mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/12/23 12:13:47
This commit is contained in:
parent
bebcd21bcf
commit
9069334db0
52 changed files with 469 additions and 464 deletions
|
@ -121,14 +121,19 @@
|
|||
"description": "vsFTPd 2.3.4 Backdoor Exploit CVE-2011-2523",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T20:51:35Z",
|
||||
"updated_at": "2021-12-22T20:58:40Z",
|
||||
"updated_at": "2021-12-23T11:22:45Z",
|
||||
"pushed_at": "2021-12-22T20:57:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"exploit",
|
||||
"pwn",
|
||||
"pwntools",
|
||||
"python3"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-21T11:41:26Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 276,
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -70,8 +70,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1248,
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2017-11-23T20:55:03Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 155,
|
||||
"forks_count": 154,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"forks": 154,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2015-12-15T05:42:02Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 95,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"forks": 94,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-21T11:41:26Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 276,
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -43,8 +43,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1248,
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2016-04-08T05:34:58Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 21,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 20,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Zoneminder 未授权访问Poc:ZoneMinder v1.30和v1.29捆绑的Apache HTTP Server配置中存在信息泄露和认证绕过漏洞,允许远程未认证攻击者浏览web根目录下的所有目录。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T13:17:10Z",
|
||||
"updated_at": "2021-12-21T13:24:48Z",
|
||||
"pushed_at": "2021-12-21T13:21:18Z",
|
||||
"updated_at": "2021-12-23T07:50:59Z",
|
||||
"pushed_at": "2021-12-23T07:50:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -211,14 +211,14 @@
|
|||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 62,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2017-11882"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"forks": 61,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-21T11:41:26Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 276,
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -70,8 +70,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1248,
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-04T01:12:47Z",
|
||||
"updated_at": "2021-12-20T16:21:45Z",
|
||||
"updated_at": "2021-12-23T06:37:45Z",
|
||||
"pushed_at": "2018-11-18T11:14:20Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 97,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spectre exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T05:06:12Z",
|
||||
"updated_at": "2021-12-18T11:31:09Z",
|
||||
"updated_at": "2021-12-23T08:31:17Z",
|
||||
"pushed_at": "2018-01-09T22:27:25Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2021-01-03T21:14:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -83,17 +83,17 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2021-12-17T02:30:45Z",
|
||||
"updated_at": "2021-12-23T07:59:23Z",
|
||||
"pushed_at": "2021-11-08T02:19:03Z",
|
||||
"stargazers_count": 474,
|
||||
"watchers_count": 474,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 474,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -287,7 +287,7 @@
|
|||
"pushed_at": "2018-05-21T09:06:43Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 52,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -296,7 +296,7 @@
|
|||
"ysoserial"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"forks": 53,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -530,11 +530,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-21T11:41:26Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 276,
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -560,8 +560,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1248,
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2021-12-16T20:53:46Z",
|
||||
"updated_at": "2021-12-23T07:37:54Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 434,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -84,12 +84,12 @@
|
|||
"pushed_at": "2019-09-26T04:25:36Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-23T02:56:42Z",
|
||||
"updated_at": "2021-12-23T08:34:50Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3059,
|
||||
"watchers_count": 3059,
|
||||
"stargazers_count": 3063,
|
||||
"watchers_count": 3063,
|
||||
"forks_count": 908,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 908,
|
||||
"watchers": 3059,
|
||||
"watchers": 3063,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,11 +175,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-21T11:41:26Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 276,
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -205,8 +205,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1248,
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,11 +94,11 @@
|
|||
"description": "CVE-2019-3396 confluence SSTI RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T02:15:47Z",
|
||||
"updated_at": "2021-12-15T14:36:08Z",
|
||||
"updated_at": "2021-12-23T08:45:44Z",
|
||||
"pushed_at": "2020-10-01T08:40:07Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"forks_count": 68,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -108,8 +108,8 @@
|
|||
"ssti"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 164,
|
||||
"forks": 69,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2021-12-15T14:39:35Z",
|
||||
"updated_at": "2021-12-23T10:14:20Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 591,
|
||||
"watchers_count": 591,
|
||||
"stargazers_count": 592,
|
||||
"watchers_count": 592,
|
||||
"forks_count": 154,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 154,
|
||||
"watchers": 591,
|
||||
"watchers": 592,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1171,17 +1171,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T01:46:08Z",
|
||||
"updated_at": "2021-12-08T04:55:40Z",
|
||||
"updated_at": "2021-12-23T08:48:50Z",
|
||||
"pushed_at": "2020-04-01T01:46:17Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,17 +45,17 @@
|
|||
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T15:40:03Z",
|
||||
"updated_at": "2021-12-15T14:40:51Z",
|
||||
"updated_at": "2021-12-23T08:09:53Z",
|
||||
"pushed_at": "2021-04-23T19:21:16Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -155,17 +155,17 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-12-23T02:26:09Z",
|
||||
"updated_at": "2021-12-23T09:27:27Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 118,
|
||||
"watchers": 386,
|
||||
"watchers": 388,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-23T02:56:42Z",
|
||||
"updated_at": "2021-12-23T08:34:50Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3059,
|
||||
"watchers_count": 3059,
|
||||
"stargazers_count": 3063,
|
||||
"watchers_count": 3063,
|
||||
"forks_count": 908,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 908,
|
||||
"watchers": 3059,
|
||||
"watchers": 3063,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -681,17 +681,17 @@
|
|||
"description": "CVE-2020-14882_Exploit 支持12.2.X和10.3.6版本,12.2.x可回显",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T09:48:49Z",
|
||||
"updated_at": "2021-12-20T05:43:53Z",
|
||||
"updated_at": "2021-12-23T10:35:14Z",
|
||||
"pushed_at": "2021-08-09T15:01:16Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -364,10 +364,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2021-12-22T22:38:46Z",
|
||||
"updated_at": "2021-12-23T07:55:41Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -380,7 +380,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 223,
|
||||
"watchers": 224,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-21T11:41:26Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 276,
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -43,8 +43,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1248,
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN.",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T12:17:50Z",
|
||||
"updated_at": "2021-12-13T04:36:46Z",
|
||||
"updated_at": "2021-12-23T07:32:14Z",
|
||||
"pushed_at": "2021-08-02T16:14:44Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -134,33 +134,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382407157,
|
||||
"name": "CVE-2021-1675",
|
||||
"full_name": "corelight\/CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-1675",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T16:44:24Z",
|
||||
"updated_at": "2021-10-24T04:58:16Z",
|
||||
"pushed_at": "2021-07-09T14:17:40Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383728669,
|
||||
"name": "PrintNightmare",
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-23T08:21:54Z",
|
||||
"updated_at": "2021-12-22T05:56:38Z",
|
||||
"updated_at": "2021-12-23T08:44:12Z",
|
||||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,17 +128,17 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-12-18T15:19:50Z",
|
||||
"updated_at": "2021-12-23T08:56:12Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 296,
|
||||
"watchers_count": 296,
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 296,
|
||||
"watchers": 302,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -283,17 +283,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2021-12-23T06:04:59Z",
|
||||
"updated_at": "2021-12-23T11:41:57Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 7,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 33,
|
||||
"forks": 10,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-21T08:47:56Z",
|
||||
"updated_at": "2021-12-18T01:02:40Z",
|
||||
"updated_at": "2021-12-23T08:27:51Z",
|
||||
"pushed_at": "2021-11-21T08:52:47Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 32,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-10-28T14:32:31Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2021-12-20T00:09:33Z",
|
||||
"updated_at": "2021-12-23T08:44:52Z",
|
||||
"pushed_at": "2021-12-03T22:09:31Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -202,17 +202,17 @@
|
|||
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T09:50:26Z",
|
||||
"updated_at": "2021-12-16T08:55:37Z",
|
||||
"updated_at": "2021-12-23T08:45:07Z",
|
||||
"pushed_at": "2021-09-02T07:36:51Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 26,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 43,
|
||||
"forks": 27,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -276,12 +276,12 @@
|
|||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 75,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"forks": 76,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of Concept CVE-2021-29155 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T15:53:10Z",
|
||||
"updated_at": "2021-12-15T14:42:18Z",
|
||||
"updated_at": "2021-12-23T10:42:33Z",
|
||||
"pushed_at": "2021-06-04T16:59:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -456,12 +456,12 @@
|
|||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 786,
|
||||
"watchers_count": 786,
|
||||
"forks_count": 230,
|
||||
"forks_count": 229,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 230,
|
||||
"forks": 229,
|
||||
"watchers": 786,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of Concept for CVE-2021-33624",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T22:19:38Z",
|
||||
"updated_at": "2021-12-15T14:42:23Z",
|
||||
"updated_at": "2021-12-23T10:42:31Z",
|
||||
"pushed_at": "2021-08-02T07:24:02Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Windows Etw LPE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-12T03:50:44Z",
|
||||
"updated_at": "2021-12-22T06:15:59Z",
|
||||
"updated_at": "2021-12-23T06:29:22Z",
|
||||
"pushed_at": "2021-10-12T05:52:00Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -87,60 +87,6 @@
|
|||
"watchers": 656,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384372251,
|
||||
"name": "CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
|
||||
"full_name": "dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
|
||||
"owner": {
|
||||
"login": "dywhoami",
|
||||
"id": 87174410,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87174410?v=4",
|
||||
"html_url": "https:\/\/github.com\/dywhoami"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T08:27:36Z",
|
||||
"updated_at": "2021-10-20T16:08:25Z",
|
||||
"pushed_at": "2021-07-11T00:23:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384554464,
|
||||
"name": "PowerShell-PrintNightmare",
|
||||
"full_name": "syntaxbearror\/PowerShell-PrintNightmare",
|
||||
"owner": {
|
||||
"login": "syntaxbearror",
|
||||
"id": 53105897,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53105897?v=4",
|
||||
"html_url": "https:\/\/github.com\/syntaxbearror"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/syntaxbearror\/PowerShell-PrintNightmare",
|
||||
"description": "A collection of scripts to help set the appropriate registry keys for CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T21:28:16Z",
|
||||
"updated_at": "2021-07-11T16:21:00Z",
|
||||
"pushed_at": "2021-07-09T21:46:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 385271497,
|
||||
"name": "PrintNightmare-Patcher",
|
||||
|
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 384694670,
|
||||
"name": "CVE-2021-35042",
|
||||
"full_name": "YouGina\/CVE-2021-35042",
|
||||
"owner": {
|
||||
"login": "YouGina",
|
||||
"id": 5002624,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5002624?v=4",
|
||||
"html_url": "https:\/\/github.com\/YouGina"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/YouGina\/CVE-2021-35042",
|
||||
"description": "SQL injection via unsanitized QuerySet.order_by() input",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-10T12:38:52Z",
|
||||
"updated_at": "2021-11-28T07:08:05Z",
|
||||
"pushed_at": "2021-07-10T13:43:54Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 402138788,
|
||||
"name": "CVE-2021-35042",
|
||||
|
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-12-23T01:59:57Z",
|
||||
"updated_at": "2021-12-23T10:21:35Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1330,
|
||||
"watchers_count": 1330,
|
||||
"stargazers_count": 1331,
|
||||
"watchers_count": 1331,
|
||||
"forks_count": 437,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 437,
|
||||
"watchers": 1330,
|
||||
"watchers": 1331,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -553,10 +553,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2021-12-22T09:39:48Z",
|
||||
"updated_at": "2021-12-23T09:40:49Z",
|
||||
"pushed_at": "2021-10-12T23:05:07Z",
|
||||
"stargazers_count": 529,
|
||||
"watchers_count": 529,
|
||||
"stargazers_count": 530,
|
||||
"watchers_count": 530,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -570,7 +570,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 529,
|
||||
"watchers": 530,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "windows 10 14393 LPE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-20T09:24:36Z",
|
||||
"updated_at": "2021-12-22T04:08:04Z",
|
||||
"updated_at": "2021-12-23T10:28:19Z",
|
||||
"pushed_at": "2021-10-28T03:51:09Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -512,17 +512,17 @@
|
|||
"description": "CVE-2021-41773 的复现",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T14:17:31Z",
|
||||
"updated_at": "2021-11-24T10:27:46Z",
|
||||
"updated_at": "2021-12-23T11:13:41Z",
|
||||
"pushed_at": "2021-10-08T05:03:10Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2021-12-23T04:23:26Z",
|
||||
"updated_at": "2021-12-23T11:44:12Z",
|
||||
"pushed_at": "2021-12-21T10:11:05Z",
|
||||
"stargazers_count": 640,
|
||||
"watchers_count": 640,
|
||||
"forks_count": 133,
|
||||
"stargazers_count": 641,
|
||||
"watchers_count": 641,
|
||||
"forks_count": 134,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,8 +27,8 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 133,
|
||||
"watchers": 640,
|
||||
"forks": 134,
|
||||
"watchers": 641,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -45,17 +45,17 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2021-12-23T01:59:30Z",
|
||||
"updated_at": "2021-12-23T09:11:43Z",
|
||||
"pushed_at": "2021-12-20T04:51:01Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -103,12 +103,12 @@
|
|||
"pushed_at": "2021-12-13T23:15:47Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 22,
|
||||
"watchers": 162,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2021-12-23T05:59:40Z",
|
||||
"updated_at": "2021-12-23T10:28:19Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 933,
|
||||
"watchers_count": 933,
|
||||
"forks_count": 242,
|
||||
"stargazers_count": 935,
|
||||
"watchers_count": 935,
|
||||
"forks_count": 244,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 242,
|
||||
"watchers": 933,
|
||||
"forks": 244,
|
||||
"watchers": 935,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Windows Common Log File System Driver POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T01:51:41Z",
|
||||
"updated_at": "2021-12-23T00:27:44Z",
|
||||
"updated_at": "2021-12-23T11:11:26Z",
|
||||
"pushed_at": "2021-12-21T06:57:06Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 14,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 50,
|
||||
"forks": 15,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -152,8 +152,8 @@
|
|||
"description": "Grafanav8.*版本任意文件读取漏洞poc&exp,该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T14:06:26Z",
|
||||
"updated_at": "2021-12-08T14:35:14Z",
|
||||
"pushed_at": "2021-12-08T14:34:26Z",
|
||||
"updated_at": "2021-12-23T07:49:53Z",
|
||||
"pushed_at": "2021-12-23T07:49:50Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
|
@ -245,12 +245,12 @@
|
|||
"pushed_at": "2021-12-08T07:04:13Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "This tool patches the CVE-2021-44228 Log4J vulnerability present in all minecraft versions NOTE THIS TOOL MUST BE RE-RUN after downloading or updating versions of minecraft as its not a perminent patch",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T00:14:06Z",
|
||||
"updated_at": "2021-12-15T03:52:23Z",
|
||||
"updated_at": "2021-12-23T06:38:28Z",
|
||||
"pushed_at": "2021-12-15T03:10:47Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -94,17 +94,17 @@
|
|||
"description": "Remote Code Injection In Log4j",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T05:23:44Z",
|
||||
"updated_at": "2021-12-23T05:53:23Z",
|
||||
"updated_at": "2021-12-23T11:37:31Z",
|
||||
"pushed_at": "2021-12-14T15:30:16Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"forks_count": 70,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 261,
|
||||
"forks": 73,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,10 +121,10 @@
|
|||
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:15:38Z",
|
||||
"updated_at": "2021-12-23T00:59:04Z",
|
||||
"updated_at": "2021-12-23T06:38:29Z",
|
||||
"pushed_at": "2021-12-16T01:33:48Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -139,7 +139,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 176,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -156,10 +156,10 @@
|
|||
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:42:37Z",
|
||||
"updated_at": "2021-12-21T06:20:00Z",
|
||||
"updated_at": "2021-12-23T06:30:39Z",
|
||||
"pushed_at": "2021-12-11T02:49:41Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -179,7 +179,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -390,17 +390,17 @@
|
|||
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2021-12-22T23:27:06Z",
|
||||
"updated_at": "2021-12-23T11:48:32Z",
|
||||
"pushed_at": "2021-12-20T22:54:49Z",
|
||||
"stargazers_count": 819,
|
||||
"watchers_count": 819,
|
||||
"forks_count": 319,
|
||||
"stargazers_count": 821,
|
||||
"watchers_count": 821,
|
||||
"forks_count": 321,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 319,
|
||||
"watchers": 819,
|
||||
"forks": 321,
|
||||
"watchers": 821,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -858,11 +858,11 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2021-12-23T04:33:49Z",
|
||||
"updated_at": "2021-12-23T12:01:56Z",
|
||||
"pushed_at": "2021-12-20T18:11:42Z",
|
||||
"stargazers_count": 532,
|
||||
"watchers_count": 532,
|
||||
"forks_count": 82,
|
||||
"stargazers_count": 535,
|
||||
"watchers_count": 535,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -887,8 +887,8 @@
|
|||
"writeups"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 532,
|
||||
"forks": 83,
|
||||
"watchers": 535,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -905,11 +905,11 @@
|
|||
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2021-12-23T06:12:07Z",
|
||||
"updated_at": "2021-12-23T12:10:37Z",
|
||||
"pushed_at": "2021-12-22T20:14:52Z",
|
||||
"stargazers_count": 943,
|
||||
"watchers_count": 943,
|
||||
"forks_count": 223,
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"forks_count": 229,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,8 +919,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 223,
|
||||
"watchers": 943,
|
||||
"forks": 229,
|
||||
"watchers": 949,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1050,10 +1050,10 @@
|
|||
"description": "Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or \"that Log4j JNDI exploit\" by inspecting the class paths inside files",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T01:08:00Z",
|
||||
"updated_at": "2021-12-18T21:11:20Z",
|
||||
"updated_at": "2021-12-23T09:40:20Z",
|
||||
"pushed_at": "2021-12-18T21:11:18Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1068,7 +1068,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1233,10 +1233,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2021-12-23T05:16:32Z",
|
||||
"pushed_at": "2021-12-23T02:46:09Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"updated_at": "2021-12-23T12:09:18Z",
|
||||
"pushed_at": "2021-12-23T12:09:16Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1247,7 +1247,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 126,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1372,10 +1372,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2021-12-23T06:04:51Z",
|
||||
"updated_at": "2021-12-23T09:24:31Z",
|
||||
"pushed_at": "2021-12-23T03:42:30Z",
|
||||
"stargazers_count": 640,
|
||||
"watchers_count": 640,
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1391,7 +1391,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"watchers": 640,
|
||||
"watchers": 646,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1883,10 +1883,10 @@
|
|||
"description": "Scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2021-12-23T05:37:01Z",
|
||||
"updated_at": "2021-12-23T10:07:12Z",
|
||||
"pushed_at": "2021-12-22T17:26:01Z",
|
||||
"stargazers_count": 510,
|
||||
"watchers_count": 510,
|
||||
"stargazers_count": 515,
|
||||
"watchers_count": 515,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1905,7 +1905,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 510,
|
||||
"watchers": 515,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2408,10 +2408,10 @@
|
|||
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T11:26:42Z",
|
||||
"updated_at": "2021-12-23T00:57:42Z",
|
||||
"updated_at": "2021-12-23T06:38:29Z",
|
||||
"pushed_at": "2021-12-12T17:37:11Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2426,7 +2426,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 50,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2504,8 +2504,8 @@
|
|||
"description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T12:16:07Z",
|
||||
"updated_at": "2021-12-22T20:01:22Z",
|
||||
"pushed_at": "2021-12-20T09:43:33Z",
|
||||
"updated_at": "2021-12-23T09:41:20Z",
|
||||
"pushed_at": "2021-12-23T09:41:16Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 5,
|
||||
|
@ -2758,8 +2758,8 @@
|
|||
"description": "Known IoCs for log4j framework vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T14:27:28Z",
|
||||
"updated_at": "2021-12-21T10:18:36Z",
|
||||
"pushed_at": "2021-12-21T10:18:34Z",
|
||||
"updated_at": "2021-12-23T10:01:35Z",
|
||||
"pushed_at": "2021-12-23T10:01:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
|
@ -3196,17 +3196,17 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2021-12-22T23:59:30Z",
|
||||
"updated_at": "2021-12-23T10:37:19Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 260,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3509,17 +3509,17 @@
|
|||
"description": "OpenIOC rules to facilitate hunting for indicators of compromise",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:55:32Z",
|
||||
"updated_at": "2021-12-22T21:25:34Z",
|
||||
"updated_at": "2021-12-23T11:10:37Z",
|
||||
"pushed_at": "2021-12-17T20:36:18Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 24,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3536,17 +3536,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2021-12-23T06:03:43Z",
|
||||
"updated_at": "2021-12-23T11:49:43Z",
|
||||
"pushed_at": "2021-12-22T16:56:04Z",
|
||||
"stargazers_count": 2243,
|
||||
"watchers_count": 2243,
|
||||
"forks_count": 507,
|
||||
"stargazers_count": 2261,
|
||||
"watchers_count": 2261,
|
||||
"forks_count": 513,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 507,
|
||||
"watchers": 2243,
|
||||
"forks": 513,
|
||||
"watchers": 2261,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3563,17 +3563,17 @@
|
|||
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T04:14:18Z",
|
||||
"updated_at": "2021-12-22T20:06:04Z",
|
||||
"updated_at": "2021-12-23T10:16:11Z",
|
||||
"pushed_at": "2021-12-22T18:22:42Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"watchers": 216,
|
||||
"watchers": 217,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3844,17 +3844,17 @@
|
|||
"description": "This repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T08:46:41Z",
|
||||
"updated_at": "2021-12-21T17:23:24Z",
|
||||
"updated_at": "2021-12-23T08:27:54Z",
|
||||
"pushed_at": "2021-12-20T08:35:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4508,8 +4508,8 @@
|
|||
"description": "CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:32:26Z",
|
||||
"updated_at": "2021-12-13T19:01:07Z",
|
||||
"pushed_at": "2021-12-13T19:01:04Z",
|
||||
"updated_at": "2021-12-23T10:05:33Z",
|
||||
"pushed_at": "2021-12-23T10:05:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -4858,17 +4858,17 @@
|
|||
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:39:51Z",
|
||||
"updated_at": "2021-12-22T23:33:38Z",
|
||||
"updated_at": "2021-12-23T09:11:50Z",
|
||||
"pushed_at": "2021-12-21T01:24:46Z",
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 24,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 244,
|
||||
"forks": 25,
|
||||
"watchers": 251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5429,10 +5429,10 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2021-12-23T02:08:43Z",
|
||||
"updated_at": "2021-12-23T10:30:31Z",
|
||||
"pushed_at": "2021-12-22T17:11:00Z",
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -5448,7 +5448,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 334,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5465,17 +5465,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T12:37:23Z",
|
||||
"updated_at": "2021-12-22T09:01:33Z",
|
||||
"updated_at": "2021-12-23T09:07:05Z",
|
||||
"pushed_at": "2021-12-14T12:49:56Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 7,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 36,
|
||||
"forks": 8,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5708,17 +5708,17 @@
|
|||
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T18:08:45Z",
|
||||
"updated_at": "2021-12-22T17:12:38Z",
|
||||
"updated_at": "2021-12-23T06:23:28Z",
|
||||
"pushed_at": "2021-12-20T14:44:27Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6010,17 +6010,17 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2021-12-23T05:28:42Z",
|
||||
"updated_at": "2021-12-23T09:22:38Z",
|
||||
"pushed_at": "2021-12-22T23:23:59Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"forks_count": 49,
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 217,
|
||||
"forks": 51,
|
||||
"watchers": 220,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -7025,8 +7025,8 @@
|
|||
"description": "Detect and fix log4j log4shell vulnerability (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-16T11:54:11Z",
|
||||
"updated_at": "2021-12-22T17:22:23Z",
|
||||
"pushed_at": "2021-12-22T17:22:20Z",
|
||||
"updated_at": "2021-12-23T10:22:24Z",
|
||||
"pushed_at": "2021-12-23T10:22:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
@ -7455,17 +7455,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-17T01:19:37Z",
|
||||
"updated_at": "2021-12-17T01:19:37Z",
|
||||
"pushed_at": "2021-12-17T01:19:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-12-23T07:20:56Z",
|
||||
"pushed_at": "2021-12-23T06:59:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -7630,6 +7630,33 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439273329,
|
||||
"name": "Fix-Log4j-PowershellScript",
|
||||
"full_name": "sysadmin0815\/Fix-Log4j-PowershellScript",
|
||||
"owner": {
|
||||
"login": "sysadmin0815",
|
||||
"id": 81157346,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81157346?v=4",
|
||||
"html_url": "https:\/\/github.com\/sysadmin0815"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sysadmin0815\/Fix-Log4j-PowershellScript",
|
||||
"description": "Log4Shell mitigation (CVE-2021-44228) - search and remove JNDI class from *log4j*.jar files on the system with Powershell (Windows)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-17T09:09:56Z",
|
||||
"updated_at": "2021-12-23T11:47:25Z",
|
||||
"pushed_at": "2021-12-23T10:44:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439273557,
|
||||
"name": "log4j-lookups-vulnerability",
|
||||
|
@ -8334,8 +8361,8 @@
|
|||
"description": "Demo to show how Log4Shell \/ CVE-2021-44228 vulnerability works",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T10:57:16Z",
|
||||
"updated_at": "2021-12-22T21:32:53Z",
|
||||
"pushed_at": "2021-12-22T13:17:50Z",
|
||||
"updated_at": "2021-12-23T11:59:55Z",
|
||||
"pushed_at": "2021-12-23T11:59:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
@ -8388,17 +8415,17 @@
|
|||
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T14:48:30Z",
|
||||
"updated_at": "2021-12-23T05:21:08Z",
|
||||
"updated_at": "2021-12-23T09:24:42Z",
|
||||
"pushed_at": "2021-12-22T15:56:21Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 6,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8725,17 +8752,17 @@
|
|||
"description": "Windows Batch Scrip to Fix the log4j-issue-CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T15:39:20Z",
|
||||
"updated_at": "2021-12-22T06:29:21Z",
|
||||
"pushed_at": "2021-12-21T15:04:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2021-12-23T09:20:09Z",
|
||||
"pushed_at": "2021-12-23T09:19:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8789,17 +8816,17 @@
|
|||
"description": "Scan and patch tool for CVE-2021-44228 and related log4j concerns. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T03:01:36Z",
|
||||
"updated_at": "2021-12-23T03:33:23Z",
|
||||
"pushed_at": "2021-12-23T04:06:43Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"updated_at": "2021-12-23T11:42:09Z",
|
||||
"pushed_at": "2021-12-23T10:45:12Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8924,10 +8951,10 @@
|
|||
"description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script Remote Code Execution - log4j (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T22:14:24Z",
|
||||
"updated_at": "2021-12-23T02:07:33Z",
|
||||
"updated_at": "2021-12-23T10:53:28Z",
|
||||
"pushed_at": "2021-12-22T22:17:19Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -8941,7 +8968,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 33,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9066,8 +9093,8 @@
|
|||
"description": "CVE-2021-44228-FIX-JARS",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T10:16:22Z",
|
||||
"updated_at": "2021-12-22T10:26:05Z",
|
||||
"pushed_at": "2021-12-22T10:26:02Z",
|
||||
"updated_at": "2021-12-23T09:04:57Z",
|
||||
"pushed_at": "2021-12-23T09:04:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -9147,8 +9174,8 @@
|
|||
"description": "open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T01:59:03Z",
|
||||
"updated_at": "2021-12-23T05:56:02Z",
|
||||
"pushed_at": "2021-12-23T03:28:27Z",
|
||||
"updated_at": "2021-12-23T07:40:15Z",
|
||||
"pushed_at": "2021-12-23T07:40:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T05:48:53Z",
|
||||
"updated_at": "2021-12-21T23:02:15Z",
|
||||
"pushed_at": "2021-12-15T05:50:22Z",
|
||||
"updated_at": "2021-12-23T10:57:21Z",
|
||||
"pushed_at": "2021-12-23T10:57:19Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 7,
|
||||
|
@ -209,17 +209,17 @@
|
|||
"description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T12:07:41Z",
|
||||
"updated_at": "2021-12-23T05:03:50Z",
|
||||
"updated_at": "2021-12-23T12:08:29Z",
|
||||
"pushed_at": "2021-12-22T06:24:42Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 55,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,5 +109,86 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 441161290,
|
||||
"name": "https-github.com-pravin-pp-log4j2-CVE-2021-45105",
|
||||
"full_name": "dileepdkumar\/https-github.com-pravin-pp-log4j2-CVE-2021-45105",
|
||||
"owner": {
|
||||
"login": "dileepdkumar",
|
||||
"id": 89115244,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
|
||||
"html_url": "https:\/\/github.com\/dileepdkumar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dileepdkumar\/https-github.com-pravin-pp-log4j2-CVE-2021-45105",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T11:38:32Z",
|
||||
"updated_at": "2021-12-23T11:38:32Z",
|
||||
"pushed_at": "2021-12-23T11:38:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 441161826,
|
||||
"name": "https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105",
|
||||
"full_name": "dileepdkumar\/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105",
|
||||
"owner": {
|
||||
"login": "dileepdkumar",
|
||||
"id": 89115244,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
|
||||
"html_url": "https:\/\/github.com\/dileepdkumar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dileepdkumar\/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T11:40:49Z",
|
||||
"updated_at": "2021-12-23T11:40:49Z",
|
||||
"pushed_at": "2021-12-23T11:40:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 441161964,
|
||||
"name": "https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v",
|
||||
"full_name": "dileepdkumar\/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v",
|
||||
"owner": {
|
||||
"login": "dileepdkumar",
|
||||
"id": 89115244,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
|
||||
"html_url": "https:\/\/github.com\/dileepdkumar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dileepdkumar\/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T11:41:25Z",
|
||||
"updated_at": "2021-12-23T11:41:25Z",
|
||||
"pushed_at": "2021-12-23T11:41:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,7 +36,6 @@ Windows Print Spooler Elevation of Privilege Vulnerability
|
|||
- [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675)
|
||||
- [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675)
|
||||
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
|
||||
- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
|
||||
- [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare)
|
||||
- [k8gege/cve-2021-1675](https://github.com/k8gege/cve-2021-1675)
|
||||
- [galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527](https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527)
|
||||
|
@ -2366,8 +2365,6 @@ Windows Print Spooler Remote Code Execution Vulnerability
|
|||
- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare)
|
||||
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
|
||||
- [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream)
|
||||
- [dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC](https://github.com/dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC)
|
||||
- [syntaxbearror/PowerShell-PrintNightmare](https://github.com/syntaxbearror/PowerShell-PrintNightmare)
|
||||
- [0xirison/PrintNightmare-Patcher](https://github.com/0xirison/PrintNightmare-Patcher)
|
||||
- [Tomparte/PrintNightmare](https://github.com/Tomparte/PrintNightmare)
|
||||
- [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527)
|
||||
|
@ -2402,7 +2399,6 @@ A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Bus
|
|||
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
|
||||
</code>
|
||||
|
||||
- [YouGina/CVE-2021-35042](https://github.com/YouGina/CVE-2021-35042)
|
||||
- [mrlihd/CVE-2021-35042](https://github.com/mrlihd/CVE-2021-35042)
|
||||
- [r4vi/CVE-2021-35042](https://github.com/r4vi/CVE-2021-35042)
|
||||
|
||||
|
@ -4028,6 +4024,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE](https://github.com/Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE)
|
||||
- [rohankumardubey/CVE-2021-44228_scanner](https://github.com/rohankumardubey/CVE-2021-44228_scanner)
|
||||
- [Heliferepo/log4j](https://github.com/Heliferepo/log4j)
|
||||
- [sysadmin0815/Fix-Log4j-PowershellScript](https://github.com/sysadmin0815/Fix-Log4j-PowershellScript)
|
||||
- [RenYuH/log4j-lookups-vulnerability](https://github.com/RenYuH/log4j-lookups-vulnerability)
|
||||
- [scheibling/py-log4shellscanner](https://github.com/scheibling/py-log4shellscanner)
|
||||
- [GroupePSA/log4shell-honeypot](https://github.com/GroupePSA/log4shell-honeypot)
|
||||
|
@ -4128,6 +4125,9 @@ Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not prot
|
|||
- [pravin-pp/log4j2-CVE-2021-45105](https://github.com/pravin-pp/log4j2-CVE-2021-45105)
|
||||
- [tejas-nagchandi/CVE-2021-45105](https://github.com/tejas-nagchandi/CVE-2021-45105)
|
||||
- [iAmSOScArEd/log4j2_dos_exploit](https://github.com/iAmSOScArEd/log4j2_dos_exploit)
|
||||
- [dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105](https://github.com/dileepdkumar/https-github.com-pravin-pp-log4j2-CVE-2021-45105)
|
||||
- [dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105](https://github.com/dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105)
|
||||
- [dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v](https://github.com/dileepdkumar/https-github.com-dileepdkumar-https-github.com-pravin-pp-log4j2-CVE-2021-45105-v)
|
||||
|
||||
|
||||
## 2020
|
||||
|
|
Loading…
Reference in a new issue