Auto Update 2022/07/04 18:19:03

This commit is contained in:
motikan2010-bot 2022-07-05 03:19:03 +09:00
parent ba9e695e72
commit 9007e39cb1
54 changed files with 551 additions and 455 deletions

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-04T09:27:18Z",
"updated_at": "2022-07-04T17:52:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1409,
"watchers_count": 1409,
"stargazers_count": 1410,
"watchers_count": 1410,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1409,
"watchers": 1410,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
"fork": false,
"created_at": "2016-02-18T22:38:51Z",
"updated_at": "2022-06-22T01:33:52Z",
"updated_at": "2022-07-04T16:25:48Z",
"pushed_at": "2017-07-22T19:22:55Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 51,
"watchers": 50,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
"fork": false,
"created_at": "2016-02-18T22:38:51Z",
"updated_at": "2022-06-22T01:33:52Z",
"updated_at": "2022-07-04T16:25:48Z",
"pushed_at": "2017-07-22T19:22:55Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 51,
"watchers": 50,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-04T09:27:18Z",
"updated_at": "2022-07-04T17:52:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1409,
"watchers_count": 1409,
"stargazers_count": 1410,
"watchers_count": 1410,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1409,
"watchers": 1410,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2022-07-04T07:48:59Z",
"updated_at": "2022-07-04T17:17:10Z",
"pushed_at": "2022-06-27T02:34:05Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 30,
"watchers": 32,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2022-07-03T02:49:13Z",
"updated_at": "2022-07-04T16:25:52Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 678,
"watchers_count": 678,
"stargazers_count": 677,
"watchers_count": 677,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 290,
"watchers": 678,
"watchers": 677,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2022-06-15T19:54:26Z",
"updated_at": "2022-07-04T16:25:56Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 197,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 197,
"watchers": 493,
"watchers": 492,
"score": 0
},
{
@ -158,10 +158,10 @@
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
"fork": false,
"created_at": "2017-11-21T18:17:28Z",
"updated_at": "2022-06-18T22:30:50Z",
"updated_at": "2022-07-04T16:25:56Z",
"pushed_at": "2017-11-21T20:34:57Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@ -169,7 +169,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 99,
"watchers": 98,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2022-06-15T19:54:15Z",
"updated_at": "2022-07-04T16:25:55Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 371,
"watchers_count": 371,
"stargazers_count": 370,
"watchers_count": 370,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 138,
"watchers": 371,
"watchers": 370,
"score": 0
},
{

30
2017/CVE-2017-12629.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 510365717,
"name": "-Wiki",
"full_name": "77Huan\/-Wiki",
"owner": {
"login": "77Huan",
"id": 103548145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103548145?v=4",
"html_url": "https:\/\/github.com\/77Huan"
},
"html_url": "https:\/\/github.com\/77Huan\/-Wiki",
"description": " Apache Solr RCE检测脚本 (CVE-2017-12629)",
"fork": false,
"created_at": "2022-07-04T13:14:36Z",
"updated_at": "2022-07-04T13:14:36Z",
"pushed_at": "2022-07-04T13:15:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-04T09:27:18Z",
"updated_at": "2022-07-04T17:52:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1409,
"watchers_count": 1409,
"stargazers_count": 1410,
"watchers_count": 1410,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1409,
"watchers": 1410,
"score": 0
},
{

View file

@ -439,10 +439,10 @@
"description": "SambaCry exploit (CVE-2017-7494) ",
"fork": false,
"created_at": "2022-05-07T11:42:40Z",
"updated_at": "2022-07-03T13:05:05Z",
"updated_at": "2022-07-04T13:45:51Z",
"pushed_at": "2022-05-08T09:02:36Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -450,7 +450,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 32,
"watchers": 31,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": null,
"fork": false,
"created_at": "2017-05-06T09:51:01Z",
"updated_at": "2021-12-26T05:10:02Z",
"updated_at": "2022-07-04T16:25:52Z",
"pushed_at": "2019-10-22T07:08:19Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 24,
"watchers": 22,
"score": 0
}
]

View file

@ -101,13 +101,13 @@
"pushed_at": "2021-05-27T13:58:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 6,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 5,
"watchers": 3,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "Versión Dr. DLL (CVE-2018-18333)",
"fork": false,
"created_at": "2021-04-30T01:23:33Z",
"updated_at": "2022-04-18T04:56:50Z",
"updated_at": "2022-07-04T16:48:11Z",
"pushed_at": "2022-04-18T04:56:47Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -21,7 +21,23 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"backdoor",
"cve",
"ddl",
"demo",
"exploits",
"hacking",
"metasploit",
"msfvenom",
"payload",
"pentesting",
"python",
"spanish",
"windows",
"windows-cve",
"windows-vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-04T09:27:18Z",
"updated_at": "2022-07-04T17:52:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1409,
"watchers_count": 1409,
"stargazers_count": 1410,
"watchers_count": 1410,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1409,
"watchers": 1410,
"score": 0
},
{

View file

@ -357,10 +357,10 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
"updated_at": "2022-06-26T03:11:30Z",
"updated_at": "2022-07-04T16:25:58Z",
"pushed_at": "2020-10-01T11:51:46Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
@ -368,7 +368,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 91,
"watchers": 90,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 471,
"watchers_count": 471,
"forks_count": 192,
"forks_count": 191,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 192,
"forks": 191,
"watchers": 471,
"score": 0
},

View file

@ -382,10 +382,10 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2022-06-27T02:52:30Z",
"updated_at": "2022-07-04T12:50:41Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 371,
"watchers_count": 371,
"stargazers_count": 370,
"watchers_count": 370,
"forks_count": 193,
"allow_forking": true,
"is_template": false,
@ -404,7 +404,7 @@
],
"visibility": "public",
"forks": 193,
"watchers": 371,
"watchers": 370,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-06-12T10:21:35Z",
"updated_at": "2022-06-16T11:46:00Z",
"updated_at": "2022-07-04T13:01:00Z",
"pushed_at": "2019-06-13T09:55:07Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 10,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 20,
"forks": 11,
"watchers": 21,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2022-07-03T07:25:05Z",
"updated_at": "2022-07-04T17:18:49Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 156,
"watchers_count": 156,

View file

@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-07-04T09:47:58Z",
"updated_at": "2022-07-04T14:42:14Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3403,
"watchers_count": 3403,
"stargazers_count": 3404,
"watchers_count": 3404,
"forks_count": 1016,
"allow_forking": true,
"is_template": false,
@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1016,
"watchers": 3403,
"watchers": 3404,
"score": 0
},
{

View file

@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-04T09:27:18Z",
"updated_at": "2022-07-04T17:52:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1409,
"watchers_count": 1409,
"stargazers_count": 1410,
"watchers_count": 1410,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1409,
"watchers": 1410,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
"fork": false,
"created_at": "2020-11-02T14:48:55Z",
"updated_at": "2022-06-18T04:00:41Z",
"updated_at": "2022-07-04T14:01:12Z",
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 38,
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 144,
"forks": 39,
"watchers": 145,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2022-07-03T15:31:32Z",
"updated_at": "2022-07-04T18:10:59Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 934,
"watchers_count": 934,
"forks_count": 263,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 263,
"watchers": 933,
"watchers": 934,
"score": 0
},
{
@ -160,10 +160,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2022-07-03T15:31:32Z",
"updated_at": "2022-07-04T17:38:26Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 436,
"watchers_count": 436,
"stargazers_count": 437,
"watchers_count": 437,
"forks_count": 127,
"allow_forking": true,
"is_template": false,
@ -171,7 +171,7 @@
"topics": [],
"visibility": "public",
"forks": 127,
"watchers": 436,
"watchers": 437,
"score": 0
},
{
@ -1633,10 +1633,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2022-06-23T07:18:17Z",
"updated_at": "2022-06-24T07:09:56Z",
"updated_at": "2022-07-04T13:52:48Z",
"pushed_at": "2022-07-04T06:45:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1644,7 +1644,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-07-04T09:47:58Z",
"updated_at": "2022-07-04T14:42:14Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3403,
"watchers_count": 3403,
"stargazers_count": 3404,
"watchers_count": 3404,
"forks_count": 1016,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1016,
"watchers": 3403,
"watchers": 3404,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-04T09:27:18Z",
"updated_at": "2022-07-04T17:52:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1409,
"watchers_count": 1409,
"stargazers_count": 1410,
"watchers_count": 1410,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1409,
"watchers": 1410,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2022-06-15T19:58:33Z",
"updated_at": "2022-07-04T16:10:52Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 127,
"watchers": 126,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-07-04T09:15:50Z",
"updated_at": "2022-07-04T16:10:53Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1575,
"watchers_count": 1575,
"stargazers_count": 1574,
"watchers_count": 1574,
"forks_count": 567,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 567,
"watchers": 1575,
"watchers": 1574,
"score": 0
},
{

View file

@ -220,10 +220,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T11:03:13Z",
"updated_at": "2022-07-04T06:44:18Z",
"updated_at": "2022-07-04T12:49:26Z",
"pushed_at": "2021-06-07T04:00:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -231,7 +231,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 30,
"watchers": 31,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
"updated_at": "2022-07-04T08:58:26Z",
"updated_at": "2022-07-04T13:22:49Z",
"pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
@ -87,7 +87,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 145,
"watchers": 146,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2022-06-15T19:58:33Z",
"updated_at": "2022-07-04T16:10:52Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 127,
"watchers": 126,
"score": 0
}
]

View file

@ -309,10 +309,10 @@
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
"fork": false,
"created_at": "2021-03-08T11:54:32Z",
"updated_at": "2022-06-12T20:59:12Z",
"updated_at": "2022-07-04T16:10:51Z",
"pushed_at": "2022-03-02T15:41:29Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 138,
"watchers_count": 138,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
@ -328,7 +328,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 139,
"watchers": 138,
"score": 0
},
{
@ -492,8 +492,8 @@
"description": " CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server.",
"fork": false,
"created_at": "2021-03-11T19:35:35Z",
"updated_at": "2022-06-28T02:10:41Z",
"pushed_at": "2022-06-28T02:06:10Z",
"updated_at": "2022-07-04T17:15:05Z",
"pushed_at": "2022-07-04T17:14:38Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 8,
@ -520,10 +520,10 @@
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
"fork": false,
"created_at": "2021-03-11T20:51:48Z",
"updated_at": "2022-06-30T07:14:35Z",
"updated_at": "2022-07-04T16:10:52Z",
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -531,7 +531,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 60,
"watchers": 58,
"score": 0
},
{
@ -909,10 +909,10 @@
"description": "ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)",
"fork": false,
"created_at": "2021-03-17T03:56:54Z",
"updated_at": "2022-06-18T04:00:42Z",
"updated_at": "2022-07-04T16:44:57Z",
"pushed_at": "2021-03-17T05:06:18Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -931,7 +931,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 108,
"watchers": 109,
"score": 0
},
{

30
2021/CVE-2021-30632.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 411162655,
"name": "CVE-2021-30632",
"full_name": "CrackerCat\/CVE-2021-30632",
"owner": {
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat"
},
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-30632",
"description": null,
"fork": false,
"created_at": "2021-09-28T06:27:49Z",
"updated_at": "2022-02-16T03:32:22Z",
"pushed_at": "2021-12-13T06:02:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 4,
"score": 0
}
]

View file

@ -1554,5 +1554,37 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 510379940,
"name": "CVE-2021-3156",
"full_name": "FrancescoMarchiori\/CVE-2021-3156",
"owner": {
"login": "FrancescoMarchiori",
"id": 73738800,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73738800?v=4",
"html_url": "https:\/\/github.com\/FrancescoMarchiori"
},
"html_url": "https:\/\/github.com\/FrancescoMarchiori\/CVE-2021-3156",
"description": "Fuzzing, visualization and exploit of sudo vulnerability CVE-2021-3156",
"fork": false,
"created_at": "2022-07-04T13:55:24Z",
"updated_at": "2022-07-04T13:55:45Z",
"pushed_at": "2022-07-04T14:39:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-3156",
"pwn",
"sudo"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -190,10 +190,10 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2022-06-26T06:03:11Z",
"updated_at": "2022-07-04T14:01:39Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
@ -201,7 +201,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 82,
"watchers": 83,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "Recursive MMIO VM Escape PoC",
"fork": false,
"created_at": "2022-05-13T05:33:28Z",
"updated_at": "2022-06-30T07:31:13Z",
"updated_at": "2022-07-04T13:57:35Z",
"pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 21,
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 136,
"forks": 22,
"watchers": 137,
"score": 0
}
]

View file

@ -75,18 +75,18 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-07-04T11:18:49Z",
"updated_at": "2022-07-04T14:56:32Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1591,
"watchers_count": 1591,
"forks_count": 460,
"stargazers_count": 1593,
"watchers_count": 1593,
"forks_count": 462,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 460,
"watchers": 1591,
"forks": 462,
"watchers": 1593,
"score": 0
},
{
@ -163,7 +163,7 @@
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 875,
"watchers_count": 875,
"forks_count": 283,
"forks_count": 285,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -173,7 +173,7 @@
"poc"
],
"visibility": "public",
"forks": 283,
"forks": 285,
"watchers": 875,
"score": 0
},
@ -906,10 +906,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-07-03T21:31:10Z",
"updated_at": "2022-07-04T17:26:42Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 544,
"watchers_count": 544,
"stargazers_count": 545,
"watchers_count": 545,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
@ -919,7 +919,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 544,
"watchers": 545,
"score": 0
},
{
@ -1249,18 +1249,18 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2022-07-01T07:24:04Z",
"updated_at": "2022-07-04T12:58:05Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 21,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 67,
"forks": 22,
"watchers": 68,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-06-23T19:36:27Z",
"updated_at": "2022-07-04T12:50:41Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1437,
"watchers_count": 1437,
"stargazers_count": 1436,
"watchers_count": 1436,
"forks_count": 475,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 475,
"watchers": 1437,
"watchers": 1436,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "Apache 2.4.50 Path traversal vulnerability",
"fork": false,
"created_at": "2021-10-08T05:44:54Z",
"updated_at": "2022-04-13T00:19:07Z",
"updated_at": "2022-07-04T15:27:56Z",
"pushed_at": "2022-04-11T20:00:17Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 2,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 18,
"forks": 3,
"watchers": 19,
"score": 0
},
{

View file

@ -227,6 +227,34 @@
"watchers": 1,
"score": 0
},
{
"id": 437761790,
"name": "Grafana-CVE-2021-43798",
"full_name": "Awrrays\/Grafana-CVE-2021-43798",
"owner": {
"login": "Awrrays",
"id": 55682880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55682880?v=4",
"html_url": "https:\/\/github.com\/Awrrays"
},
"html_url": "https:\/\/github.com\/Awrrays\/Grafana-CVE-2021-43798",
"description": "Grafana任意文件读取",
"fork": false,
"created_at": "2021-12-13T06:32:39Z",
"updated_at": "2022-04-05T16:48:25Z",
"pushed_at": "2021-12-13T06:36:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 438335194,
"name": "CVE-2021-43798",

View file

@ -881,6 +881,34 @@
"watchers": 2,
"score": 0
},
{
"id": 437265792,
"name": "log4j2021_vul_test",
"full_name": "gauthamg\/log4j2021_vul_test",
"owner": {
"login": "gauthamg",
"id": 8748677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4",
"html_url": "https:\/\/github.com\/gauthamg"
},
"html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test",
"description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:41:04Z",
"updated_at": "2021-12-13T06:49:35Z",
"pushed_at": "2021-12-13T06:49:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437273514,
"name": "CVE-2021-44228-playground",
@ -1494,6 +1522,34 @@
"watchers": 0,
"score": 0
},
{
"id": 437574258,
"name": "log4j-poc",
"full_name": "fireflyingup\/log4j-poc",
"owner": {
"login": "fireflyingup",
"id": 48504204,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4",
"html_url": "https:\/\/github.com\/fireflyingup"
},
"html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc",
"description": "CVE-2021-44228 test demo",
"fork": false,
"created_at": "2021-12-12T14:54:25Z",
"updated_at": "2021-12-13T05:10:53Z",
"pushed_at": "2021-12-13T05:10:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437582859,
"name": "log4j-jndi-be-gone",
@ -1798,41 +1854,6 @@
"watchers": 330,
"score": 0
},
{
"id": 437681598,
"name": "CVE-2021-44228-PoC",
"full_name": "sunnyvale-it\/CVE-2021-44228-PoC",
"owner": {
"login": "sunnyvale-it",
"id": 44291039,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
"html_url": "https:\/\/github.com\/sunnyvale-it"
},
"html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC",
"description": "CVE-2021-44228 (Log4Shell) Proof of Concept",
"fork": false,
"created_at": "2021-12-12T23:37:39Z",
"updated_at": "2022-03-18T18:44:50Z",
"pushed_at": "2021-12-13T21:23:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cybersecurity",
"java",
"log4j",
"log4j2",
"security"
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 437685288,
"name": "log4j2-CVE-2021-44228",
@ -1945,6 +1966,34 @@
"watchers": 2,
"score": 0
},
{
"id": 437704633,
"name": "Log4j-check",
"full_name": "bigsizeme\/Log4j-check",
"owner": {
"login": "bigsizeme",
"id": 17845094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
"html_url": "https:\/\/github.com\/bigsizeme"
},
"html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check",
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
"fork": false,
"created_at": "2021-12-13T01:55:51Z",
"updated_at": "2022-06-29T07:51:19Z",
"pushed_at": "2021-12-13T09:18:19Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 44,
"score": 0
},
{
"id": 437709337,
"name": "exploit-CVE-2021-44228",
@ -2229,6 +2278,41 @@
"watchers": 1,
"score": 0
},
{
"id": 437784907,
"name": "aws-log4j-mitigations",
"full_name": "markuman\/aws-log4j-mitigations",
"owner": {
"login": "markuman",
"id": 3920157,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4",
"html_url": "https:\/\/github.com\/markuman"
},
"html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations",
"description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible",
"fork": false,
"created_at": "2021-12-13T08:01:55Z",
"updated_at": "2021-12-13T08:05:42Z",
"pushed_at": "2021-12-13T08:03:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ansible",
"aws",
"cve-2021-44228",
"log4j",
"mitigation",
"waf"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437788180,
"name": "Log4shell",
@ -3001,34 +3085,6 @@
"watchers": 0,
"score": 0
},
{
"id": 437968616,
"name": "CVE-2021-44228_Log4Shell",
"full_name": "yanghaoi\/CVE-2021-44228_Log4Shell",
"owner": {
"login": "yanghaoi",
"id": 21354684,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4",
"html_url": "https:\/\/github.com\/yanghaoi"
},
"html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell",
"description": "Log4Shell A test for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T17:44:01Z",
"updated_at": "2021-12-13T18:03:51Z",
"pushed_at": "2021-12-13T18:06:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437983994,
"name": "log4j_checker",
@ -3066,90 +3122,6 @@
"watchers": 8,
"score": 0
},
{
"id": 437988861,
"name": "Log4j-IOCs",
"full_name": "threatmonit\/Log4j-IOCs",
"owner": {
"login": "threatmonit",
"id": 90388073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4",
"html_url": "https:\/\/github.com\/threatmonit"
},
"html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs",
"description": "Public IOCs about log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T18:52:19Z",
"updated_at": "2022-01-18T23:50:50Z",
"pushed_at": "2021-12-13T19:11:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 437995131,
"name": "l4j-info",
"full_name": "ben-smash\/l4j-info",
"owner": {
"login": "ben-smash",
"id": 95368649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
"html_url": "https:\/\/github.com\/ben-smash"
},
"html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
"description": "Compiling links of value i find regarding CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T19:14:23Z",
"updated_at": "2021-12-13T21:11:09Z",
"pushed_at": "2021-12-13T21:11:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438003225,
"name": "log4j-test",
"full_name": "strawhatasif\/log4j-test",
"owner": {
"login": "strawhatasif",
"id": 10750101,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
"html_url": "https:\/\/github.com\/strawhatasif"
},
"html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
"description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
"fork": false,
"created_at": "2021-12-13T19:43:01Z",
"updated_at": "2021-12-13T20:26:40Z",
"pushed_at": "2021-12-13T20:26:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438012376,
"name": "nmap-log4shell",
@ -3185,34 +3157,6 @@
"watchers": 45,
"score": 0
},
{
"id": 438013062,
"name": "Siem-queries-for-CVE-2021-44228",
"full_name": "tica506\/Siem-queries-for-CVE-2021-44228",
"owner": {
"login": "tica506",
"id": 93236626,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4",
"html_url": "https:\/\/github.com\/tica506"
},
"html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-13T20:19:57Z",
"updated_at": "2021-12-13T20:56:54Z",
"pushed_at": "2021-12-13T20:56:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438021782,
"name": "log4shell-example",
@ -3277,34 +3221,6 @@
"watchers": 4,
"score": 0
},
{
"id": 438028657,
"name": "log4j2-CVE-2021-44228-poc-local",
"full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local",
"owner": {
"login": "snatalius",
"id": 22771118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4",
"html_url": "https:\/\/github.com\/snatalius"
},
"html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local",
"description": "Just a personal proof of concept of CVE-2021-44228 on log4j2",
"fork": false,
"created_at": "2021-12-13T21:21:53Z",
"updated_at": "2021-12-13T21:21:56Z",
"pushed_at": "2021-12-13T21:21:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438032780,
"name": "CVE-2021-44228",
@ -7959,7 +7875,7 @@
"fork": false,
"created_at": "2021-12-24T20:00:12Z",
"updated_at": "2022-01-06T13:31:29Z",
"pushed_at": "2022-07-01T17:49:16Z",
"pushed_at": "2022-07-04T17:24:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "Atlassian Jira Seraph Authentication Bypass RCECVE-2022-0540",
"fork": false,
"created_at": "2022-05-25T10:47:04Z",
"updated_at": "2022-06-23T09:06:31Z",
"updated_at": "2022-07-04T14:21:38Z",
"pushed_at": "2022-05-25T13:43:16Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 30,
"watchers": 31,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-04T12:16:05Z",
"updated_at": "2022-07-04T12:16:05Z",
"pushed_at": "2022-07-04T12:21:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2022-07-04T13:19:53Z",
"pushed_at": "2022-07-04T12:21:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-2185 poc",
"fork": false,
"created_at": "2022-07-02T07:58:01Z",
"updated_at": "2022-07-04T10:06:32Z",
"updated_at": "2022-07-04T13:19:37Z",
"pushed_at": "2022-07-04T10:06:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1587,7 +1587,7 @@
"pushed_at": "2022-06-30T10:55:54Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1600,7 +1600,7 @@
"tomcat"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 14,
"score": 0
},
@ -1791,10 +1791,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2022-07-04T07:48:59Z",
"updated_at": "2022-07-04T17:17:10Z",
"pushed_at": "2022-06-27T02:34:05Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1802,7 +1802,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 30,
"watchers": 32,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
"fork": false,
"created_at": "2022-07-02T22:04:29Z",
"updated_at": "2022-07-04T12:16:34Z",
"updated_at": "2022-07-04T13:24:44Z",
"pushed_at": "2022-07-03T08:53:04Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 1,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 20,
"forks": 2,
"watchers": 21,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-07-04T08:32:03Z",
"updated_at": "2022-07-04T18:20:17Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 389,
"watchers_count": 389,
"stargazers_count": 387,
"watchers_count": 387,
"forks_count": 81,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 389,
"watchers": 387,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-07-04T05:48:03Z",
"updated_at": "2022-07-04T16:56:50Z",
"pushed_at": "2022-06-30T14:47:30Z",
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 32,
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"nday"
],
"visibility": "public",
"forks": 32,
"watchers": 170,
"forks": 33,
"watchers": 178,
"score": 0
},
{
@ -197,10 +197,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-06-03T21:07:30Z",
"updated_at": "2022-07-04T11:30:03Z",
"updated_at": "2022-07-04T16:20:06Z",
"pushed_at": "2022-06-06T20:24:06Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 61,
"watchers": 233,
"watchers": 235,
"score": 0
},
{
@ -1265,5 +1265,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 510402169,
"name": "TryHackMe-Atlassian-CVE-2022-26134",
"full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
"owner": {
"login": "r1skkam",
"id": 58542375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
"html_url": "https:\/\/github.com\/r1skkam"
},
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
"description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.",
"fork": false,
"created_at": "2022-07-04T15:00:21Z",
"updated_at": "2022-07-04T15:00:21Z",
"pushed_at": "2022-07-04T16:49:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
"fork": false,
"created_at": "2022-07-02T06:15:29Z",
"updated_at": "2022-07-04T11:32:44Z",
"updated_at": "2022-07-04T12:42:03Z",
"pushed_at": "2022-07-02T06:15:40Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
"fork": false,
"created_at": "2022-07-02T06:16:33Z",
"updated_at": "2022-07-04T09:46:12Z",
"updated_at": "2022-07-04T18:16:34Z",
"pushed_at": "2022-07-02T17:14:41Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 34,
"watchers": 38,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "Windows Network File System Crash PoC",
"fork": false,
"created_at": "2022-06-17T01:42:55Z",
"updated_at": "2022-07-01T13:01:49Z",
"updated_at": "2022-07-04T17:49:44Z",
"pushed_at": "2022-06-17T01:50:26Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-07-03T23:26:23Z",
"updated_at": "2022-07-04T12:41:29Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 286,
"watchers": 287,
"score": 0
},
{

View file

@ -335,10 +335,10 @@
"description": "CVE-2022-30190 remediation via removal of ms-msdt from Windows registry",
"fork": false,
"created_at": "2022-05-31T23:32:33Z",
"updated_at": "2022-06-07T07:53:31Z",
"updated_at": "2022-07-04T13:15:24Z",
"pushed_at": "2022-05-31T23:43:02Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -346,7 +346,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -1136,20 +1136,20 @@
},
{
"id": 500111558,
"name": "Folina-CVE-2022-30190-POC",
"full_name": "ItsNee\/Folina-CVE-2022-30190-POC",
"name": "Follina-CVE-2022-30190-POC",
"full_name": "ItsNee\/Follina-CVE-2022-30190-POC",
"owner": {
"login": "ItsNee",
"id": 28183719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28183719?v=4",
"html_url": "https:\/\/github.com\/ItsNee"
},
"html_url": "https:\/\/github.com\/ItsNee\/Folina-CVE-2022-30190-POC",
"html_url": "https:\/\/github.com\/ItsNee\/Follina-CVE-2022-30190-POC",
"description": null,
"fork": false,
"created_at": "2022-06-05T13:54:04Z",
"updated_at": "2022-07-01T05:00:47Z",
"pushed_at": "2022-06-05T14:33:00Z",
"updated_at": "2022-07-04T13:27:25Z",
"pushed_at": "2022-07-04T13:27:13Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,

View file

@ -1657,6 +1657,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
### CVE-2022-26155 (2022-02-28)
@ -2289,7 +2290,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
- [SrikeshMaharaj/CVE-2022-30190](https://github.com/SrikeshMaharaj/CVE-2022-30190)
- [DerZiad/CVE-2022-30190](https://github.com/DerZiad/CVE-2022-30190)
- [tej7gandhi/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt](https://github.com/tej7gandhi/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt)
- [ItsNee/Folina-CVE-2022-30190-POC](https://github.com/ItsNee/Folina-CVE-2022-30190-POC)
- [ItsNee/Follina-CVE-2022-30190-POC](https://github.com/ItsNee/Follina-CVE-2022-30190-POC)
- [IamVSM/msdt-follina](https://github.com/IamVSM/msdt-follina)
- [Rojacur/FollinaPatcherCLI](https://github.com/Rojacur/FollinaPatcherCLI)
- [joshuavanderpoll/CVE-2022-30190](https://github.com/joshuavanderpoll/CVE-2022-30190)
@ -3377,6 +3378,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [q77190858/CVE-2021-3156](https://github.com/q77190858/CVE-2021-3156)
- [trhacknon/CVE-2021-3156](https://github.com/trhacknon/CVE-2021-3156)
- [arvindshima/CVE-2021-3156](https://github.com/arvindshima/CVE-2021-3156)
- [FrancescoMarchiori/CVE-2021-3156](https://github.com/FrancescoMarchiori/CVE-2021-3156)
### CVE-2021-3157
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
@ -4988,6 +4990,14 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
### CVE-2021-30632 (2021-10-08)
<code>
Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
</code>
- [CrackerCat/CVE-2021-30632](https://github.com/CrackerCat/CVE-2021-30632)
### CVE-2021-30682 (2021-09-08)
<code>
@ -6221,6 +6231,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
- [Awrrays/Grafana-CVE-2021-43798](https://github.com/Awrrays/Grafana-CVE-2021-43798)
- [Ryze-T/CVE-2021-43798](https://github.com/Ryze-T/CVE-2021-43798)
- [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana)
- [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798)
@ -6373,6 +6384,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [lhotari/log4shell-mitigation-tester](https://github.com/lhotari/log4shell-mitigation-tester)
- [logpresso/CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner)
- [vorburger/Log4j_CVE-2021-44228](https://github.com/vorburger/Log4j_CVE-2021-44228)
- [gauthamg/log4j2021_vul_test](https://github.com/gauthamg/log4j2021_vul_test)
- [b-abderrahmane/CVE-2021-44228-playground](https://github.com/b-abderrahmane/CVE-2021-44228-playground)
- [js-on/jndiRep](https://github.com/js-on/jndiRep)
- [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs)
@ -6393,6 +6405,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [infiniroot/nginx-mitigate-log4shell](https://github.com/infiniroot/nginx-mitigate-log4shell)
- [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected)
- [guardicode/CVE-2021-44228_IoCs](https://github.com/guardicode/CVE-2021-44228_IoCs)
- [fireflyingup/log4j-poc](https://github.com/fireflyingup/log4j-poc)
- [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone)
- [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch)
- [tasooshi/horrors-log4shell](https://github.com/tasooshi/horrors-log4shell)
@ -6403,11 +6416,11 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [palominoinc/cve-2021-44228-log4j-mitigation](https://github.com/palominoinc/cve-2021-44228-log4j-mitigation)
- [cyberxml/log4j-poc](https://github.com/cyberxml/log4j-poc)
- [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell)
- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC)
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
@ -6418,6 +6431,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources)
- [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832)
- [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228)
- [markuman/aws-log4j-mitigations](https://github.com/markuman/aws-log4j-mitigations)
- [tuyenee/Log4shell](https://github.com/tuyenee/Log4shell)
- [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228)
- [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV)
@ -6445,16 +6459,10 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
- [rodfer20/log4j2-prosecutor](https://github.com/rodfer20/log4j2-prosecutor)
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228)
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)
- [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local)
- [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228)
- [back2root/log4shell-rex](https://github.com/back2root/log4shell-rex)
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)
@ -21573,6 +21581,14 @@ Apache CXF supports sending and receiving attachments via either the JAX-WS or J
- [tafamace/CVE-2017-12624](https://github.com/tafamace/CVE-2017-12624)
### CVE-2017-12629 (2017-10-14)
<code>
Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.
</code>
- [77Huan/-Wiki](https://github.com/77Huan/-Wiki)
### CVE-2017-12635 (2017-11-14)
<code>