mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/07/04 18:19:03
This commit is contained in:
parent
ba9e695e72
commit
9007e39cb1
54 changed files with 551 additions and 455 deletions
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-07-04T09:27:18Z",
|
||||
"updated_at": "2022-07-04T17:52:46Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1409,
|
||||
"watchers_count": 1409,
|
||||
"stargazers_count": 1410,
|
||||
"watchers_count": 1410,
|
||||
"forks_count": 298,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 298,
|
||||
"watchers": 1409,
|
||||
"watchers": 1410,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-18T22:38:51Z",
|
||||
"updated_at": "2022-06-22T01:33:52Z",
|
||||
"updated_at": "2022-07-04T16:25:48Z",
|
||||
"pushed_at": "2017-07-22T19:22:55Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 51,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-18T22:38:51Z",
|
||||
"updated_at": "2022-06-22T01:33:52Z",
|
||||
"updated_at": "2022-07-04T16:25:48Z",
|
||||
"pushed_at": "2017-07-22T19:22:55Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 51,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-07-04T09:27:18Z",
|
||||
"updated_at": "2022-07-04T17:52:46Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1409,
|
||||
"watchers_count": 1409,
|
||||
"stargazers_count": 1410,
|
||||
"watchers_count": 1410,
|
||||
"forks_count": 298,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 298,
|
||||
"watchers": 1409,
|
||||
"watchers": 1410,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:16:55Z",
|
||||
"updated_at": "2022-07-04T07:48:59Z",
|
||||
"updated_at": "2022-07-04T17:17:10Z",
|
||||
"pushed_at": "2022-06-27T02:34:05Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -69,10 +69,10 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2022-07-03T02:49:13Z",
|
||||
"updated_at": "2022-07-04T16:25:52Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 678,
|
||||
"watchers_count": 678,
|
||||
"stargazers_count": 677,
|
||||
"watchers_count": 677,
|
||||
"forks_count": 290,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +80,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 290,
|
||||
"watchers": 678,
|
||||
"watchers": 677,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Proof-of-Concept exploits for CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-20T16:35:30Z",
|
||||
"updated_at": "2022-06-15T19:54:26Z",
|
||||
"updated_at": "2022-07-04T16:25:56Z",
|
||||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 492,
|
||||
"watchers_count": 492,
|
||||
"forks_count": 197,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 197,
|
||||
"watchers": 493,
|
||||
"watchers": 492,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -158,10 +158,10 @@
|
|||
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T18:17:28Z",
|
||||
"updated_at": "2022-06-18T22:30:50Z",
|
||||
"updated_at": "2022-07-04T16:25:56Z",
|
||||
"pushed_at": "2017-11-21T20:34:57Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -169,7 +169,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 99,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2022-06-15T19:54:15Z",
|
||||
"updated_at": "2022-07-04T16:25:55Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"stargazers_count": 370,
|
||||
"watchers_count": 370,
|
||||
"forks_count": 138,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 138,
|
||||
"watchers": 371,
|
||||
"watchers": 370,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2017/CVE-2017-12629.json
Normal file
30
2017/CVE-2017-12629.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 510365717,
|
||||
"name": "-Wiki",
|
||||
"full_name": "77Huan\/-Wiki",
|
||||
"owner": {
|
||||
"login": "77Huan",
|
||||
"id": 103548145,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103548145?v=4",
|
||||
"html_url": "https:\/\/github.com\/77Huan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/77Huan\/-Wiki",
|
||||
"description": " Apache Solr RCE检测脚本 (CVE-2017-12629)",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T13:14:36Z",
|
||||
"updated_at": "2022-07-04T13:14:36Z",
|
||||
"pushed_at": "2022-07-04T13:15:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-07-04T09:27:18Z",
|
||||
"updated_at": "2022-07-04T17:52:46Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1409,
|
||||
"watchers_count": 1409,
|
||||
"stargazers_count": 1410,
|
||||
"watchers_count": 1410,
|
||||
"forks_count": 298,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 298,
|
||||
"watchers": 1409,
|
||||
"watchers": 1410,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -439,10 +439,10 @@
|
|||
"description": "SambaCry exploit (CVE-2017-7494) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-07T11:42:40Z",
|
||||
"updated_at": "2022-07-03T13:05:05Z",
|
||||
"updated_at": "2022-07-04T13:45:51Z",
|
||||
"pushed_at": "2022-05-08T09:02:36Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -450,7 +450,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 32,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -69,10 +69,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-06T09:51:01Z",
|
||||
"updated_at": "2021-12-26T05:10:02Z",
|
||||
"updated_at": "2022-07-04T16:25:52Z",
|
||||
"pushed_at": "2019-10-22T07:08:19Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +80,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 24,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -101,13 +101,13 @@
|
|||
"pushed_at": "2021-05-27T13:58:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 6,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Versión Dr. DLL (CVE-2018-18333)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-30T01:23:33Z",
|
||||
"updated_at": "2022-04-18T04:56:50Z",
|
||||
"updated_at": "2022-07-04T16:48:11Z",
|
||||
"pushed_at": "2022-04-18T04:56:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -21,7 +21,23 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"backdoor",
|
||||
"cve",
|
||||
"ddl",
|
||||
"demo",
|
||||
"exploits",
|
||||
"hacking",
|
||||
"metasploit",
|
||||
"msfvenom",
|
||||
"payload",
|
||||
"pentesting",
|
||||
"python",
|
||||
"spanish",
|
||||
"windows",
|
||||
"windows-cve",
|
||||
"windows-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -549,10 +549,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-07-04T09:27:18Z",
|
||||
"updated_at": "2022-07-04T17:52:46Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1409,
|
||||
"watchers_count": 1409,
|
||||
"stargazers_count": 1410,
|
||||
"watchers_count": 1410,
|
||||
"forks_count": 298,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -581,7 +581,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 298,
|
||||
"watchers": 1409,
|
||||
"watchers": 1410,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -357,10 +357,10 @@
|
|||
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-04T14:25:09Z",
|
||||
"updated_at": "2022-06-26T03:11:30Z",
|
||||
"updated_at": "2022-07-04T16:25:58Z",
|
||||
"pushed_at": "2020-10-01T11:51:46Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -368,7 +368,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 91,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2019-01-23T14:27:21Z",
|
||||
"stargazers_count": 471,
|
||||
"watchers_count": 471,
|
||||
"forks_count": 192,
|
||||
"forks_count": 191,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 192,
|
||||
"forks": 191,
|
||||
"watchers": 471,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -382,10 +382,10 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2022-06-27T02:52:30Z",
|
||||
"updated_at": "2022-07-04T12:50:41Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"stargazers_count": 370,
|
||||
"watchers_count": 370,
|
||||
"forks_count": 193,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -404,7 +404,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 193,
|
||||
"watchers": 371,
|
||||
"watchers": 370,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T10:21:35Z",
|
||||
"updated_at": "2022-06-16T11:46:00Z",
|
||||
"updated_at": "2022-07-04T13:01:00Z",
|
||||
"pushed_at": "2019-06-13T09:55:07Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 10,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 20,
|
||||
"forks": 11,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2022-07-03T07:25:05Z",
|
||||
"updated_at": "2022-07-04T17:18:49Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-07-04T09:47:58Z",
|
||||
"updated_at": "2022-07-04T14:42:14Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3403,
|
||||
"watchers_count": 3403,
|
||||
"stargazers_count": 3404,
|
||||
"watchers_count": 3404,
|
||||
"forks_count": 1016,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -72,7 +72,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1016,
|
||||
"watchers": 3403,
|
||||
"watchers": 3404,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -181,10 +181,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-07-04T09:27:18Z",
|
||||
"updated_at": "2022-07-04T17:52:46Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1409,
|
||||
"watchers_count": 1409,
|
||||
"stargazers_count": 1410,
|
||||
"watchers_count": 1410,
|
||||
"forks_count": 298,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -213,7 +213,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 298,
|
||||
"watchers": 1409,
|
||||
"watchers": 1410,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-02T14:48:55Z",
|
||||
"updated_at": "2022-06-18T04:00:41Z",
|
||||
"updated_at": "2022-07-04T14:01:12Z",
|
||||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 38,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 144,
|
||||
"forks": 39,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -97,10 +97,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-07-03T15:31:32Z",
|
||||
"updated_at": "2022-07-04T18:10:59Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 933,
|
||||
"watchers_count": 933,
|
||||
"stargazers_count": 934,
|
||||
"watchers_count": 934,
|
||||
"forks_count": 263,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 263,
|
||||
"watchers": 933,
|
||||
"watchers": 934,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -160,10 +160,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2022-07-03T15:31:32Z",
|
||||
"updated_at": "2022-07-04T17:38:26Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 436,
|
||||
"watchers_count": 436,
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"forks_count": 127,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -171,7 +171,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 127,
|
||||
"watchers": 436,
|
||||
"watchers": 437,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1633,10 +1633,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-23T07:18:17Z",
|
||||
"updated_at": "2022-06-24T07:09:56Z",
|
||||
"updated_at": "2022-07-04T13:52:48Z",
|
||||
"pushed_at": "2022-07-04T06:45:59Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1644,7 +1644,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-07-04T09:47:58Z",
|
||||
"updated_at": "2022-07-04T14:42:14Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3403,
|
||||
"watchers_count": 3403,
|
||||
"stargazers_count": 3404,
|
||||
"watchers_count": 3404,
|
||||
"forks_count": 1016,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1016,
|
||||
"watchers": 3403,
|
||||
"watchers": 3404,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-07-04T09:27:18Z",
|
||||
"updated_at": "2022-07-04T17:52:46Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1409,
|
||||
"watchers_count": 1409,
|
||||
"stargazers_count": 1410,
|
||||
"watchers_count": 1410,
|
||||
"forks_count": 298,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 298,
|
||||
"watchers": 1409,
|
||||
"watchers": 1410,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2022-06-15T19:58:33Z",
|
||||
"updated_at": "2022-07-04T16:10:52Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 127,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-07-04T09:15:50Z",
|
||||
"updated_at": "2022-07-04T16:10:53Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1575,
|
||||
"watchers_count": 1575,
|
||||
"stargazers_count": 1574,
|
||||
"watchers_count": 1574,
|
||||
"forks_count": 567,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 567,
|
||||
"watchers": 1575,
|
||||
"watchers": 1574,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,10 +220,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T11:03:13Z",
|
||||
"updated_at": "2022-07-04T06:44:18Z",
|
||||
"updated_at": "2022-07-04T12:49:26Z",
|
||||
"pushed_at": "2021-06-07T04:00:06Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -231,7 +231,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -69,10 +69,10 @@
|
|||
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-11T04:34:07Z",
|
||||
"updated_at": "2022-07-04T08:58:26Z",
|
||||
"updated_at": "2022-07-04T13:22:49Z",
|
||||
"pushed_at": "2022-01-16T15:54:14Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -87,7 +87,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2022-06-15T19:58:33Z",
|
||||
"updated_at": "2022-07-04T16:10:52Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 127,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -309,10 +309,10 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2022-06-12T20:59:12Z",
|
||||
"updated_at": "2022-07-04T16:10:51Z",
|
||||
"pushed_at": "2022-03-02T15:41:29Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -328,7 +328,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 139,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -492,8 +492,8 @@
|
|||
"description": " CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T19:35:35Z",
|
||||
"updated_at": "2022-06-28T02:10:41Z",
|
||||
"pushed_at": "2022-06-28T02:06:10Z",
|
||||
"updated_at": "2022-07-04T17:15:05Z",
|
||||
"pushed_at": "2022-07-04T17:14:38Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 8,
|
||||
|
@ -520,10 +520,10 @@
|
|||
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T20:51:48Z",
|
||||
"updated_at": "2022-06-30T07:14:35Z",
|
||||
"updated_at": "2022-07-04T16:10:52Z",
|
||||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -531,7 +531,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 60,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -909,10 +909,10 @@
|
|||
"description": "ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-17T03:56:54Z",
|
||||
"updated_at": "2022-06-18T04:00:42Z",
|
||||
"updated_at": "2022-07-04T16:44:57Z",
|
||||
"pushed_at": "2021-03-17T05:06:18Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -931,7 +931,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2021/CVE-2021-30632.json
Normal file
30
2021/CVE-2021-30632.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 411162655,
|
||||
"name": "CVE-2021-30632",
|
||||
"full_name": "CrackerCat\/CVE-2021-30632",
|
||||
"owner": {
|
||||
"login": "CrackerCat",
|
||||
"id": 17995064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
|
||||
"html_url": "https:\/\/github.com\/CrackerCat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-30632",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-28T06:27:49Z",
|
||||
"updated_at": "2022-02-16T03:32:22Z",
|
||||
"pushed_at": "2021-12-13T06:02:21Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1554,5 +1554,37 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510379940,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "FrancescoMarchiori\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "FrancescoMarchiori",
|
||||
"id": 73738800,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73738800?v=4",
|
||||
"html_url": "https:\/\/github.com\/FrancescoMarchiori"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FrancescoMarchiori\/CVE-2021-3156",
|
||||
"description": "Fuzzing, visualization and exploit of sudo vulnerability CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T13:55:24Z",
|
||||
"updated_at": "2022-07-04T13:55:45Z",
|
||||
"pushed_at": "2022-07-04T14:39:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-3156",
|
||||
"pwn",
|
||||
"sudo"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -190,10 +190,10 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2022-06-26T06:03:11Z",
|
||||
"updated_at": "2022-07-04T14:01:39Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -201,7 +201,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Recursive MMIO VM Escape PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-13T05:33:28Z",
|
||||
"updated_at": "2022-06-30T07:31:13Z",
|
||||
"updated_at": "2022-07-04T13:57:35Z",
|
||||
"pushed_at": "2022-05-13T05:37:41Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 21,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 136,
|
||||
"forks": 22,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -75,18 +75,18 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-07-04T11:18:49Z",
|
||||
"updated_at": "2022-07-04T14:56:32Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1591,
|
||||
"watchers_count": 1591,
|
||||
"forks_count": 460,
|
||||
"stargazers_count": 1593,
|
||||
"watchers_count": 1593,
|
||||
"forks_count": 462,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 460,
|
||||
"watchers": 1591,
|
||||
"forks": 462,
|
||||
"watchers": 1593,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -163,7 +163,7 @@
|
|||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 875,
|
||||
"watchers_count": 875,
|
||||
"forks_count": 283,
|
||||
"forks_count": 285,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -173,7 +173,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 283,
|
||||
"forks": 285,
|
||||
"watchers": 875,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -906,10 +906,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-07-03T21:31:10Z",
|
||||
"updated_at": "2022-07-04T17:26:42Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 544,
|
||||
"watchers_count": 544,
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -919,7 +919,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 544,
|
||||
"watchers": 545,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1249,18 +1249,18 @@
|
|||
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T17:53:16Z",
|
||||
"updated_at": "2022-07-01T07:24:04Z",
|
||||
"updated_at": "2022-07-04T12:58:05Z",
|
||||
"pushed_at": "2022-01-28T00:29:15Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 21,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 67,
|
||||
"forks": 22,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2022-06-23T19:36:27Z",
|
||||
"updated_at": "2022-07-04T12:50:41Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1437,
|
||||
"watchers_count": 1437,
|
||||
"stargazers_count": 1436,
|
||||
"watchers_count": 1436,
|
||||
"forks_count": 475,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 475,
|
||||
"watchers": 1437,
|
||||
"watchers": 1436,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Apache 2.4.50 Path traversal vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T05:44:54Z",
|
||||
"updated_at": "2022-04-13T00:19:07Z",
|
||||
"updated_at": "2022-07-04T15:27:56Z",
|
||||
"pushed_at": "2022-04-11T20:00:17Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -227,6 +227,34 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437761790,
|
||||
"name": "Grafana-CVE-2021-43798",
|
||||
"full_name": "Awrrays\/Grafana-CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "Awrrays",
|
||||
"id": 55682880,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55682880?v=4",
|
||||
"html_url": "https:\/\/github.com\/Awrrays"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Awrrays\/Grafana-CVE-2021-43798",
|
||||
"description": "Grafana任意文件读取",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T06:32:39Z",
|
||||
"updated_at": "2022-04-05T16:48:25Z",
|
||||
"pushed_at": "2021-12-13T06:36:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438335194,
|
||||
"name": "CVE-2021-43798",
|
||||
|
|
|
@ -881,6 +881,34 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437265792,
|
||||
"name": "log4j2021_vul_test",
|
||||
"full_name": "gauthamg\/log4j2021_vul_test",
|
||||
"owner": {
|
||||
"login": "gauthamg",
|
||||
"id": 8748677,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4",
|
||||
"html_url": "https:\/\/github.com\/gauthamg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test",
|
||||
"description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:41:04Z",
|
||||
"updated_at": "2021-12-13T06:49:35Z",
|
||||
"pushed_at": "2021-12-13T06:49:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437273514,
|
||||
"name": "CVE-2021-44228-playground",
|
||||
|
@ -1494,6 +1522,34 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437574258,
|
||||
"name": "log4j-poc",
|
||||
"full_name": "fireflyingup\/log4j-poc",
|
||||
"owner": {
|
||||
"login": "fireflyingup",
|
||||
"id": 48504204,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4",
|
||||
"html_url": "https:\/\/github.com\/fireflyingup"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc",
|
||||
"description": "CVE-2021-44228 test demo",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T14:54:25Z",
|
||||
"updated_at": "2021-12-13T05:10:53Z",
|
||||
"pushed_at": "2021-12-13T05:10:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437582859,
|
||||
"name": "log4j-jndi-be-gone",
|
||||
|
@ -1798,41 +1854,6 @@
|
|||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437681598,
|
||||
"name": "CVE-2021-44228-PoC",
|
||||
"full_name": "sunnyvale-it\/CVE-2021-44228-PoC",
|
||||
"owner": {
|
||||
"login": "sunnyvale-it",
|
||||
"id": 44291039,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
|
||||
"html_url": "https:\/\/github.com\/sunnyvale-it"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC",
|
||||
"description": "CVE-2021-44228 (Log4Shell) Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T23:37:39Z",
|
||||
"updated_at": "2022-03-18T18:44:50Z",
|
||||
"pushed_at": "2021-12-13T21:23:25Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cybersecurity",
|
||||
"java",
|
||||
"log4j",
|
||||
"log4j2",
|
||||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437685288,
|
||||
"name": "log4j2-CVE-2021-44228",
|
||||
|
@ -1945,6 +1966,34 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437704633,
|
||||
"name": "Log4j-check",
|
||||
"full_name": "bigsizeme\/Log4j-check",
|
||||
"owner": {
|
||||
"login": "bigsizeme",
|
||||
"id": 17845094,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigsizeme"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check",
|
||||
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T01:55:51Z",
|
||||
"updated_at": "2022-06-29T07:51:19Z",
|
||||
"pushed_at": "2021-12-13T09:18:19Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437709337,
|
||||
"name": "exploit-CVE-2021-44228",
|
||||
|
@ -2229,6 +2278,41 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437784907,
|
||||
"name": "aws-log4j-mitigations",
|
||||
"full_name": "markuman\/aws-log4j-mitigations",
|
||||
"owner": {
|
||||
"login": "markuman",
|
||||
"id": 3920157,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4",
|
||||
"html_url": "https:\/\/github.com\/markuman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations",
|
||||
"description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T08:01:55Z",
|
||||
"updated_at": "2021-12-13T08:05:42Z",
|
||||
"pushed_at": "2021-12-13T08:03:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"ansible",
|
||||
"aws",
|
||||
"cve-2021-44228",
|
||||
"log4j",
|
||||
"mitigation",
|
||||
"waf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437788180,
|
||||
"name": "Log4shell",
|
||||
|
@ -3001,34 +3085,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437968616,
|
||||
"name": "CVE-2021-44228_Log4Shell",
|
||||
"full_name": "yanghaoi\/CVE-2021-44228_Log4Shell",
|
||||
"owner": {
|
||||
"login": "yanghaoi",
|
||||
"id": 21354684,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4",
|
||||
"html_url": "https:\/\/github.com\/yanghaoi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell",
|
||||
"description": "Log4Shell A test for CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:44:01Z",
|
||||
"updated_at": "2021-12-13T18:03:51Z",
|
||||
"pushed_at": "2021-12-13T18:06:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437983994,
|
||||
"name": "log4j_checker",
|
||||
|
@ -3066,90 +3122,6 @@
|
|||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437988861,
|
||||
"name": "Log4j-IOCs",
|
||||
"full_name": "threatmonit\/Log4j-IOCs",
|
||||
"owner": {
|
||||
"login": "threatmonit",
|
||||
"id": 90388073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4",
|
||||
"html_url": "https:\/\/github.com\/threatmonit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs",
|
||||
"description": "Public IOCs about log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T18:52:19Z",
|
||||
"updated_at": "2022-01-18T23:50:50Z",
|
||||
"pushed_at": "2021-12-13T19:11:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437995131,
|
||||
"name": "l4j-info",
|
||||
"full_name": "ben-smash\/l4j-info",
|
||||
"owner": {
|
||||
"login": "ben-smash",
|
||||
"id": 95368649,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
|
||||
"html_url": "https:\/\/github.com\/ben-smash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
|
||||
"description": "Compiling links of value i find regarding CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T19:14:23Z",
|
||||
"updated_at": "2021-12-13T21:11:09Z",
|
||||
"pushed_at": "2021-12-13T21:11:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438003225,
|
||||
"name": "log4j-test",
|
||||
"full_name": "strawhatasif\/log4j-test",
|
||||
"owner": {
|
||||
"login": "strawhatasif",
|
||||
"id": 10750101,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
|
||||
"html_url": "https:\/\/github.com\/strawhatasif"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
|
||||
"description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T19:43:01Z",
|
||||
"updated_at": "2021-12-13T20:26:40Z",
|
||||
"pushed_at": "2021-12-13T20:26:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438012376,
|
||||
"name": "nmap-log4shell",
|
||||
|
@ -3185,34 +3157,6 @@
|
|||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438013062,
|
||||
"name": "Siem-queries-for-CVE-2021-44228",
|
||||
"full_name": "tica506\/Siem-queries-for-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "tica506",
|
||||
"id": 93236626,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4",
|
||||
"html_url": "https:\/\/github.com\/tica506"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T20:19:57Z",
|
||||
"updated_at": "2021-12-13T20:56:54Z",
|
||||
"pushed_at": "2021-12-13T20:56:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438021782,
|
||||
"name": "log4shell-example",
|
||||
|
@ -3277,34 +3221,6 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438028657,
|
||||
"name": "log4j2-CVE-2021-44228-poc-local",
|
||||
"full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local",
|
||||
"owner": {
|
||||
"login": "snatalius",
|
||||
"id": 22771118,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4",
|
||||
"html_url": "https:\/\/github.com\/snatalius"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local",
|
||||
"description": "Just a personal proof of concept of CVE-2021-44228 on log4j2",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:21:53Z",
|
||||
"updated_at": "2021-12-13T21:21:56Z",
|
||||
"pushed_at": "2021-12-13T21:21:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438032780,
|
||||
"name": "CVE-2021-44228",
|
||||
|
@ -7959,7 +7875,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-24T20:00:12Z",
|
||||
"updated_at": "2022-01-06T13:31:29Z",
|
||||
"pushed_at": "2022-07-01T17:49:16Z",
|
||||
"pushed_at": "2022-07-04T17:24:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T10:47:04Z",
|
||||
"updated_at": "2022-06-23T09:06:31Z",
|
||||
"updated_at": "2022-07-04T14:21:38Z",
|
||||
"pushed_at": "2022-05-25T13:43:16Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T12:16:05Z",
|
||||
"updated_at": "2022-07-04T12:16:05Z",
|
||||
"pushed_at": "2022-07-04T12:21:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2022-07-04T13:19:53Z",
|
||||
"pushed_at": "2022-07-04T12:21:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-2185 poc",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T07:58:01Z",
|
||||
"updated_at": "2022-07-04T10:06:32Z",
|
||||
"updated_at": "2022-07-04T13:19:37Z",
|
||||
"pushed_at": "2022-07-04T10:06:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1587,7 +1587,7 @@
|
|||
"pushed_at": "2022-06-30T10:55:54Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1600,7 +1600,7 @@
|
|||
"tomcat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1791,10 +1791,10 @@
|
|||
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:16:55Z",
|
||||
"updated_at": "2022-07-04T07:48:59Z",
|
||||
"updated_at": "2022-07-04T17:17:10Z",
|
||||
"pushed_at": "2022-06-27T02:34:05Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1802,7 +1802,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T22:04:29Z",
|
||||
"updated_at": "2022-07-04T12:16:34Z",
|
||||
"updated_at": "2022-07-04T13:24:44Z",
|
||||
"pushed_at": "2022-07-03T08:53:04Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 20,
|
||||
"forks": 2,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-25636",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T13:38:41Z",
|
||||
"updated_at": "2022-07-04T08:32:03Z",
|
||||
"updated_at": "2022-07-04T18:20:17Z",
|
||||
"pushed_at": "2022-03-07T17:18:19Z",
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"stargazers_count": 387,
|
||||
"watchers_count": 387,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 389,
|
||||
"watchers": 387,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-07-04T05:48:03Z",
|
||||
"updated_at": "2022-07-04T16:56:50Z",
|
||||
"pushed_at": "2022-06-30T14:47:30Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 32,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"nday"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 170,
|
||||
"forks": 33,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,10 +197,10 @@
|
|||
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T21:07:30Z",
|
||||
"updated_at": "2022-07-04T11:30:03Z",
|
||||
"updated_at": "2022-07-04T16:20:06Z",
|
||||
"pushed_at": "2022-06-06T20:24:06Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 233,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1265,5 +1265,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510402169,
|
||||
"name": "TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"owner": {
|
||||
"login": "r1skkam",
|
||||
"id": 58542375,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
|
||||
"html_url": "https:\/\/github.com\/r1skkam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T15:00:21Z",
|
||||
"updated_at": "2022-07-04T15:00:21Z",
|
||||
"pushed_at": "2022-07-04T16:49:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:15:29Z",
|
||||
"updated_at": "2022-07-04T11:32:44Z",
|
||||
"updated_at": "2022-07-04T12:42:03Z",
|
||||
"pushed_at": "2022-07-02T06:15:40Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:16:33Z",
|
||||
"updated_at": "2022-07-04T09:46:12Z",
|
||||
"updated_at": "2022-07-04T18:16:34Z",
|
||||
"pushed_at": "2022-07-02T17:14:41Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 34,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Windows Network File System Crash PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-17T01:42:55Z",
|
||||
"updated_at": "2022-07-01T13:01:49Z",
|
||||
"updated_at": "2022-07-04T17:49:44Z",
|
||||
"pushed_at": "2022-06-17T01:50:26Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-07-03T23:26:23Z",
|
||||
"updated_at": "2022-07-04T12:41:29Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 286,
|
||||
"watchers": 287,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -335,10 +335,10 @@
|
|||
"description": "CVE-2022-30190 remediation via removal of ms-msdt from Windows registry",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T23:32:33Z",
|
||||
"updated_at": "2022-06-07T07:53:31Z",
|
||||
"updated_at": "2022-07-04T13:15:24Z",
|
||||
"pushed_at": "2022-05-31T23:43:02Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -346,7 +346,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1136,20 +1136,20 @@
|
|||
},
|
||||
{
|
||||
"id": 500111558,
|
||||
"name": "Folina-CVE-2022-30190-POC",
|
||||
"full_name": "ItsNee\/Folina-CVE-2022-30190-POC",
|
||||
"name": "Follina-CVE-2022-30190-POC",
|
||||
"full_name": "ItsNee\/Follina-CVE-2022-30190-POC",
|
||||
"owner": {
|
||||
"login": "ItsNee",
|
||||
"id": 28183719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28183719?v=4",
|
||||
"html_url": "https:\/\/github.com\/ItsNee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ItsNee\/Folina-CVE-2022-30190-POC",
|
||||
"html_url": "https:\/\/github.com\/ItsNee\/Follina-CVE-2022-30190-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-05T13:54:04Z",
|
||||
"updated_at": "2022-07-01T05:00:47Z",
|
||||
"pushed_at": "2022-06-05T14:33:00Z",
|
||||
"updated_at": "2022-07-04T13:27:25Z",
|
||||
"pushed_at": "2022-07-04T13:27:13Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
|
|
32
README.md
32
README.md
|
@ -1657,6 +1657,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
|
||||
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
|
||||
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
|
||||
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
|
||||
|
||||
### CVE-2022-26155 (2022-02-28)
|
||||
|
||||
|
@ -2289,7 +2290,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
|
|||
- [SrikeshMaharaj/CVE-2022-30190](https://github.com/SrikeshMaharaj/CVE-2022-30190)
|
||||
- [DerZiad/CVE-2022-30190](https://github.com/DerZiad/CVE-2022-30190)
|
||||
- [tej7gandhi/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt](https://github.com/tej7gandhi/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt)
|
||||
- [ItsNee/Folina-CVE-2022-30190-POC](https://github.com/ItsNee/Folina-CVE-2022-30190-POC)
|
||||
- [ItsNee/Follina-CVE-2022-30190-POC](https://github.com/ItsNee/Follina-CVE-2022-30190-POC)
|
||||
- [IamVSM/msdt-follina](https://github.com/IamVSM/msdt-follina)
|
||||
- [Rojacur/FollinaPatcherCLI](https://github.com/Rojacur/FollinaPatcherCLI)
|
||||
- [joshuavanderpoll/CVE-2022-30190](https://github.com/joshuavanderpoll/CVE-2022-30190)
|
||||
|
@ -3377,6 +3378,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [q77190858/CVE-2021-3156](https://github.com/q77190858/CVE-2021-3156)
|
||||
- [trhacknon/CVE-2021-3156](https://github.com/trhacknon/CVE-2021-3156)
|
||||
- [arvindshima/CVE-2021-3156](https://github.com/arvindshima/CVE-2021-3156)
|
||||
- [FrancescoMarchiori/CVE-2021-3156](https://github.com/FrancescoMarchiori/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
|
||||
|
@ -4988,6 +4990,14 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
|
|||
|
||||
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
|
||||
|
||||
### CVE-2021-30632 (2021-10-08)
|
||||
|
||||
<code>
|
||||
Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [CrackerCat/CVE-2021-30632](https://github.com/CrackerCat/CVE-2021-30632)
|
||||
|
||||
### CVE-2021-30682 (2021-09-08)
|
||||
|
||||
<code>
|
||||
|
@ -6221,6 +6231,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
|||
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
|
||||
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
|
||||
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
|
||||
- [Awrrays/Grafana-CVE-2021-43798](https://github.com/Awrrays/Grafana-CVE-2021-43798)
|
||||
- [Ryze-T/CVE-2021-43798](https://github.com/Ryze-T/CVE-2021-43798)
|
||||
- [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana)
|
||||
- [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798)
|
||||
|
@ -6373,6 +6384,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [lhotari/log4shell-mitigation-tester](https://github.com/lhotari/log4shell-mitigation-tester)
|
||||
- [logpresso/CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner)
|
||||
- [vorburger/Log4j_CVE-2021-44228](https://github.com/vorburger/Log4j_CVE-2021-44228)
|
||||
- [gauthamg/log4j2021_vul_test](https://github.com/gauthamg/log4j2021_vul_test)
|
||||
- [b-abderrahmane/CVE-2021-44228-playground](https://github.com/b-abderrahmane/CVE-2021-44228-playground)
|
||||
- [js-on/jndiRep](https://github.com/js-on/jndiRep)
|
||||
- [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs)
|
||||
|
@ -6393,6 +6405,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [infiniroot/nginx-mitigate-log4shell](https://github.com/infiniroot/nginx-mitigate-log4shell)
|
||||
- [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected)
|
||||
- [guardicode/CVE-2021-44228_IoCs](https://github.com/guardicode/CVE-2021-44228_IoCs)
|
||||
- [fireflyingup/log4j-poc](https://github.com/fireflyingup/log4j-poc)
|
||||
- [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone)
|
||||
- [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch)
|
||||
- [tasooshi/horrors-log4shell](https://github.com/tasooshi/horrors-log4shell)
|
||||
|
@ -6403,11 +6416,11 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [palominoinc/cve-2021-44228-log4j-mitigation](https://github.com/palominoinc/cve-2021-44228-log4j-mitigation)
|
||||
- [cyberxml/log4j-poc](https://github.com/cyberxml/log4j-poc)
|
||||
- [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell)
|
||||
- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC)
|
||||
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
|
||||
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
|
||||
- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
|
||||
- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
|
||||
- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
|
||||
- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
|
||||
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
|
||||
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
|
||||
|
@ -6418,6 +6431,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources)
|
||||
- [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832)
|
||||
- [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228)
|
||||
- [markuman/aws-log4j-mitigations](https://github.com/markuman/aws-log4j-mitigations)
|
||||
- [tuyenee/Log4shell](https://github.com/tuyenee/Log4shell)
|
||||
- [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228)
|
||||
- [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV)
|
||||
|
@ -6445,16 +6459,10 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
|
||||
- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
|
||||
- [rodfer20/log4j2-prosecutor](https://github.com/rodfer20/log4j2-prosecutor)
|
||||
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
|
||||
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
|
||||
- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)
|
||||
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
|
||||
- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
|
||||
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
|
||||
- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228)
|
||||
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
|
||||
- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)
|
||||
- [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local)
|
||||
- [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228)
|
||||
- [back2root/log4shell-rex](https://github.com/back2root/log4shell-rex)
|
||||
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)
|
||||
|
@ -21573,6 +21581,14 @@ Apache CXF supports sending and receiving attachments via either the JAX-WS or J
|
|||
|
||||
- [tafamace/CVE-2017-12624](https://github.com/tafamace/CVE-2017-12624)
|
||||
|
||||
### CVE-2017-12629 (2017-10-14)
|
||||
|
||||
<code>
|
||||
Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.
|
||||
</code>
|
||||
|
||||
- [77Huan/-Wiki](https://github.com/77Huan/-Wiki)
|
||||
|
||||
### CVE-2017-12635 (2017-11-14)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue