_name": "taurusxin\/CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "taurusxin",
|
||||
"id": 17809960,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4",
|
||||
"html_url": "https:\/\/github.com\/taurusxin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/taurusxin\/CVE-2021-44228",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:17:37Z",
|
||||
"updated_at": "2021-12-13T17:22:22Z",
|
||||
"pushed_at": "2021-12-13T17:22:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437965181,
|
||||
"name": "log4j2-prosecutor",
|
||||
|
@ -3094,6 +2973,34 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437968616,
|
||||
"name": "CVE-2021-44228_Log4Shell",
|
||||
"full_name": "yanghaoi\/CVE-2021-44228_Log4Shell",
|
||||
"owner": {
|
||||
"login": "yanghaoi",
|
||||
"id": 21354684,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4",
|
||||
"html_url": "https:\/\/github.com\/yanghaoi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell",
|
||||
"description": "Log4Shell A test for CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:44:01Z",
|
||||
"updated_at": "2021-12-13T18:03:51Z",
|
||||
"pushed_at": "2021-12-13T18:06:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437983994,
|
||||
"name": "log4j_checker",
|
||||
|
@ -3131,6 +3038,90 @@
|
|||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437988861,
|
||||
"name": "Log4j-IOCs",
|
||||
"full_name": "threatmonit\/Log4j-IOCs",
|
||||
"owner": {
|
||||
"login": "threatmonit",
|
||||
"id": 90388073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4",
|
||||
"html_url": "https:\/\/github.com\/threatmonit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs",
|
||||
"description": "Public IOCs about log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T18:52:19Z",
|
||||
"updated_at": "2022-01-18T23:50:50Z",
|
||||
"pushed_at": "2021-12-13T19:11:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437995131,
|
||||
"name": "l4j-info",
|
||||
"full_name": "ben-smash\/l4j-info",
|
||||
"owner": {
|
||||
"login": "ben-smash",
|
||||
"id": 95368649,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
|
||||
"html_url": "https:\/\/github.com\/ben-smash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
|
||||
"description": "Compiling links of value i find regarding CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T19:14:23Z",
|
||||
"updated_at": "2021-12-13T21:11:09Z",
|
||||
"pushed_at": "2021-12-13T21:11:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438003225,
|
||||
"name": "log4j-test",
|
||||
"full_name": "strawhatasif\/log4j-test",
|
||||
"owner": {
|
||||
"login": "strawhatasif",
|
||||
"id": 10750101,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
|
||||
"html_url": "https:\/\/github.com\/strawhatasif"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
|
||||
"description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T19:43:01Z",
|
||||
"updated_at": "2021-12-13T20:26:40Z",
|
||||
"pushed_at": "2021-12-13T20:26:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438012376,
|
||||
"name": "nmap-log4shell",
|
||||
|
@ -3166,6 +3157,34 @@
|
|||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438013062,
|
||||
"name": "Siem-queries-for-CVE-2021-44228",
|
||||
"full_name": "tica506\/Siem-queries-for-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "tica506",
|
||||
"id": 93236626,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4",
|
||||
"html_url": "https:\/\/github.com\/tica506"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T20:19:57Z",
|
||||
"updated_at": "2021-12-13T20:56:54Z",
|
||||
"pushed_at": "2021-12-13T20:56:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438021782,
|
||||
"name": "log4shell-example",
|
||||
|
@ -3230,6 +3249,34 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438028657,
|
||||
"name": "log4j2-CVE-2021-44228-poc-local",
|
||||
"full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local",
|
||||
"owner": {
|
||||
"login": "snatalius",
|
||||
"id": 22771118,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4",
|
||||
"html_url": "https:\/\/github.com\/snatalius"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local",
|
||||
"description": "Just a personal proof of concept of CVE-2021-44228 on log4j2",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:21:53Z",
|
||||
"updated_at": "2021-12-13T21:21:56Z",
|
||||
"pushed_at": "2021-12-13T21:21:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438032780,
|
||||
"name": "CVE-2021-44228",
|
||||
|
@ -3599,10 +3646,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2022-07-04T00:10:34Z",
|
||||
"updated_at": "2022-07-05T09:27:59Z",
|
||||
"pushed_at": "2022-04-24T08:56:47Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -3616,7 +3663,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 321,
|
||||
"watchers": 322,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3779,10 +3826,10 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2022-06-29T19:36:55Z",
|
||||
"updated_at": "2022-07-05T09:29:39Z",
|
||||
"pushed_at": "2022-01-27T16:08:20Z",
|
||||
"stargazers_count": 425,
|
||||
"watchers_count": 425,
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -3799,7 +3846,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 425,
|
||||
"watchers": 426,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4040,18 +4087,18 @@
|
|||
"description": "Tools for investigating Log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T19:08:14Z",
|
||||
"updated_at": "2022-06-17T15:17:52Z",
|
||||
"updated_at": "2022-07-05T08:10:28Z",
|
||||
"pushed_at": "2021-12-23T21:03:08Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 11,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 86,
|
||||
"forks": 12,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2022-06-21T05:56:17Z",
|
||||
"updated_at": "2022-07-05T10:35:04Z",
|
||||
"pushed_at": "2022-03-16T06:48:01Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 48,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -209,10 +209,10 @@
|
|||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T10:22:31Z",
|
||||
"updated_at": "2022-07-01T12:56:19Z",
|
||||
"updated_at": "2022-07-05T07:31:32Z",
|
||||
"pushed_at": "2022-06-28T18:14:40Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -220,7 +220,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -520,10 +520,10 @@
|
|||
"description": "PoC For F5 BIG-IP - bash script Exploit one Liner",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-10T02:57:31Z",
|
||||
"updated_at": "2022-06-25T15:12:05Z",
|
||||
"updated_at": "2022-07-05T08:55:52Z",
|
||||
"pushed_at": "2022-05-10T08:38:58Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -531,7 +531,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2022/CVE-2022-20124.json
Normal file
30
2022/CVE-2022-20124.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 510660359,
|
||||
"name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T08:59:44Z",
|
||||
"updated_at": "2022-07-05T09:52:45Z",
|
||||
"pushed_at": "2022-07-05T09:52:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2022/CVE-2022-20135.json
Normal file
30
2022/CVE-2022-20135.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 510684846,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T10:15:49Z",
|
||||
"updated_at": "2022-07-05T10:42:21Z",
|
||||
"pushed_at": "2022-07-05T10:41:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -73,13 +73,13 @@
|
|||
"pushed_at": "2022-02-04T02:20:47Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 44,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"forks": 45,
|
||||
"watchers": 167,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1258,18 +1258,18 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2022-07-05T05:52:29Z",
|
||||
"updated_at": "2022-07-05T09:22:56Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 12,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 81,
|
||||
"forks": 13,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1819,10 +1819,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T02:30:29Z",
|
||||
"updated_at": "2022-07-05T02:30:45Z",
|
||||
"updated_at": "2022-07-05T09:20:53Z",
|
||||
"pushed_at": "2022-07-05T02:32:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1830,7 +1830,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-06-23T09:53:01Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2022-07-05T05:22:00Z",
|
||||
"updated_at": "2022-07-05T06:59:58Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"watchers": 467,
|
||||
"watchers": 468,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T22:04:29Z",
|
||||
"updated_at": "2022-07-05T00:37:02Z",
|
||||
"updated_at": "2022-07-05T12:14:02Z",
|
||||
"pushed_at": "2022-07-03T08:53:04Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 3,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 24,
|
||||
"forks": 4,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-07-05T06:06:07Z",
|
||||
"updated_at": "2022-07-05T12:12:32Z",
|
||||
"pushed_at": "2022-07-05T01:29:14Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 33,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"nday"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 182,
|
||||
"forks": 35,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -137,10 +137,10 @@
|
|||
"description": "CVE-2022-26134 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T13:59:19Z",
|
||||
"updated_at": "2022-07-05T00:54:45Z",
|
||||
"updated_at": "2022-07-05T07:32:28Z",
|
||||
"pushed_at": "2022-06-06T16:38:49Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -152,7 +152,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,11 +197,11 @@
|
|||
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T21:07:30Z",
|
||||
"updated_at": "2022-07-05T01:10:58Z",
|
||||
"updated_at": "2022-07-05T07:10:35Z",
|
||||
"pushed_at": "2022-06-06T20:24:06Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 61,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -219,8 +219,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 238,
|
||||
"forks": 62,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -399,18 +399,18 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-05T12:23:34Z",
|
||||
"updated_at": "2022-07-04T08:47:54Z",
|
||||
"updated_at": "2022-07-05T07:53:51Z",
|
||||
"pushed_at": "2022-06-06T07:47:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1326,5 +1326,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510624422,
|
||||
"name": "CVE-2022-26134",
|
||||
"full_name": "Debajyoti0-0\/CVE-2022-26134",
|
||||
"owner": {
|
||||
"login": "Debajyoti0-0",
|
||||
"id": 79437050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4",
|
||||
"html_url": "https:\/\/github.com\/Debajyoti0-0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134",
|
||||
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T07:04:50Z",
|
||||
"updated_at": "2022-07-05T10:20:09Z",
|
||||
"pushed_at": "2022-07-05T09:40:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T15:03:09Z",
|
||||
"updated_at": "2022-07-04T10:46:42Z",
|
||||
"updated_at": "2022-07-05T10:21:21Z",
|
||||
"pushed_at": "2022-03-26T05:52:15Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 349,
|
||||
"watchers": 350,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-07-05T03:21:43Z",
|
||||
"updated_at": "2022-07-05T10:33:11Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 288,
|
||||
"watchers_count": 288,
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 288,
|
||||
"watchers": 289,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -507,5 +507,33 @@
|
|||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510649929,
|
||||
"name": "WSO2RCE",
|
||||
"full_name": "Pasch0\/WSO2RCE",
|
||||
"owner": {
|
||||
"login": "Pasch0",
|
||||
"id": 78447612,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78447612?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pasch0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pasch0\/WSO2RCE",
|
||||
"description": "CVE-2022-29464 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T08:27:04Z",
|
||||
"updated_at": "2022-07-05T11:55:14Z",
|
||||
"pushed_at": "2022-07-05T08:58:58Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Apache Tomcat CVE-2022-29885",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T02:30:00Z",
|
||||
"updated_at": "2022-07-04T10:25:57Z",
|
||||
"updated_at": "2022-07-05T07:06:43Z",
|
||||
"pushed_at": "2022-06-30T13:46:47Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -41,8 +41,8 @@
|
|||
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T09:02:10Z",
|
||||
"updated_at": "2022-07-01T09:02:10Z",
|
||||
"pushed_at": "2022-07-01T09:02:10Z",
|
||||
"updated_at": "2022-07-05T06:23:21Z",
|
||||
"pushed_at": "2022-07-05T06:23:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2022-07-04T08:39:31Z",
|
||||
"updated_at": "2022-07-05T10:20:07Z",
|
||||
"pushed_at": "2022-06-05T21:06:13Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -772,10 +772,10 @@
|
|||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T12:33:18Z",
|
||||
"updated_at": "2022-07-05T02:05:39Z",
|
||||
"updated_at": "2022-07-05T08:00:07Z",
|
||||
"pushed_at": "2022-06-06T07:19:53Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -783,7 +783,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 302,
|
||||
"watchers": 303,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1753,18 +1753,18 @@
|
|||
"description": "Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-15T02:22:53Z",
|
||||
"updated_at": "2022-06-23T20:26:56Z",
|
||||
"updated_at": "2022-07-05T08:07:41Z",
|
||||
"pushed_at": "2022-06-15T02:24:00Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 26,
|
||||
"forks": 2,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T02:35:12Z",
|
||||
"updated_at": "2022-07-05T02:35:12Z",
|
||||
"updated_at": "2022-07-05T09:10:18Z",
|
||||
"pushed_at": "2022-07-05T02:58:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
45
README.md
45
README.md
|
@ -474,6 +474,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
|
|||
|
||||
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007)
|
||||
|
||||
### CVE-2022-20124 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-170646036
|
||||
</code>
|
||||
|
||||
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
|
||||
|
||||
### CVE-2022-20130 (2022-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -482,6 +490,14 @@ In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bou
|
|||
|
||||
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
|
||||
|
||||
### CVE-2022-20135 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
|
||||
</code>
|
||||
|
||||
- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-)
|
||||
|
||||
### CVE-2022-20142 (2022-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -1661,6 +1677,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
|
||||
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
|
||||
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
|
||||
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
|
||||
|
||||
### CVE-2022-26155 (2022-02-28)
|
||||
|
||||
|
@ -2149,6 +2166,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
|
|||
- [trhacknon/CVE-2022-29464-mass](https://github.com/trhacknon/CVE-2022-29464-mass)
|
||||
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
|
||||
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
|
||||
- [Pasch0/WSO2RCE](https://github.com/Pasch0/WSO2RCE)
|
||||
|
||||
### CVE-2022-29548 (2022-04-20)
|
||||
|
||||
|
@ -5009,14 +5027,6 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
|
|||
|
||||
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
|
||||
|
||||
### CVE-2021-30632 (2021-10-08)
|
||||
|
||||
<code>
|
||||
Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [CrackerCat/CVE-2021-30632](https://github.com/CrackerCat/CVE-2021-30632)
|
||||
|
||||
### CVE-2021-30682 (2021-09-08)
|
||||
|
||||
<code>
|
||||
|
@ -6250,7 +6260,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
|||
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
|
||||
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
|
||||
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
|
||||
- [Awrrays/Grafana-CVE-2021-43798](https://github.com/Awrrays/Grafana-CVE-2021-43798)
|
||||
- [Ryze-T/CVE-2021-43798](https://github.com/Ryze-T/CVE-2021-43798)
|
||||
- [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana)
|
||||
- [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798)
|
||||
|
@ -6397,16 +6406,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot)
|
||||
- [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC)
|
||||
- [1lann/log4shelldetect](https://github.com/1lann/log4shelldetect)
|
||||
- [phoswald/sample-ldap-exploit](https://github.com/phoswald/sample-ldap-exploit)
|
||||
- [rakutentech/jndi-ldap-test-server](https://github.com/rakutentech/jndi-ldap-test-server)
|
||||
- [f0ng/log4j2burpscanner](https://github.com/f0ng/log4j2burpscanner)
|
||||
- [lhotari/log4shell-mitigation-tester](https://github.com/lhotari/log4shell-mitigation-tester)
|
||||
- [logpresso/CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner)
|
||||
- [vorburger/Log4j_CVE-2021-44228](https://github.com/vorburger/Log4j_CVE-2021-44228)
|
||||
- [gauthamg/log4j2021_vul_test](https://github.com/gauthamg/log4j2021_vul_test)
|
||||
- [b-abderrahmane/CVE-2021-44228-playground](https://github.com/b-abderrahmane/CVE-2021-44228-playground)
|
||||
- [js-on/jndiRep](https://github.com/js-on/jndiRep)
|
||||
- [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs)
|
||||
- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app)
|
||||
- [datadavev/test-44228](https://github.com/datadavev/test-44228)
|
||||
- [LemonCraftRu/JndiRemover](https://github.com/LemonCraftRu/JndiRemover)
|
||||
- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
|
||||
|
@ -6417,7 +6424,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [alexandre-lavoie/python-log4rce](https://github.com/alexandre-lavoie/python-log4rce)
|
||||
- [RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs)
|
||||
- [blake-fm/vcenter-log4j](https://github.com/blake-fm/vcenter-log4j)
|
||||
- [DiCanio/CVE-2021-44228-docker-example](https://github.com/DiCanio/CVE-2021-44228-docker-example)
|
||||
- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector)
|
||||
- [dtact/divd-2021-00038--log4j-scanner](https://github.com/dtact/divd-2021-00038--log4j-scanner)
|
||||
- [kali-dass/CVE-2021-44228-log4Shell](https://github.com/kali-dass/CVE-2021-44228-log4Shell)
|
||||
|
@ -6425,7 +6431,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [infiniroot/nginx-mitigate-log4shell](https://github.com/infiniroot/nginx-mitigate-log4shell)
|
||||
- [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected)
|
||||
- [guardicode/CVE-2021-44228_IoCs](https://github.com/guardicode/CVE-2021-44228_IoCs)
|
||||
- [fireflyingup/log4j-poc](https://github.com/fireflyingup/log4j-poc)
|
||||
- [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone)
|
||||
- [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch)
|
||||
- [tasooshi/horrors-log4shell](https://github.com/tasooshi/horrors-log4shell)
|
||||
|
@ -6433,15 +6438,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [OlafHaalstra/log4jcheck](https://github.com/OlafHaalstra/log4jcheck)
|
||||
- [psychose-club/Saturn](https://github.com/psychose-club/Saturn)
|
||||
- [Panyaprach/Proof-CVE-2021-44228](https://github.com/Panyaprach/Proof-CVE-2021-44228)
|
||||
- [momos1337/Log4j-RCE](https://github.com/momos1337/Log4j-RCE)
|
||||
- [palominoinc/cve-2021-44228-log4j-mitigation](https://github.com/palominoinc/cve-2021-44228-log4j-mitigation)
|
||||
- [cyberxml/log4j-poc](https://github.com/cyberxml/log4j-poc)
|
||||
- [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell)
|
||||
- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC)
|
||||
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
|
||||
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
|
||||
- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
|
||||
- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
|
||||
- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
|
||||
- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
|
||||
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
|
||||
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
|
||||
|
@ -6452,7 +6456,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources)
|
||||
- [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832)
|
||||
- [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228)
|
||||
- [markuman/aws-log4j-mitigations](https://github.com/markuman/aws-log4j-mitigations)
|
||||
- [tuyenee/Log4shell](https://github.com/tuyenee/Log4shell)
|
||||
- [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228)
|
||||
- [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV)
|
||||
|
@ -6470,6 +6473,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [VNYui/CVE-2021-44228](https://github.com/VNYui/CVE-2021-44228)
|
||||
- [flxhaas/Scan-CVE-2021-44228](https://github.com/flxhaas/Scan-CVE-2021-44228)
|
||||
- [justakazh/Log4j-CVE-2021-44228](https://github.com/justakazh/Log4j-CVE-2021-44228)
|
||||
- [madCdan/JndiLookup](https://github.com/madCdan/JndiLookup)
|
||||
- [Koupah/MC-Log4j-Patcher](https://github.com/Koupah/MC-Log4j-Patcher)
|
||||
- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
|
||||
- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
|
||||
|
@ -6477,11 +6481,18 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips)
|
||||
- [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
|
||||
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
|
||||
- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
|
||||
- [rodfer20/log4j2-prosecutor](https://github.com/rodfer20/log4j2-prosecutor)
|
||||
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
|
||||
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
|
||||
- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)
|
||||
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
|
||||
- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
|
||||
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
|
||||
- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228)
|
||||
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
|
||||
- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)
|
||||
- [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local)
|
||||
- [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228)
|
||||
- [back2root/log4shell-rex](https://github.com/back2root/log4shell-rex)
|
||||
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)
|
||||
|
|
Loading…
Add table
Reference in a new issue