Auto Update 2022/01/04 00:13:45

This commit is contained in:
motikan2010-bot 2022-01-04 09:13:45 +09:00
parent b5461c98ae
commit adfbaa809f
18 changed files with 173 additions and 117 deletions

View file

@ -13,17 +13,17 @@
"description": "CVE-2009-2698 compiled for CentOS 4.8",
"fork": false,
"created_at": "2018-02-16T16:17:24Z",
"updated_at": "2021-11-03T07:49:54Z",
"updated_at": "2022-01-03T22:04:50Z",
"pushed_at": "2018-02-16T16:30:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

29
2012/CVE-2012-0158.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 444201103,
"name": "Exploit-Win32.CVE-2012-0158.F.doc",
"full_name": "Malware-S\/Exploit-Win32.CVE-2012-0158.F.doc",
"owner": {
"login": "Malware-S",
"id": 93054044,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93054044?v=4",
"html_url": "https:\/\/github.com\/Malware-S"
},
"html_url": "https:\/\/github.com\/Malware-S\/Exploit-Win32.CVE-2012-0158.F.doc",
"description": "the name of virus is the detection of microsoft defender, is the tipic antivirus",
"fork": false,
"created_at": "2022-01-03T21:13:13Z",
"updated_at": "2022-01-03T21:13:28Z",
"pushed_at": "2022-01-03T21:13:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -427,17 +427,17 @@
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-21T05:01:12Z",
"updated_at": "2021-12-21T21:34:14Z",
"updated_at": "2022-01-03T19:20:42Z",
"pushed_at": "2018-10-21T05:13:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -316,14 +316,24 @@
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
"fork": false,
"created_at": "2020-04-22T21:11:27Z",
"updated_at": "2022-01-02T20:41:01Z",
"updated_at": "2022-01-03T23:47:57Z",
"pushed_at": "2022-01-02T20:40:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"topics": [
"cve",
"exploit",
"hacking",
"hacking-tools",
"linux",
"payload",
"termux",
"whatsapp",
"whatsapp-chat"
],
"visibility": "public",
"forks": 3,
"watchers": 9,

View file

@ -355,12 +355,12 @@
"pushed_at": "2020-02-05T11:45:25Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 9,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 8,
"watchers": 41,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "InfluxDB CVE-2019-20933 vulnerability exploit",
"fork": false,
"created_at": "2021-04-28T16:25:31Z",
"updated_at": "2021-12-27T10:46:56Z",
"updated_at": "2022-01-03T20:50:03Z",
"pushed_at": "2021-11-12T13:02:41Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "CVE-2020-13942 POC + Automation Script",
"fork": false,
"created_at": "2020-11-20T23:25:44Z",
"updated_at": "2021-12-21T21:34:20Z",
"updated_at": "2022-01-03T19:20:48Z",
"pushed_at": "2020-11-23T10:48:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2021-12-21T21:34:19Z",
"updated_at": "2022-01-03T19:20:47Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -61,17 +61,17 @@
"description": "Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-18T07:08:06Z",
"updated_at": "2021-12-21T21:34:16Z",
"updated_at": "2022-01-03T19:20:44Z",
"pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2021-12-26T06:56:06Z",
"pushed_at": "2021-12-07T15:20:48Z",
"updated_at": "2022-01-03T21:44:31Z",
"pushed_at": "2022-01-03T21:44:29Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 12,

View file

@ -661,17 +661,17 @@
"description": "Atlassian Confluence CVE-2021-26084 one-liner mass checker",
"fork": false,
"created_at": "2021-09-07T01:15:16Z",
"updated_at": "2021-12-21T21:34:24Z",
"updated_at": "2022-01-03T19:20:52Z",
"pushed_at": "2021-09-07T12:59:45Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

29
2021/CVE-2021-31630.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 391818469,
"name": "CVE-2021-31630-OpenPLC_RCE",
"full_name": "h3v0x\/CVE-2021-31630-OpenPLC_RCE",
"owner": {
"login": "h3v0x",
"id": 6265911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
"html_url": "https:\/\/github.com\/h3v0x"
},
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2021-31630-OpenPLC_RCE",
"description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
"fork": false,
"created_at": "2021-08-02T04:48:24Z",
"updated_at": "2021-11-12T05:18:02Z",
"pushed_at": "2021-08-02T04:48:25Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -71,17 +71,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-14T17:30:55Z",
"updated_at": "2021-12-21T21:34:24Z",
"updated_at": "2022-01-03T19:20:53Z",
"pushed_at": "2021-10-14T17:44:20Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-08-25T02:00:12Z",
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 54,
"score": 0
}

View file

@ -1122,17 +1122,17 @@
"description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ",
"fork": false,
"created_at": "2021-10-08T07:24:49Z",
"updated_at": "2021-12-27T17:25:38Z",
"updated_at": "2022-01-03T19:20:53Z",
"pushed_at": "2021-10-08T07:27:04Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -1402,12 +1402,12 @@
"pushed_at": "2021-10-12T00:52:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -121,10 +121,10 @@
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
"fork": false,
"created_at": "2021-12-10T06:15:38Z",
"updated_at": "2021-12-28T22:04:33Z",
"updated_at": "2022-01-03T23:26:41Z",
"pushed_at": "2021-12-16T01:33:48Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -139,7 +139,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 179,
"watchers": 178,
"score": 0
},
{
@ -909,7 +909,7 @@
"pushed_at": "2022-01-02T07:12:10Z",
"stargazers_count": 1082,
"watchers_count": 1082,
"forks_count": 266,
"forks_count": 267,
"allow_forking": true,
"is_template": false,
"topics": [
@ -919,7 +919,7 @@
"security"
],
"visibility": "public",
"forks": 266,
"forks": 267,
"watchers": 1082,
"score": 0
},
@ -1054,7 +1054,7 @@
"pushed_at": "2021-12-18T21:11:18Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1067,7 +1067,7 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 39,
"score": 0
},
@ -1373,10 +1373,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-01-03T15:30:51Z",
"updated_at": "2022-01-03T21:30:32Z",
"pushed_at": "2022-01-02T15:10:51Z",
"stargazers_count": 692,
"watchers_count": 692,
"stargazers_count": 695,
"watchers_count": 695,
"forks_count": 140,
"allow_forking": true,
"is_template": false,
@ -1393,7 +1393,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 692,
"watchers": 695,
"score": 0
},
{
@ -3538,17 +3538,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-03T17:53:10Z",
"updated_at": "2022-01-03T23:18:01Z",
"pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2493,
"watchers_count": 2493,
"stargazers_count": 2496,
"watchers_count": 2496,
"forks_count": 584,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 584,
"watchers": 2493,
"watchers": 2496,
"score": 0
},
{
@ -3569,12 +3569,12 @@
"pushed_at": "2022-01-01T23:46:03Z",
"stargazers_count": 236,
"watchers_count": 236,
"forks_count": 82,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 82,
"forks": 83,
"watchers": 236,
"score": 0
},
@ -4393,8 +4393,8 @@
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-13T16:39:16Z",
"updated_at": "2022-01-03T18:00:37Z",
"pushed_at": "2022-01-03T18:00:34Z",
"updated_at": "2022-01-04T00:00:26Z",
"pushed_at": "2022-01-04T00:00:23Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 10,
@ -4895,17 +4895,17 @@
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
"fork": false,
"created_at": "2021-12-13T21:39:51Z",
"updated_at": "2022-01-03T05:54:33Z",
"updated_at": "2022-01-03T20:28:18Z",
"pushed_at": "2021-12-21T01:24:46Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 265,
"watchers": 267,
"score": 0
},
{
@ -5416,7 +5416,7 @@
"pushed_at": "2022-01-03T01:27:06Z",
"stargazers_count": 363,
"watchers_count": 363,
"forks_count": 68,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
"topics": [
@ -5430,7 +5430,7 @@
"python"
],
"visibility": "public",
"forks": 68,
"forks": 69,
"watchers": 363,
"score": 0
},
@ -5863,8 +5863,8 @@
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.",
"fork": false,
"created_at": "2021-12-14T22:19:29Z",
"updated_at": "2022-01-02T18:32:29Z",
"pushed_at": "2022-01-02T18:32:26Z",
"updated_at": "2022-01-03T22:46:50Z",
"pushed_at": "2022-01-03T22:46:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
@ -5995,17 +5995,17 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2022-01-03T05:38:39Z",
"updated_at": "2022-01-03T21:07:16Z",
"pushed_at": "2021-12-27T15:00:46Z",
"stargazers_count": 290,
"watchers_count": 290,
"forks_count": 72,
"stargazers_count": 291,
"watchers_count": 291,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 290,
"forks": 73,
"watchers": 291,
"score": 0
},
{
@ -6743,7 +6743,7 @@
"fork": false,
"created_at": "2021-12-15T20:17:41Z",
"updated_at": "2022-01-03T14:43:29Z",
"pushed_at": "2021-12-30T11:58:55Z",
"pushed_at": "2022-01-03T20:00:08Z",
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 14,
@ -8362,33 +8362,6 @@
"watchers": 6,
"score": 0
},
{
"id": 439837504,
"name": "CVE-2021-44228-log4j-check_mk-plugin",
"full_name": "thl-cmk\/CVE-2021-44228-log4j-check_mk-plugin",
"owner": {
"login": "thl-cmk",
"id": 65558014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65558014?v=4",
"html_url": "https:\/\/github.com\/thl-cmk"
},
"html_url": "https:\/\/github.com\/thl-cmk\/CVE-2021-44228-log4j-check_mk-plugin",
"description": null,
"fork": false,
"created_at": "2021-12-19T10:46:53Z",
"updated_at": "2022-01-02T18:40:42Z",
"pushed_at": "2022-01-02T18:40:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 439839460,
"name": "Log4Shell-demo",
@ -8653,7 +8626,7 @@
"pushed_at": "2021-12-20T12:03:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@ -8664,7 +8637,7 @@
"scanner"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0
},
@ -9654,8 +9627,8 @@
"description": "Log4Shell (Cve-2021-44228) Proof Of Concept",
"fork": false,
"created_at": "2021-12-27T16:45:58Z",
"updated_at": "2022-01-03T00:53:05Z",
"pushed_at": "2022-01-03T00:53:03Z",
"updated_at": "2022-01-03T21:47:34Z",
"pushed_at": "2022-01-03T21:47:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-22T14:46:21Z",
"updated_at": "2021-12-24T06:56:19Z",
"updated_at": "2022-01-03T20:38:49Z",
"pushed_at": "2021-12-22T21:34:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1942,6 +1942,14 @@ Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulner
- [waleedassar/CVE-2021-31184](https://github.com/waleedassar/CVE-2021-31184)
### CVE-2021-31630 (2021-08-03)
<code>
Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the &quot;Hardware Layer Code Box&quot; component on the &quot;/hardware&quot; page of the application.
</code>
- [h3v0x/CVE-2021-31630-OpenPLC_RCE](https://github.com/h3v0x/CVE-2021-31630-OpenPLC_RCE)
### CVE-2021-31702 (2021-05-29)
<code>
@ -3938,7 +3946,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [trickyearlobe/inspec-log4j](https://github.com/trickyearlobe/inspec-log4j)
- [TheInterception/Log4J-Simulation-Tool](https://github.com/TheInterception/Log4J-Simulation-Tool)
- [KeysAU/Get-log4j-Windows-local](https://github.com/KeysAU/Get-log4j-Windows-local)
- [thl-cmk/CVE-2021-44228-log4j-check_mk-plugin](https://github.com/thl-cmk/CVE-2021-44228-log4j-check_mk-plugin)
- [mschmnet/Log4Shell-demo](https://github.com/mschmnet/Log4Shell-demo)
- [Rk-000/Log4j_scan_Advance](https://github.com/Rk-000/Log4j_scan_Advance)
- [puzzlepeaches/Log4jCenter](https://github.com/puzzlepeaches/Log4jCenter)
@ -21615,6 +21622,14 @@ The Remote Desktop Protocol (RDP) service in Microsoft Windows Server 2008 R2 an
- [rutvijjethwa/RDP_jammer](https://github.com/rutvijjethwa/RDP_jammer)
### CVE-2012-0158 (2012-04-10)
<code>
The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers &quot;system state&quot; corruption, as exploited in the wild in April 2012, aka &quot;MSCOMCTL.OCX RCE Vulnerability.&quot;
</code>
- [Malware-S/Exploit-Win32.CVE-2012-0158.F.doc](https://github.com/Malware-S/Exploit-Win32.CVE-2012-0158.F.doc)
### CVE-2012-1675 (2012-05-08)
<code>