mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/01/04 00:13:45
This commit is contained in:
parent
b5461c98ae
commit
adfbaa809f
18 changed files with 173 additions and 117 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2009-2698 compiled for CentOS 4.8",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-16T16:17:24Z",
|
||||
"updated_at": "2021-11-03T07:49:54Z",
|
||||
"updated_at": "2022-01-03T22:04:50Z",
|
||||
"pushed_at": "2018-02-16T16:30:00Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2012/CVE-2012-0158.json
Normal file
29
2012/CVE-2012-0158.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 444201103,
|
||||
"name": "Exploit-Win32.CVE-2012-0158.F.doc",
|
||||
"full_name": "Malware-S\/Exploit-Win32.CVE-2012-0158.F.doc",
|
||||
"owner": {
|
||||
"login": "Malware-S",
|
||||
"id": 93054044,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93054044?v=4",
|
||||
"html_url": "https:\/\/github.com\/Malware-S"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Malware-S\/Exploit-Win32.CVE-2012-0158.F.doc",
|
||||
"description": "the name of virus is the detection of microsoft defender, is the tipic antivirus",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-03T21:13:13Z",
|
||||
"updated_at": "2022-01-03T21:13:28Z",
|
||||
"pushed_at": "2022-01-03T21:13:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -427,17 +427,17 @@
|
|||
"description": "CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-21T05:01:12Z",
|
||||
"updated_at": "2021-12-21T21:34:14Z",
|
||||
"updated_at": "2022-01-03T19:20:42Z",
|
||||
"pushed_at": "2018-10-21T05:13:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,14 +316,24 @@
|
|||
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T21:11:27Z",
|
||||
"updated_at": "2022-01-02T20:41:01Z",
|
||||
"updated_at": "2022-01-03T23:47:57Z",
|
||||
"pushed_at": "2022-01-02T20:40:58Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve",
|
||||
"exploit",
|
||||
"hacking",
|
||||
"hacking-tools",
|
||||
"linux",
|
||||
"payload",
|
||||
"termux",
|
||||
"whatsapp",
|
||||
"whatsapp-chat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
|
|
|
@ -355,12 +355,12 @@
|
|||
"pushed_at": "2020-02-05T11:45:25Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 9,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 8,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "InfluxDB CVE-2019-20933 vulnerability exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-28T16:25:31Z",
|
||||
"updated_at": "2021-12-27T10:46:56Z",
|
||||
"updated_at": "2022-01-03T20:50:03Z",
|
||||
"pushed_at": "2021-11-12T13:02:41Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "CVE-2020-13942 POC + Automation Script",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T23:25:44Z",
|
||||
"updated_at": "2021-12-21T21:34:20Z",
|
||||
"updated_at": "2022-01-03T19:20:48Z",
|
||||
"pushed_at": "2020-11-23T10:48:34Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T17:50:01Z",
|
||||
"updated_at": "2021-12-21T21:34:19Z",
|
||||
"updated_at": "2022-01-03T19:20:47Z",
|
||||
"pushed_at": "2020-10-12T09:57:28Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -61,17 +61,17 @@
|
|||
"description": "Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T07:08:06Z",
|
||||
"updated_at": "2021-12-21T21:34:16Z",
|
||||
"updated_at": "2022-01-03T19:20:44Z",
|
||||
"pushed_at": "2020-01-18T07:14:34Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2021-12-26T06:56:06Z",
|
||||
"pushed_at": "2021-12-07T15:20:48Z",
|
||||
"updated_at": "2022-01-03T21:44:31Z",
|
||||
"pushed_at": "2022-01-03T21:44:29Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 12,
|
||||
|
|
|
@ -661,17 +661,17 @@
|
|||
"description": "Atlassian Confluence CVE-2021-26084 one-liner mass checker",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-07T01:15:16Z",
|
||||
"updated_at": "2021-12-21T21:34:24Z",
|
||||
"updated_at": "2022-01-03T19:20:52Z",
|
||||
"pushed_at": "2021-09-07T12:59:45Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2021/CVE-2021-31630.json
Normal file
29
2021/CVE-2021-31630.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 391818469,
|
||||
"name": "CVE-2021-31630-OpenPLC_RCE",
|
||||
"full_name": "h3v0x\/CVE-2021-31630-OpenPLC_RCE",
|
||||
"owner": {
|
||||
"login": "h3v0x",
|
||||
"id": 6265911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3v0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2021-31630-OpenPLC_RCE",
|
||||
"description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T04:48:24Z",
|
||||
"updated_at": "2021-11-12T05:18:02Z",
|
||||
"pushed_at": "2021-08-02T04:48:25Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,17 +71,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-14T17:30:55Z",
|
||||
"updated_at": "2021-12-21T21:34:24Z",
|
||||
"updated_at": "2022-01-03T19:20:53Z",
|
||||
"pushed_at": "2021-10-14T17:44:20Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-08-25T02:00:12Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1122,17 +1122,17 @@
|
|||
"description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T07:24:49Z",
|
||||
"updated_at": "2021-12-27T17:25:38Z",
|
||||
"updated_at": "2022-01-03T19:20:53Z",
|
||||
"pushed_at": "2021-10-08T07:27:04Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1402,12 +1402,12 @@
|
|||
"pushed_at": "2021-10-12T00:52:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:15:38Z",
|
||||
"updated_at": "2021-12-28T22:04:33Z",
|
||||
"updated_at": "2022-01-03T23:26:41Z",
|
||||
"pushed_at": "2021-12-16T01:33:48Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -139,7 +139,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 179,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -909,7 +909,7 @@
|
|||
"pushed_at": "2022-01-02T07:12:10Z",
|
||||
"stargazers_count": 1082,
|
||||
"watchers_count": 1082,
|
||||
"forks_count": 266,
|
||||
"forks_count": 267,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,7 +919,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 266,
|
||||
"forks": 267,
|
||||
"watchers": 1082,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1054,7 +1054,7 @@
|
|||
"pushed_at": "2021-12-18T21:11:18Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1067,7 +1067,7 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1373,10 +1373,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2022-01-03T15:30:51Z",
|
||||
"updated_at": "2022-01-03T21:30:32Z",
|
||||
"pushed_at": "2022-01-02T15:10:51Z",
|
||||
"stargazers_count": 692,
|
||||
"watchers_count": 692,
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1393,7 +1393,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 692,
|
||||
"watchers": 695,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3538,17 +3538,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-01-03T17:53:10Z",
|
||||
"updated_at": "2022-01-03T23:18:01Z",
|
||||
"pushed_at": "2022-01-02T20:21:42Z",
|
||||
"stargazers_count": 2493,
|
||||
"watchers_count": 2493,
|
||||
"stargazers_count": 2496,
|
||||
"watchers_count": 2496,
|
||||
"forks_count": 584,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 584,
|
||||
"watchers": 2493,
|
||||
"watchers": 2496,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3569,12 +3569,12 @@
|
|||
"pushed_at": "2022-01-01T23:46:03Z",
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"forks_count": 82,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"forks": 83,
|
||||
"watchers": 236,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -4393,8 +4393,8 @@
|
|||
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T16:39:16Z",
|
||||
"updated_at": "2022-01-03T18:00:37Z",
|
||||
"pushed_at": "2022-01-03T18:00:34Z",
|
||||
"updated_at": "2022-01-04T00:00:26Z",
|
||||
"pushed_at": "2022-01-04T00:00:23Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 10,
|
||||
|
@ -4895,17 +4895,17 @@
|
|||
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:39:51Z",
|
||||
"updated_at": "2022-01-03T05:54:33Z",
|
||||
"updated_at": "2022-01-03T20:28:18Z",
|
||||
"pushed_at": "2021-12-21T01:24:46Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 265,
|
||||
"watchers": 267,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5416,7 +5416,7 @@
|
|||
"pushed_at": "2022-01-03T01:27:06Z",
|
||||
"stargazers_count": 363,
|
||||
"watchers_count": 363,
|
||||
"forks_count": 68,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -5430,7 +5430,7 @@
|
|||
"python"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"forks": 69,
|
||||
"watchers": 363,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -5863,8 +5863,8 @@
|
|||
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T22:19:29Z",
|
||||
"updated_at": "2022-01-02T18:32:29Z",
|
||||
"pushed_at": "2022-01-02T18:32:26Z",
|
||||
"updated_at": "2022-01-03T22:46:50Z",
|
||||
"pushed_at": "2022-01-03T22:46:48Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
|
@ -5995,17 +5995,17 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2022-01-03T05:38:39Z",
|
||||
"updated_at": "2022-01-03T21:07:16Z",
|
||||
"pushed_at": "2021-12-27T15:00:46Z",
|
||||
"stargazers_count": 290,
|
||||
"watchers_count": 290,
|
||||
"forks_count": 72,
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 290,
|
||||
"forks": 73,
|
||||
"watchers": 291,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6743,7 +6743,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-15T20:17:41Z",
|
||||
"updated_at": "2022-01-03T14:43:29Z",
|
||||
"pushed_at": "2021-12-30T11:58:55Z",
|
||||
"pushed_at": "2022-01-03T20:00:08Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 14,
|
||||
|
@ -8362,33 +8362,6 @@
|
|||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439837504,
|
||||
"name": "CVE-2021-44228-log4j-check_mk-plugin",
|
||||
"full_name": "thl-cmk\/CVE-2021-44228-log4j-check_mk-plugin",
|
||||
"owner": {
|
||||
"login": "thl-cmk",
|
||||
"id": 65558014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65558014?v=4",
|
||||
"html_url": "https:\/\/github.com\/thl-cmk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thl-cmk\/CVE-2021-44228-log4j-check_mk-plugin",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T10:46:53Z",
|
||||
"updated_at": "2022-01-02T18:40:42Z",
|
||||
"pushed_at": "2022-01-02T18:40:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439839460,
|
||||
"name": "Log4Shell-demo",
|
||||
|
@ -8653,7 +8626,7 @@
|
|||
"pushed_at": "2021-12-20T12:03:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -8664,7 +8637,7 @@
|
|||
"scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -9654,8 +9627,8 @@
|
|||
"description": "Log4Shell (Cve-2021-44228) Proof Of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-27T16:45:58Z",
|
||||
"updated_at": "2022-01-03T00:53:05Z",
|
||||
"pushed_at": "2022-01-03T00:53:03Z",
|
||||
"updated_at": "2022-01-03T21:47:34Z",
|
||||
"pushed_at": "2022-01-03T21:47:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T14:46:21Z",
|
||||
"updated_at": "2021-12-24T06:56:19Z",
|
||||
"updated_at": "2022-01-03T20:38:49Z",
|
||||
"pushed_at": "2021-12-22T21:34:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
17
README.md
17
README.md
|
@ -1942,6 +1942,14 @@ Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulner
|
|||
|
||||
- [waleedassar/CVE-2021-31184](https://github.com/waleedassar/CVE-2021-31184)
|
||||
|
||||
### CVE-2021-31630 (2021-08-03)
|
||||
|
||||
<code>
|
||||
Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application.
|
||||
</code>
|
||||
|
||||
- [h3v0x/CVE-2021-31630-OpenPLC_RCE](https://github.com/h3v0x/CVE-2021-31630-OpenPLC_RCE)
|
||||
|
||||
### CVE-2021-31702 (2021-05-29)
|
||||
|
||||
<code>
|
||||
|
@ -3938,7 +3946,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [trickyearlobe/inspec-log4j](https://github.com/trickyearlobe/inspec-log4j)
|
||||
- [TheInterception/Log4J-Simulation-Tool](https://github.com/TheInterception/Log4J-Simulation-Tool)
|
||||
- [KeysAU/Get-log4j-Windows-local](https://github.com/KeysAU/Get-log4j-Windows-local)
|
||||
- [thl-cmk/CVE-2021-44228-log4j-check_mk-plugin](https://github.com/thl-cmk/CVE-2021-44228-log4j-check_mk-plugin)
|
||||
- [mschmnet/Log4Shell-demo](https://github.com/mschmnet/Log4Shell-demo)
|
||||
- [Rk-000/Log4j_scan_Advance](https://github.com/Rk-000/Log4j_scan_Advance)
|
||||
- [puzzlepeaches/Log4jCenter](https://github.com/puzzlepeaches/Log4jCenter)
|
||||
|
@ -21615,6 +21622,14 @@ The Remote Desktop Protocol (RDP) service in Microsoft Windows Server 2008 R2 an
|
|||
|
||||
- [rutvijjethwa/RDP_jammer](https://github.com/rutvijjethwa/RDP_jammer)
|
||||
|
||||
### CVE-2012-0158 (2012-04-10)
|
||||
|
||||
<code>
|
||||
The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."
|
||||
</code>
|
||||
|
||||
- [Malware-S/Exploit-Win32.CVE-2012-0158.F.doc](https://github.com/Malware-S/Exploit-Win32.CVE-2012-0158.F.doc)
|
||||
|
||||
### CVE-2012-1675 (2012-05-08)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue