mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/12/16 00:14:10
This commit is contained in:
parent
c1ad4e03b2
commit
c6f66956fa
26 changed files with 639 additions and 413 deletions
|
@ -80,33 +80,6 @@
|
|||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29942046,
|
||||
"name": "ghost",
|
||||
"full_name": "piyokango\/ghost",
|
||||
"owner": {
|
||||
"login": "piyokango",
|
||||
"id": 10733273,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10733273?v=4",
|
||||
"html_url": "https:\/\/github.com\/piyokango"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/piyokango\/ghost",
|
||||
"description": "glibc vulnerability GHOST(CVE-2015-0235) Affected software list",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-28T00:14:35Z",
|
||||
"updated_at": "2015-08-13T21:27:35Z",
|
||||
"pushed_at": "2015-01-28T14:29:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29950345,
|
||||
"name": "CVE-2015-0235_GHOST",
|
||||
|
@ -134,33 +107,6 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29988916,
|
||||
"name": "ansible-CVE-2015-0235-GHOST",
|
||||
"full_name": "adherzog\/ansible-CVE-2015-0235-GHOST",
|
||||
"owner": {
|
||||
"login": "adherzog",
|
||||
"id": 1744181,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1744181?v=4",
|
||||
"html_url": "https:\/\/github.com\/adherzog"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST",
|
||||
"description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-28T21:22:33Z",
|
||||
"updated_at": "2015-01-28T21:23:35Z",
|
||||
"pushed_at": "2015-01-28T21:23:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 29993101,
|
||||
"name": "lenny-libc6",
|
||||
|
@ -269,33 +215,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 30059704,
|
||||
"name": "ghosttester",
|
||||
"full_name": "JustDenisYT\/ghosttester",
|
||||
"owner": {
|
||||
"login": "JustDenisYT",
|
||||
"id": 9379272,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9379272?v=4",
|
||||
"html_url": "https:\/\/github.com\/JustDenisYT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester",
|
||||
"description": "Script to test vulnarability for CVE-2015-0235",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-30T06:37:06Z",
|
||||
"updated_at": "2015-02-04T08:03:37Z",
|
||||
"pushed_at": "2015-02-04T08:03:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 30066365,
|
||||
"name": "CVE-2015-0235",
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2021-12-14T10:57:22Z",
|
||||
"updated_at": "2021-12-15T23:59:06Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 885,
|
||||
"watchers_count": 885,
|
||||
"stargazers_count": 886,
|
||||
"watchers_count": 886,
|
||||
"forks_count": 410,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 410,
|
||||
"watchers": 885,
|
||||
"watchers": 886,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -736,7 +736,7 @@
|
|||
"description": "SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T12:44:03Z",
|
||||
"updated_at": "2021-09-03T18:54:10Z",
|
||||
"updated_at": "2021-12-15T21:41:29Z",
|
||||
"pushed_at": "2021-01-26T16:29:27Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -211,12 +211,12 @@
|
|||
"pushed_at": "2017-04-05T23:29:03Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 50,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"forks": 51,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2018-12-12T22:11:45Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -26,7 +26,7 @@
|
|||
"web-security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -233,7 +233,7 @@
|
|||
"pushed_at": "2021-06-04T18:15:44Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -245,7 +245,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-15T14:38:47Z",
|
||||
"updated_at": "2021-12-15T22:19:43Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3044,
|
||||
"watchers_count": 3044,
|
||||
"forks_count": 901,
|
||||
"stargazers_count": 3045,
|
||||
"watchers_count": 3045,
|
||||
"forks_count": 902,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,8 +69,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 901,
|
||||
"watchers": 3044,
|
||||
"forks": 902,
|
||||
"watchers": 3045,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-18T20:37:30Z",
|
||||
"updated_at": "2021-07-18T20:43:54Z",
|
||||
"updated_at": "2021-12-15T20:00:58Z",
|
||||
"pushed_at": "2021-07-18T20:43:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,7 +100,7 @@
|
|||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 63,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -110,7 +110,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 64,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1586,12 +1586,12 @@
|
|||
"pushed_at": "2021-01-15T19:21:25Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 43,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 42,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-15T14:38:47Z",
|
||||
"updated_at": "2021-12-15T22:19:43Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3044,
|
||||
"watchers_count": 3044,
|
||||
"forks_count": 901,
|
||||
"stargazers_count": 3045,
|
||||
"watchers_count": 3045,
|
||||
"forks_count": 902,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,8 +42,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 901,
|
||||
"watchers": 3044,
|
||||
"forks": 902,
|
||||
"watchers": 3045,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T04:27:52Z",
|
||||
"updated_at": "2021-12-15T14:39:20Z",
|
||||
"updated_at": "2021-12-15T20:41:06Z",
|
||||
"pushed_at": "2021-10-12T21:13:09Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "带回显版本的漏洞利用脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:15:27Z",
|
||||
"updated_at": "2021-12-15T16:46:36Z",
|
||||
"updated_at": "2021-12-15T20:24:53Z",
|
||||
"pushed_at": "2021-03-05T11:09:06Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,17 +128,17 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-12-15T14:42:17Z",
|
||||
"updated_at": "2021-12-15T18:54:06Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 293,
|
||||
"watchers": 294,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T15:40:45Z",
|
||||
"updated_at": "2021-12-15T16:47:01Z",
|
||||
"updated_at": "2021-12-15T20:27:59Z",
|
||||
"pushed_at": "2021-12-15T16:37:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2021-12-11T18:45:08Z",
|
||||
"updated_at": "2021-12-15T22:24:01Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2021/CVE-2021-39685.json
Normal file
29
2021/CVE-2021-39685.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 438658753,
|
||||
"name": "inspector-gadget",
|
||||
"full_name": "szymonh\/inspector-gadget",
|
||||
"owner": {
|
||||
"login": "szymonh",
|
||||
"id": 12231135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12231135?v=4",
|
||||
"html_url": "https:\/\/github.com\/szymonh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/szymonh\/inspector-gadget",
|
||||
"description": "CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T14:28:00Z",
|
||||
"updated_at": "2021-12-15T21:20:14Z",
|
||||
"pushed_at": "2021-12-15T20:23:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "log4j 1.x RCE Poc -- CVE-2021-4104",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T12:35:08Z",
|
||||
"updated_at": "2021-12-15T14:17:46Z",
|
||||
"updated_at": "2021-12-15T18:29:51Z",
|
||||
"pushed_at": "2021-12-14T12:56:24Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2021-12-15T17:18:26Z",
|
||||
"updated_at": "2021-12-15T23:53:00Z",
|
||||
"pushed_at": "2021-12-11T15:43:11Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"forks_count": 95,
|
||||
"stargazers_count": 514,
|
||||
"watchers_count": 514,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,8 +27,8 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 502,
|
||||
"forks": 98,
|
||||
"watchers": 514,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -45,17 +45,17 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2021-12-15T16:27:19Z",
|
||||
"updated_at": "2021-12-15T19:27:27Z",
|
||||
"pushed_at": "2021-12-15T11:17:41Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 13,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 90,
|
||||
"forks": 14,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -99,17 +99,17 @@
|
|||
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T23:15:05Z",
|
||||
"updated_at": "2021-12-15T18:12:30Z",
|
||||
"updated_at": "2021-12-15T20:31:40Z",
|
||||
"pushed_at": "2021-12-13T23:15:47Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2021-12-15T14:12:16Z",
|
||||
"updated_at": "2021-12-15T22:30:12Z",
|
||||
"pushed_at": "2021-12-12T10:50:54Z",
|
||||
"stargazers_count": 861,
|
||||
"watchers_count": 861,
|
||||
"forks_count": 219,
|
||||
"stargazers_count": 865,
|
||||
"watchers_count": 865,
|
||||
"forks_count": 220,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 219,
|
||||
"watchers": 861,
|
||||
"forks": 220,
|
||||
"watchers": 865,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Generate malicious files using recently published bidi-attack (CVE-2021-42574)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-02T15:32:38Z",
|
||||
"updated_at": "2021-12-15T14:43:19Z",
|
||||
"updated_at": "2021-12-15T19:33:05Z",
|
||||
"pushed_at": "2021-11-05T20:43:05Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -322,8 +322,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-08T14:14:38Z",
|
||||
"updated_at": "2021-12-13T09:02:13Z",
|
||||
"pushed_at": "2021-12-08T14:18:20Z",
|
||||
"updated_at": "2021-12-15T18:56:22Z",
|
||||
"pushed_at": "2021-12-15T18:56:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-08T20:24:38Z",
|
||||
"updated_at": "2021-12-15T17:13:03Z",
|
||||
"updated_at": "2021-12-15T18:39:57Z",
|
||||
"pushed_at": "2021-12-08T21:43:16Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
File diff suppressed because it is too large
Load diff
|
@ -79,5 +79,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438746535,
|
||||
"name": "log4j2-CVE-2021-45046",
|
||||
"full_name": "pravin-pp\/log4j2-CVE-2021-45046",
|
||||
"owner": {
|
||||
"login": "pravin-pp",
|
||||
"id": 12995541,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4",
|
||||
"html_url": "https:\/\/github.com\/pravin-pp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-45046",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T19:19:52Z",
|
||||
"updated_at": "2021-12-15T19:42:14Z",
|
||||
"pushed_at": "2021-12-15T19:42:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
17
README.md
17
README.md
|
@ -2941,6 +2941,9 @@ A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive
|
|||
### CVE-2021-39512
|
||||
- [guusec/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver](https://github.com/guusec/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver)
|
||||
|
||||
### CVE-2021-39685
|
||||
- [szymonh/inspector-gadget](https://github.com/szymonh/inspector-gadget)
|
||||
|
||||
### CVE-2021-40101 (2021-11-30)
|
||||
|
||||
<code>
|
||||
|
@ -3803,6 +3806,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs)
|
||||
- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app)
|
||||
- [datadavev/test-44228](https://github.com/datadavev/test-44228)
|
||||
- [LemonCraftRu/JndiRemover](https://github.com/LemonCraftRu/JndiRemover)
|
||||
- [zhangxvx/Log4j-Rec-CVE-2021-44228](https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228)
|
||||
- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
|
||||
- [chilliwebs/CVE-2021-44228_Example](https://github.com/chilliwebs/CVE-2021-44228_Example)
|
||||
|
@ -3943,6 +3947,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [mufeedvh/log4jail](https://github.com/mufeedvh/log4jail)
|
||||
- [guerzon/log4shellpoc](https://github.com/guerzon/log4shellpoc)
|
||||
- [ab0x90/CVE-2021-44228_PoC](https://github.com/ab0x90/CVE-2021-44228_PoC)
|
||||
- [stripe/log4j-remediation-tools](https://github.com/stripe/log4j-remediation-tools)
|
||||
- [razz0r/CVE-2021-44228-Mass-RCE](https://github.com/razz0r/CVE-2021-44228-Mass-RCE)
|
||||
- [xsultan/log4jshield](https://github.com/xsultan/log4jshield)
|
||||
- [0xThiebaut/CVE-2021-44228](https://github.com/0xThiebaut/CVE-2021-44228)
|
||||
|
@ -3962,10 +3967,16 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect)
|
||||
- [MeterianHQ/log4j-vuln-coverage-check](https://github.com/MeterianHQ/log4j-vuln-coverage-check)
|
||||
- [sebiboga/jmeter-fix-cve-2021-44228-windows](https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows)
|
||||
- [mitiga/log4shell-cloud-scanner](https://github.com/mitiga/log4shell-cloud-scanner)
|
||||
- [isuruwa/Log4j](https://github.com/isuruwa/Log4j)
|
||||
- [honeynet/log4shell-data](https://github.com/honeynet/log4shell-data)
|
||||
- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)
|
||||
- [wortell/log4j-honeypot](https://github.com/wortell/log4j-honeypot)
|
||||
- [MkTech-0-8YT3/CVE-2021-44228](https://github.com/MkTech-0-8YT3/CVE-2021-44228)
|
||||
- [alenazi90/log4j](https://github.com/alenazi90/log4j)
|
||||
- [pmontesd/log4j-cve-2021-44228](https://github.com/pmontesd/log4j-cve-2021-44228)
|
||||
- [aws-samples/kubernetes-log4j-cve-2021-44228-node-agent](https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent)
|
||||
- [michaelsanford/Log4Shell-Honeypot](https://github.com/michaelsanford/Log4Shell-Honeypot)
|
||||
- [ubitech/cve-2021-44228-rce-poc](https://github.com/ubitech/cve-2021-44228-rce-poc)
|
||||
|
||||
### CVE-2021-44827
|
||||
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
|
||||
|
@ -3987,6 +3998,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i
|
|||
- [cckuailong/Log4j_CVE-2021-45046](https://github.com/cckuailong/Log4j_CVE-2021-45046)
|
||||
- [BobTheShoplifter/CVE-2021-45046-Info](https://github.com/BobTheShoplifter/CVE-2021-45046-Info)
|
||||
- [tejas-nagchandi/CVE-2021-45046](https://github.com/tejas-nagchandi/CVE-2021-45046)
|
||||
- [pravin-pp/log4j2-CVE-2021-45046](https://github.com/pravin-pp/log4j2-CVE-2021-45046)
|
||||
|
||||
|
||||
## 2020
|
||||
|
@ -19368,14 +19380,11 @@ Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2
|
|||
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
|
||||
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
|
||||
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
|
||||
- [piyokango/ghost](https://github.com/piyokango/ghost)
|
||||
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
|
||||
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
|
||||
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
|
||||
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
|
||||
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
|
||||
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
|
||||
- [JustDenisYT/ghosttester](https://github.com/JustDenisYT/ghosttester)
|
||||
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
|
||||
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
|
||||
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
|
||||
|
|
Loading…
Reference in a new issue