Auto Update 2022/11/17 12:20:03

This commit is contained in:
motikan2010-bot 2022-11-17 21:20:03 +09:00
parent a074f64a20
commit a0614126bc
49 changed files with 418 additions and 350 deletions

31
2010/CVE-2010-3971.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 11953883,
"name": "CVE-2010-3971-hotpatch",
"full_name": "nektra\/CVE-2010-3971-hotpatch",
"owner": {
"login": "nektra",
"id": 2100960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2100960?v=4",
"html_url": "https:\/\/github.com\/nektra"
},
"html_url": "https:\/\/github.com\/nektra\/CVE-2010-3971-hotpatch",
"description": "Do you own security hotfix with Deviare hooking",
"fork": false,
"created_at": "2013-08-07T15:49:14Z",
"updated_at": "2022-01-23T23:24:34Z",
"pushed_at": "2013-08-07T18:01:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
"fork": false,
"created_at": "2016-05-02T12:18:57Z",
"updated_at": "2022-08-06T20:13:13Z",
"updated_at": "2022-11-17T11:24:01Z",
"pushed_at": "2019-08-13T07:14:01Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 111,
"watchers": 110,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.",
"fork": false,
"created_at": "2018-02-03T20:47:08Z",
"updated_at": "2022-05-27T15:46:55Z",
"updated_at": "2022-11-17T09:22:54Z",
"pushed_at": "2018-02-10T02:17:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2022-11-15T02:52:56Z",
"updated_at": "2022-11-17T12:06:52Z",
"pushed_at": "2022-06-27T02:34:05Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 54,
"watchers": 56,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2017-12149 jboss反序列化 可回显",
"fork": false,
"created_at": "2017-11-28T02:52:47Z",
"updated_at": "2022-11-09T17:58:36Z",
"updated_at": "2022-11-17T08:56:20Z",
"pushed_at": "2019-03-13T08:57:50Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 166,
"watchers": 167,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-5792",
"fork": false,
"created_at": "2018-06-20T06:08:47Z",
"updated_at": "2020-07-19T09:02:14Z",
"updated_at": "2022-11-17T09:09:59Z",
"pushed_at": "2018-06-20T02:31:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
"fork": false,
"created_at": "2018-08-08T14:41:20Z",
"updated_at": "2022-11-09T06:03:14Z",
"updated_at": "2022-11-17T09:57:40Z",
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 172,
"watchers": 173,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-17T02:21:01Z",
"updated_at": "2022-11-17T08:39:23Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3601,
"watchers_count": 3601,
"stargazers_count": 3602,
"watchers_count": 3602,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1042,
"watchers": 3601,
"watchers": 3602,
"score": 0
},
{

View file

@ -101,7 +101,7 @@
"fork": false,
"created_at": "2021-12-28T16:30:12Z",
"updated_at": "2022-11-09T16:52:32Z",
"pushed_at": "2022-11-15T09:00:22Z",
"pushed_at": "2022-11-17T09:12:17Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,

View file

@ -47,10 +47,10 @@
"description": "GitLab 12.9.0 Arbitrary File Read ",
"fork": false,
"created_at": "2020-11-20T15:40:03Z",
"updated_at": "2022-11-09T18:10:10Z",
"updated_at": "2022-11-17T09:28:39Z",
"pushed_at": "2021-04-23T19:21:16Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 63,
"watchers": 64,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2022-09-09T15:15:34Z",
"updated_at": "2022-11-17T08:01:28Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 138,
"watchers": 139,
"score": 0
},
{

View file

@ -47,13 +47,13 @@
"stargazers_count": 1516,
"watchers_count": 1516,
"has_discussions": false,
"forks_count": 348,
"forks_count": 349,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 348,
"forks": 349,
"watchers": 1516,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-17T02:21:01Z",
"updated_at": "2022-11-17T08:39:23Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3601,
"watchers_count": 3601,
"stargazers_count": 3602,
"watchers_count": 3602,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1042,
"watchers": 3601,
"watchers": 3602,
"score": 0
},
{

View file

@ -107,10 +107,10 @@
"description": "Additional exploits for XSS in Cisco ASA devices discovered by PTSwarm",
"fork": false,
"created_at": "2022-07-15T00:11:29Z",
"updated_at": "2022-07-26T15:01:00Z",
"updated_at": "2022-11-17T10:28:09Z",
"pushed_at": "2022-07-15T01:44:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2022-11-09T18:15:13Z",
"updated_at": "2022-11-17T12:14:10Z",
"pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-11-16T07:28:26Z",
"updated_at": "2022-11-17T08:05:03Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1631,
"watchers_count": 1631,
"stargazers_count": 1630,
"watchers_count": 1630,
"has_discussions": false,
"forks_count": 581,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 581,
"watchers": 1631,
"watchers": 1630,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2022-09-09T15:15:34Z",
"updated_at": "2022-11-17T08:01:28Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 138,
"watchers": 139,
"score": 0
},
{
@ -795,12 +795,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-11-17T06:08:13Z",
"updated_at": "2022-11-17T11:31:47Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 595,
"watchers_count": 595,
"stargazers_count": 597,
"watchers_count": 597,
"has_discussions": false,
"forks_count": 64,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -813,8 +813,66 @@
"vcenter"
],
"visibility": "public",
"forks": 64,
"watchers": 595,
"forks": 65,
"watchers": 597,
"score": 0
},
{
"id": 567169107,
"name": "VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
"full_name": "trhacknon\/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
"description": null,
"fork": false,
"created_at": "2022-11-17T08:08:50Z",
"updated_at": "2022-11-17T08:09:04Z",
"pushed_at": "2022-11-17T08:09:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 567169362,
"name": "CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
"full_name": "trhacknon\/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
"description": null,
"fork": false,
"created_at": "2022-11-17T08:09:38Z",
"updated_at": "2022-11-17T08:09:54Z",
"pushed_at": "2022-11-17T08:09:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
"fork": false,
"created_at": "2021-09-01T09:50:26Z",
"updated_at": "2022-11-09T18:13:30Z",
"updated_at": "2022-11-17T08:56:59Z",
"pushed_at": "2022-02-10T11:38:46Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 58,
"watchers": 59,
"score": 0
},
{

View file

@ -639,10 +639,10 @@
"description": "RCE exploit for Microsoft Exchange Server (CVE-2021-26855).",
"fork": false,
"created_at": "2021-03-14T13:04:07Z",
"updated_at": "2022-11-14T12:59:44Z",
"updated_at": "2022-11-17T06:54:55Z",
"pushed_at": "2022-04-23T03:21:44Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -653,7 +653,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -72,7 +72,7 @@
"fork": false,
"created_at": "2022-11-03T00:41:16Z",
"updated_at": "2022-11-04T00:56:54Z",
"pushed_at": "2022-11-03T00:56:33Z",
"pushed_at": "2022-11-17T06:27:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -778,10 +778,10 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2022-11-09T18:11:06Z",
"updated_at": "2022-11-17T09:20:26Z",
"pushed_at": "2022-02-13T12:21:53Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -790,7 +790,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 115,
"watchers": 116,
"score": 0
},
{

View file

@ -145,31 +145,31 @@
"score": 0
},
{
"id": 482725626,
"id": 482736902,
"name": "CVE-2021-31805-POC",
"full_name": "3SsFuck\/CVE-2021-31805-POC",
"full_name": "fleabane1\/CVE-2021-31805-POC",
"owner": {
"login": "3SsFuck",
"id": 52556473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52556473?v=4",
"html_url": "https:\/\/github.com\/3SsFuck"
"login": "fleabane1",
"id": 58097248,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58097248?v=4",
"html_url": "https:\/\/github.com\/fleabane1"
},
"html_url": "https:\/\/github.com\/3SsFuck\/CVE-2021-31805-POC",
"description": null,
"html_url": "https:\/\/github.com\/fleabane1\/CVE-2021-31805-POC",
"description": "Apache Struts2 S2-062(CVE-2021-31805)远程代码执行批量检测(无利用)",
"fork": false,
"created_at": "2022-04-18T05:28:52Z",
"updated_at": "2022-04-18T06:16:47Z",
"pushed_at": "2022-04-18T08:26:06Z",
"created_at": "2022-04-18T06:17:59Z",
"updated_at": "2022-11-17T07:23:18Z",
"pushed_at": "2022-04-18T05:31:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 1,
"score": 0
},

31
2021/CVE-2021-403.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 488150478,
"name": "CVE-2021-403",
"full_name": "rhysmcneill\/CVE-2021-403",
"owner": {
"login": "rhysmcneill",
"id": 33672728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33672728?v=4",
"html_url": "https:\/\/github.com\/rhysmcneill"
},
"html_url": "https:\/\/github.com\/rhysmcneill\/CVE-2021-403",
"description": null,
"fork": false,
"created_at": "2022-05-03T09:36:40Z",
"updated_at": "2022-11-17T06:24:21Z",
"pushed_at": "2022-05-03T09:50:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -77,10 +77,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-11-16T02:31:51Z",
"updated_at": "2022-11-17T08:09:34Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1700,
"watchers_count": 1700,
"stargazers_count": 1701,
"watchers_count": 1701,
"has_discussions": false,
"forks_count": 488,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 488,
"watchers": 1700,
"watchers": 1701,
"score": 0
},
{
@ -164,10 +164,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-11-10T17:15:43Z",
"updated_at": "2022-11-17T07:46:13Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 924,
"watchers_count": 924,
"stargazers_count": 925,
"watchers_count": 925,
"has_discussions": false,
"forks_count": 303,
"allow_forking": true,
@ -180,7 +180,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 924,
"watchers": 925,
"score": 0
},
{

View file

@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-11-16T13:13:11Z",
"updated_at": "2022-11-17T07:44:37Z",
"pushed_at": "2022-09-01T21:30:25Z",
"stargazers_count": 470,
"watchers_count": 470,
"stargazers_count": 471,
"watchers_count": 471,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 92,
"watchers": 470,
"watchers": 471,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 5,
"score": 0
}

View file

@ -192,10 +192,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-11-15T00:03:10Z",
"updated_at": "2022-11-17T08:50:12Z",
"pushed_at": "2022-09-29T11:01:50Z",
"stargazers_count": 1026,
"watchers_count": 1026,
"stargazers_count": 1027,
"watchers_count": 1027,
"has_discussions": false,
"forks_count": 466,
"allow_forking": true,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 466,
"watchers": 1026,
"watchers": 1027,
"score": 0
},
{
@ -411,10 +411,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-11-17T06:15:13Z",
"updated_at": "2022-11-17T08:53:33Z",
"pushed_at": "2022-11-17T02:44:09Z",
"stargazers_count": 537,
"watchers_count": 537,
"stargazers_count": 540,
"watchers_count": 540,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -428,7 +428,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 537,
"watchers": 540,
"score": 0
},
{
@ -1219,13 +1219,13 @@
"stargazers_count": 3108,
"watchers_count": 3108,
"has_discussions": true,
"forks_count": 732,
"forks_count": 731,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 732,
"forks": 731,
"watchers": 3108,
"score": 0
},
@ -2324,38 +2324,6 @@
"watchers": 1,
"score": 0
},
{
"id": 438635569,
"name": "log4shell-hotfix-side-effect",
"full_name": "mss\/log4shell-hotfix-side-effect",
"owner": {
"login": "mss",
"id": 5391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5391?v=4",
"html_url": "https:\/\/github.com\/mss"
},
"html_url": "https:\/\/github.com\/mss\/log4shell-hotfix-side-effect",
"description": "Test case to check if the Log4Shell\/CVE-2021-44228 hotfix will raise any unexpected exceptions",
"fork": false,
"created_at": "2021-12-15T13:14:34Z",
"updated_at": "2022-11-09T18:14:47Z",
"pushed_at": "2021-12-18T12:02:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"java",
"log4shell"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 438650245,
"name": "log4j_temp_CVE-2021-44228",
@ -3177,41 +3145,6 @@
"watchers": 0,
"score": 0
},
{
"id": 439409726,
"name": "cve-2021-44228",
"full_name": "Nikolas-Charalambidis\/cve-2021-44228",
"owner": {
"login": "Nikolas-Charalambidis",
"id": 21295587,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21295587?v=4",
"html_url": "https:\/\/github.com\/Nikolas-Charalambidis"
},
"html_url": "https:\/\/github.com\/Nikolas-Charalambidis\/cve-2021-44228",
"description": "A simple simulation of the CVE-2021-44228 issue.",
"fork": false,
"created_at": "2021-12-17T17:23:47Z",
"updated_at": "2021-12-25T23:11:34Z",
"pushed_at": "2021-12-18T13:45:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"java",
"java-11",
"log4j",
"security"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 439420251,
"name": "detect-log4j-exploitable",
@ -3415,35 +3348,6 @@
"watchers": 0,
"score": 0
},
{
"id": 439612080,
"name": "CVE-2021-44228-PoC",
"full_name": "j3kz\/CVE-2021-44228-PoC",
"owner": {
"login": "j3kz",
"id": 6310563,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6310563?v=4",
"html_url": "https:\/\/github.com\/j3kz"
},
"html_url": "https:\/\/github.com\/j3kz\/CVE-2021-44228-PoC",
"description": "Self-contained lab environment that runs the exploit safely, all from docker compose",
"fork": false,
"created_at": "2021-12-18T12:42:04Z",
"updated_at": "2021-12-18T14:08:28Z",
"pushed_at": "2021-12-18T14:08:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 439658571,
"name": "log4j-pcap-activity",
@ -6726,5 +6630,34 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 567153845,
"name": "CVE-2021-44228-Scanner",
"full_name": "trhacknon\/CVE-2021-44228-Scanner",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2021-44228-Scanner",
"description": null,
"fork": false,
"created_at": "2022-11-17T07:22:29Z",
"updated_at": "2022-11-17T07:23:03Z",
"pushed_at": "2022-11-17T07:22:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -119,35 +119,6 @@
"watchers": 0,
"score": 0
},
{
"id": 439600548,
"name": "cve-2021-45046",
"full_name": "ludy-dev\/cve-2021-45046",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev"
},
"html_url": "https:\/\/github.com\/ludy-dev\/cve-2021-45046",
"description": null,
"fork": false,
"created_at": "2021-12-18T11:43:56Z",
"updated_at": "2021-12-18T11:53:15Z",
"pushed_at": "2021-12-18T11:53:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 440156597,
"name": "log4j2_vul_local_scanner",

View file

@ -13,10 +13,10 @@
"description": "may the poc with you",
"fork": false,
"created_at": "2022-05-06T08:56:04Z",
"updated_at": "2022-06-28T10:53:41Z",
"updated_at": "2022-11-17T11:20:33Z",
"pushed_at": "2022-05-06T08:57:08Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 13,
"score": 0
},
{

View file

@ -402,7 +402,7 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -411,7 +411,7 @@
"f5-big-ip-icontrol-rest-rce"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 30,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-2022",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2022-11-17T03:33:44Z",
"updated_at": "2022-11-17T07:28:24Z",
"pushed_at": "2022-09-21T12:36:55Z",
"stargazers_count": 367,
"watchers_count": 367,
"stargazers_count": 368,
"watchers_count": 368,
"has_discussions": false,
"forks_count": 158,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 158,
"watchers": 367,
"watchers": 368,
"score": 0
}
]

View file

@ -91,10 +91,10 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-11-09T18:15:06Z",
"updated_at": "2022-11-17T07:17:49Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 365,
"watchers_count": 365,
"stargazers_count": 364,
"watchers_count": 364,
"has_discussions": false,
"forks_count": 99,
"allow_forking": true,
@ -103,7 +103,7 @@
"topics": [],
"visibility": "public",
"forks": 99,
"watchers": 365,
"watchers": 364,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "CVE-2022-22629 Proof of Concept",
"fork": false,
"created_at": "2022-09-09T17:21:27Z",
"updated_at": "2022-11-09T18:16:14Z",
"updated_at": "2022-11-17T12:20:26Z",
"pushed_at": "2022-09-09T21:23:08Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 41,
"forks": 7,
"watchers": 42,
"score": 0
}
]

View file

@ -437,35 +437,6 @@
"watchers": 1,
"score": 0
},
{
"id": 481811086,
"name": "CVE-2022-22954-POC",
"full_name": "3SsFuck\/CVE-2022-22954-POC",
"owner": {
"login": "3SsFuck",
"id": 52556473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52556473?v=4",
"html_url": "https:\/\/github.com\/3SsFuck"
},
"html_url": "https:\/\/github.com\/3SsFuck\/CVE-2022-22954-POC",
"description": null,
"fork": false,
"created_at": "2022-04-15T02:24:22Z",
"updated_at": "2022-04-16T16:17:13Z",
"pushed_at": "2022-04-15T02:33:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 2,
"score": 0
},
{
"id": 482063610,
"name": "CVE-2022-22954",
@ -495,6 +466,35 @@
"watchers": 6,
"score": 0
},
{
"id": 482302278,
"name": "CVE-2022-22954-POC",
"full_name": "mhurts\/CVE-2022-22954-POC",
"owner": {
"login": "mhurts",
"id": 51972444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972444?v=4",
"html_url": "https:\/\/github.com\/mhurts"
},
"html_url": "https:\/\/github.com\/mhurts\/CVE-2022-22954-POC",
"description": null,
"fork": false,
"created_at": "2022-04-16T16:18:13Z",
"updated_at": "2022-11-17T07:23:34Z",
"pushed_at": "2022-04-15T02:33:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498855865,
"name": "CVE-2022-22954-PoC",
@ -712,12 +712,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-11-17T06:08:13Z",
"updated_at": "2022-11-17T11:31:47Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 595,
"watchers_count": 595,
"stargazers_count": 597,
"watchers_count": 597,
"has_discussions": false,
"forks_count": 64,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -730,8 +730,8 @@
"vcenter"
],
"visibility": "public",
"forks": 64,
"watchers": 595,
"forks": 65,
"watchers": 597,
"score": 0
},
{

View file

@ -1852,10 +1852,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2022-11-15T02:52:56Z",
"updated_at": "2022-11-17T12:06:52Z",
"pushed_at": "2022-06-27T02:34:05Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1864,7 +1864,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 54,
"watchers": 56,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-23648",
"fork": false,
"created_at": "2022-03-25T19:43:59Z",
"updated_at": "2022-11-12T14:46:37Z",
"updated_at": "2022-11-17T07:44:47Z",
"pushed_at": "2022-03-29T09:55:15Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 36,
"watchers": 37,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
"fork": false,
"created_at": "2022-07-02T06:16:33Z",
"updated_at": "2022-10-27T17:01:17Z",
"updated_at": "2022-11-17T08:36:19Z",
"pushed_at": "2022-07-02T17:14:41Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 69,
"watchers": 70,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2022-11-09T18:16:00Z",
"updated_at": "2022-11-17T07:17:33Z",
"pushed_at": "2022-08-30T13:23:51Z",
"stargazers_count": 219,
"watchers_count": 219,
"stargazers_count": 220,
"watchers_count": 220,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 219,
"watchers": 220,
"score": 0
},
{

View file

@ -251,7 +251,7 @@
"fork": false,
"created_at": "2022-05-18T15:57:03Z",
"updated_at": "2022-09-27T23:24:44Z",
"pushed_at": "2022-05-18T22:33:31Z",
"pushed_at": "2022-11-17T11:00:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215",
"fork": false,
"created_at": "2022-11-11T05:11:14Z",
"updated_at": "2022-11-15T04:08:14Z",
"updated_at": "2022-11-17T08:58:49Z",
"pushed_at": "2022-11-11T05:18:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2022-11-16T23:06:35Z",
"updated_at": "2022-11-17T12:02:06Z",
"pushed_at": "2022-11-07T16:21:14Z",
"stargazers_count": 280,
"watchers_count": 280,
"stargazers_count": 286,
"watchers_count": 286,
"has_discussions": false,
"forks_count": 48,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 280,
"forks": 50,
"watchers": 286,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 525,
"watchers_count": 525,
"has_discussions": false,
"forks_count": 112,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"spookyssl"
],
"visibility": "public",
"forks": 112,
"forks": 114,
"watchers": 525,
"score": 0
},

View file

@ -220,10 +220,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2022-11-16T05:08:42Z",
"updated_at": "2022-11-17T08:50:12Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -236,7 +236,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 163,
"watchers": 164,
"score": 0
},
{
@ -282,10 +282,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2022-11-15T17:36:04Z",
"updated_at": "2022-11-17T06:48:24Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 279,
"watchers_count": 279,
"stargazers_count": 280,
"watchers_count": 280,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@ -294,7 +294,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 279,
"watchers": 280,
"score": 0
},
{

View file

@ -43,7 +43,7 @@
"fork": false,
"created_at": "2022-10-20T22:22:48Z",
"updated_at": "2022-10-20T22:23:03Z",
"pushed_at": "2022-10-20T22:23:00Z",
"pushed_at": "2022-11-17T08:59:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -42,10 +42,10 @@
"description": "Zimbra <9.0.0.p27 RCE",
"fork": false,
"created_at": "2022-11-11T20:58:08Z",
"updated_at": "2022-11-17T03:59:31Z",
"updated_at": "2022-11-17T10:49:09Z",
"pushed_at": "2022-11-14T17:54:57Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 58,
"watchers": 61,
"score": 0
}
]

View file

@ -807,13 +807,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},
@ -832,7 +832,7 @@
"fork": false,
"created_at": "2022-11-04T19:26:23Z",
"updated_at": "2022-11-17T02:38:39Z",
"pushed_at": "2022-11-16T19:27:42Z",
"pushed_at": "2022-11-17T07:28:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

31
2022/CVE-2022-43096.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 567187197,
"name": "Mediatrix-CVE-2022-43096",
"full_name": "ProxyStaffy\/Mediatrix-CVE-2022-43096",
"owner": {
"login": "ProxyStaffy",
"id": 113522001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113522001?v=4",
"html_url": "https:\/\/github.com\/ProxyStaffy"
},
"html_url": "https:\/\/github.com\/ProxyStaffy\/Mediatrix-CVE-2022-43096",
"description": null,
"fork": false,
"created_at": "2022-11-17T09:00:52Z",
"updated_at": "2022-11-17T09:10:13Z",
"pushed_at": "2022-11-17T09:06:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Bitrix Vulnerability CVE-2022-43959",
"fork": false,
"created_at": "2022-10-28T08:52:17Z",
"updated_at": "2022-11-16T15:56:06Z",
"updated_at": "2022-11-17T11:34:53Z",
"pushed_at": "2022-10-28T10:14:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1285,8 +1285,8 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
- [tunelko/CVE-2022-22954-PoC](https://github.com/tunelko/CVE-2022-22954-PoC)
- [bewhale/CVE-2022-22954](https://github.com/bewhale/CVE-2022-22954)
- [tyleraharrison/VMware-CVE-2022-22954-Command-Injector](https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector)
- [3SsFuck/CVE-2022-22954-POC](https://github.com/3SsFuck/CVE-2022-22954-POC)
- [MLX15/CVE-2022-22954](https://github.com/MLX15/CVE-2022-22954)
- [mhurts/CVE-2022-22954-POC](https://github.com/mhurts/CVE-2022-22954-POC)
- [trhacknon/CVE-2022-22954-PoC](https://github.com/trhacknon/CVE-2022-22954-PoC)
- [Chocapikk/CVE-2022-22954](https://github.com/Chocapikk/CVE-2022-22954)
- [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954)
@ -4309,6 +4309,9 @@ Bentley MicroStation and MicroStation-based applications may be affected by out-
- [iamsanjay/CVE-2022-42899](https://github.com/iamsanjay/CVE-2022-42899)
### CVE-2022-43096
- [ProxyStaffy/Mediatrix-CVE-2022-43096](https://github.com/ProxyStaffy/Mediatrix-CVE-2022-43096)
### CVE-2022-43144 (2022-11-08)
<code>
@ -4819,6 +4822,9 @@ In ResolverActivity, there is a possible user interaction bypass due to a tapjac
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0954](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0954)
### CVE-2021-403
- [rhysmcneill/CVE-2021-403](https://github.com/rhysmcneill/CVE-2021-403)
### CVE-2021-1056 (2021-01-07)
<code>
@ -5793,6 +5799,8 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
- [orangmuda/CVE-2021-21972](https://github.com/orangmuda/CVE-2021-21972)
- [user16-et/cve-2021-21972_PoC](https://github.com/user16-et/cve-2021-21972_PoC)
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
- [trhacknon/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972](https://github.com/trhacknon/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972)
- [trhacknon/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC](https://github.com/trhacknon/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC)
### CVE-2021-21973 (2021-02-24)
@ -7049,7 +7057,7 @@ The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to
- [Axx8/Struts2_S2-062_CVE-2021-31805](https://github.com/Axx8/Struts2_S2-062_CVE-2021-31805)
- [jax7sec/S2-062](https://github.com/jax7sec/S2-062)
- [aeyesec/CVE-2021-31805](https://github.com/aeyesec/CVE-2021-31805)
- [3SsFuck/CVE-2021-31805-POC](https://github.com/3SsFuck/CVE-2021-31805-POC)
- [fleabane1/CVE-2021-31805-POC](https://github.com/fleabane1/CVE-2021-31805-POC)
- [z92g/CVE-2021-31805](https://github.com/z92g/CVE-2021-31805)
### CVE-2021-31856 (2021-04-28)
@ -8455,7 +8463,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228)
- [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1)
- [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources)
- [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect)
- [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228)
- [isuruwa/Log4j](https://github.com/isuruwa/Log4j)
- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)
@ -8483,7 +8490,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [sysadmin0815/Fix-Log4j-PowershellScript](https://github.com/sysadmin0815/Fix-Log4j-PowershellScript)
- [zaneef/CVE-2021-44228](https://github.com/zaneef/CVE-2021-44228)
- [metodidavidovic/log4j-quick-scan](https://github.com/metodidavidovic/log4j-quick-scan)
- [Nikolas-Charalambidis/cve-2021-44228](https://github.com/Nikolas-Charalambidis/cve-2021-44228)
- [m0rath/detect-log4j-exploitable](https://github.com/m0rath/detect-log4j-exploitable)
- [nu11secur1ty/CVE-2021-44228-VULN-APP](https://github.com/nu11secur1ty/CVE-2021-44228-VULN-APP)
- [ankur-katiyar/log4j-docker](https://github.com/ankur-katiyar/log4j-docker)
@ -8491,7 +8497,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [DANSI/PowerShell-Log4J-Scanner](https://github.com/DANSI/PowerShell-Log4J-Scanner)
- [suniastar/scan-log4shell](https://github.com/suniastar/scan-log4shell)
- [shivakumarjayaraman/log4jvulnerability-CVE-2021-44228](https://github.com/shivakumarjayaraman/log4jvulnerability-CVE-2021-44228)
- [j3kz/CVE-2021-44228-PoC](https://github.com/j3kz/CVE-2021-44228-PoC)
- [Apipia/log4j-pcap-activity](https://github.com/Apipia/log4j-pcap-activity)
- [axelcurmi/log4shell-docker-lab](https://github.com/axelcurmi/log4shell-docker-lab)
- [otaviokr/log4j-2021-vulnerability-study](https://github.com/otaviokr/log4j-2021-vulnerability-study)
@ -8602,6 +8607,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [ocastel/log4j-shell-poc](https://github.com/ocastel/log4j-shell-poc)
- [bcdunbar/CVE-2021-44228-poc](https://github.com/bcdunbar/CVE-2021-44228-poc)
- [srcporter/CVE-2021-44228](https://github.com/srcporter/CVE-2021-44228)
- [trhacknon/CVE-2021-44228-Scanner](https://github.com/trhacknon/CVE-2021-44228-Scanner)
### CVE-2021-44255 (2022-01-31)
@ -8730,7 +8736,6 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i
- [BobTheShoplifter/CVE-2021-45046-Info](https://github.com/BobTheShoplifter/CVE-2021-45046-Info)
- [mergebase/log4j-samples](https://github.com/mergebase/log4j-samples)
- [lukepasek/log4jjndilookupremove](https://github.com/lukepasek/log4jjndilookupremove)
- [ludy-dev/cve-2021-45046](https://github.com/ludy-dev/cve-2021-45046)
- [lijiejie/log4j2_vul_local_scanner](https://github.com/lijiejie/log4j2_vul_local_scanner)
- [CaptanMoss/Log4Shell-Sandbox-Signature](https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature)
- [taise-hub/log4j-poc](https://github.com/taise-hub/log4j-poc)
@ -28508,6 +28513,14 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke
- [redhatkaty/-cve-2010-3904-report](https://github.com/redhatkaty/-cve-2010-3904-report)
### CVE-2010-3971 (2010-12-22)
<code>
Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka &quot;CSS Memory Corruption Vulnerability.&quot;
</code>
- [nektra/CVE-2010-3971-hotpatch](https://github.com/nektra/CVE-2010-3971-hotpatch)
### CVE-2010-4221 (2010-11-09)
<code>