Auto Update 2022/01/12 00:14:10

This commit is contained in:
motikan2010-bot 2022-01-12 09:14:10 +09:00
parent 928c2c3831
commit d957cf82ab
28 changed files with 400 additions and 122 deletions

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-01-07T15:39:47Z",
"updated_at": "2022-01-11T14:46:10Z",
"pushed_at": "2022-01-11T14:50:26Z",
"pushed_at": "2022-01-11T19:04:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.",
"fork": false,
"created_at": "2016-05-18T03:49:02Z",
"updated_at": "2021-12-29T03:35:56Z",
"updated_at": "2022-01-11T21:51:13Z",
"pushed_at": "2016-05-18T03:53:42Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 81,
"watchers": 80,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 129,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
"fork": false,
"created_at": "2020-04-13T11:34:24Z",
"updated_at": "2022-01-10T19:46:49Z",
"updated_at": "2022-01-11T19:43:49Z",
"pushed_at": "2020-04-12T21:11:16Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -518,17 +518,17 @@
"description": "MASS Exploiter",
"fork": false,
"created_at": "2018-10-02T04:25:02Z",
"updated_at": "2019-10-17T15:56:58Z",
"updated_at": "2022-01-11T19:19:31Z",
"pushed_at": "2019-10-17T15:56:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0
},
{
@ -653,17 +653,17 @@
"description": "CVE-2018-7600 and CVE-2018-7602 Mass Exploiter",
"fork": false,
"created_at": "2019-10-10T11:56:29Z",
"updated_at": "2019-10-10T14:10:13Z",
"updated_at": "2022-01-11T19:19:29Z",
"pushed_at": "2019-10-10T14:10:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0
},
{

View file

@ -1484,17 +1484,17 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2022-01-07T18:44:29Z",
"updated_at": "2022-01-11T19:25:10Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 840,
"watchers_count": 840,
"stargazers_count": 841,
"watchers_count": 841,
"forks_count": 263,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 263,
"watchers": 840,
"watchers": 841,
"score": 0
},
{

34
2019/CVE-2019-1652.json Normal file
View file

@ -0,0 +1,34 @@
[
{
"id": 167347037,
"name": "CiscoRV320Dump",
"full_name": "0x27\/CiscoRV320Dump",
"owner": {
"login": "0x27",
"id": 9094330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9094330?v=4",
"html_url": "https:\/\/github.com\/0x27"
},
"html_url": "https:\/\/github.com\/0x27\/CiscoRV320Dump",
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2022-01-03T15:29:33Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 215,
"watchers_count": 215,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"topics": [
"cisco",
"config-dump",
"exploit",
"exploitation"
],
"visibility": "public",
"forks": 65,
"watchers": 215,
"score": 0
}
]

View file

@ -1,4 +1,31 @@
[
{
"id": 168361115,
"name": "CVE-2019-1653",
"full_name": "dubfr33\/CVE-2019-1653",
"owner": {
"login": "dubfr33",
"id": 20056018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20056018?v=4",
"html_url": "https:\/\/github.com\/dubfr33"
},
"html_url": "https:\/\/github.com\/dubfr33\/CVE-2019-1653",
"description": "NSE script to scan for Cisco routers vulnerable to CVE-2019-1653",
"fork": false,
"created_at": "2019-01-30T14:58:48Z",
"updated_at": "2020-04-21T04:04:11Z",
"pushed_at": "2019-01-30T15:01:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 178810790,
"name": "CiscoSpill",

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 129,
"score": 0
},

View file

@ -1,4 +1,31 @@
[
{
"id": 167275161,
"name": "check_CVE-2019-3462",
"full_name": "tonejito\/check_CVE-2019-3462",
"owner": {
"login": "tonejito",
"id": 618588,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/618588?v=4",
"html_url": "https:\/\/github.com\/tonejito"
},
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
"fork": false,
"created_at": "2019-01-24T00:30:15Z",
"updated_at": "2021-11-08T00:38:08Z",
"pushed_at": "2019-01-26T01:21:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 170573944,
"name": "update-apt-package",

33
2019/CVE-2019-5893.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 165075365,
"name": "OpenSource-ERP-SQL-Injection",
"full_name": "EmreOvunc\/OpenSource-ERP-SQL-Injection",
"owner": {
"login": "EmreOvunc",
"id": 15659223,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4",
"html_url": "https:\/\/github.com\/EmreOvunc"
},
"html_url": "https:\/\/github.com\/EmreOvunc\/OpenSource-ERP-SQL-Injection",
"description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.",
"fork": false,
"created_at": "2019-01-10T14:36:55Z",
"updated_at": "2021-03-04T03:26:47Z",
"pushed_at": "2019-01-11T07:45:37Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2019-5893",
"erp",
"sql-injection"
],
"visibility": "public",
"forks": 5,
"watchers": 5,
"score": 0
}
]

View file

@ -1,4 +1,31 @@
[
{
"id": 168440280,
"name": "OsirisJailbreak12",
"full_name": "fatgrass\/OsirisJailbreak12",
"owner": {
"login": "fatgrass",
"id": 19977419,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19977419?v=4",
"html_url": "https:\/\/github.com\/fatgrass"
},
"html_url": "https:\/\/github.com\/fatgrass\/OsirisJailbreak12",
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
"fork": false,
"created_at": "2019-01-31T01:03:43Z",
"updated_at": "2021-11-04T01:55:02Z",
"pushed_at": "2019-01-31T00:53:03Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 12,
"score": 0
},
{
"id": 194542840,
"name": "CVE-2019-6225-macOS",

29
2019/CVE-2019-6263.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 166368513,
"name": "CVE-2019-6263-Joomla-POC",
"full_name": "praveensutar\/CVE-2019-6263-Joomla-POC",
"owner": {
"login": "praveensutar",
"id": 12555214,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12555214?v=4",
"html_url": "https:\/\/github.com\/praveensutar"
},
"html_url": "https:\/\/github.com\/praveensutar\/CVE-2019-6263-Joomla-POC",
"description": null,
"fork": false,
"created_at": "2019-01-18T08:10:11Z",
"updated_at": "2021-03-17T03:37:13Z",
"pushed_at": "2019-01-19T04:29:22Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0
}
]

29
2019/CVE-2019-6487.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 166241615,
"name": "TP-Link-WDR-Router-Command-injection_POC",
"full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"owner": {
"login": "afang5472",
"id": 18503100,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18503100?v=4",
"html_url": "https:\/\/github.com\/afang5472"
},
"html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.",
"fork": false,
"created_at": "2019-01-17T14:44:12Z",
"updated_at": "2021-04-24T02:28:14Z",
"pushed_at": "2019-01-19T10:49:21Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 28,
"score": 0
}
]

29
2019/CVE-2019-7216.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 168365175,
"name": "CVE-2019-7216",
"full_name": "Ekultek\/CVE-2019-7216",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/CVE-2019-7216",
"description": "Filechucker filter bypass Proof Of Concept",
"fork": false,
"created_at": "2019-01-30T15:23:40Z",
"updated_at": "2020-03-30T04:22:37Z",
"pushed_at": "2019-02-01T16:56:53Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-13T09:03:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability",
"fork": false,
"created_at": "2020-07-29T19:02:29Z",
"updated_at": "2021-12-15T14:39:57Z",
"updated_at": "2022-01-11T21:52:06Z",
"pushed_at": "2020-11-11T19:48:38Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 5,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 23,
"forks": 6,
"watchers": 24,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2020-28032 (It's just a POP chain in WordPress < 5.5.2 for exploiting PHP Object Injection)",
"fork": false,
"created_at": "2021-11-17T07:09:47Z",
"updated_at": "2021-11-17T18:39:50Z",
"updated_at": "2022-01-11T23:50:44Z",
"pushed_at": "2021-11-17T07:43:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 111,
"score": 0
},

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1495,
"watchers_count": 1495,
"forks_count": 545,
"forks_count": 546,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 545,
"forks": 546,
"watchers": 1495,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-01-11T11:22:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"rce"
],
"visibility": "public",
"forks": 2,
"forks": 4,
"watchers": 0,
"score": 0
}

View file

@ -283,17 +283,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2022-01-11T09:50:43Z",
"updated_at": "2022-01-11T18:36:15Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 97,
"watchers": 98,
"score": 0
},
{

View file

@ -544,17 +544,17 @@
"description": "NSE script to fingerprint if GitLab is vulnerable to cve-2021-22205-nse",
"fork": false,
"created_at": "2021-11-27T15:53:33Z",
"updated_at": "2021-12-29T10:01:23Z",
"updated_at": "2022-01-11T19:47:41Z",
"pushed_at": "2021-11-27T16:31:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2021-01-27T16:03:34Z",
"updated_at": "2021-12-15T14:41:22Z",
"updated_at": "2022-01-11T22:06:07Z",
"pushed_at": "2021-01-31T04:56:56Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 112,
"watchers": 111,
"score": 0
},
{
@ -425,17 +425,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2022-01-10T02:23:09Z",
"updated_at": "2022-01-11T22:32:09Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 792,
"watchers_count": 792,
"stargazers_count": 794,
"watchers_count": 794,
"forks_count": 230,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 230,
"watchers": 792,
"watchers": 794,
"score": 0
},
{
@ -969,17 +969,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-01-11T01:58:54Z",
"updated_at": "2022-01-11T22:29:55Z",
"pushed_at": "2021-11-04T23:56:50Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 420,
"watchers": 421,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2022-01-11T17:30:11Z",
"updated_at": "2022-01-11T22:41:18Z",
"pushed_at": "2021-12-21T10:11:05Z",
"stargazers_count": 696,
"watchers_count": 696,
"stargazers_count": 697,
"watchers_count": 697,
"forks_count": 149,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 149,
"watchers": 696,
"watchers": 697,
"score": 0
},
{
@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-01-11T18:07:15Z",
"updated_at": "2022-01-11T21:30:05Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 38,
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 190,
"forks": 39,
"watchers": 191,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2022-01-08T14:50:30Z",
"updated_at": "2022-01-11T18:53:32Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 245,
"watchers_count": 245,
"stargazers_count": 246,
"watchers_count": 246,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 245,
"watchers": 246,
"score": 0
},
{

View file

@ -390,17 +390,17 @@
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-01-11T09:39:52Z",
"updated_at": "2022-01-11T23:45:39Z",
"pushed_at": "2021-12-27T10:27:42Z",
"stargazers_count": 894,
"watchers_count": 894,
"stargazers_count": 897,
"watchers_count": 897,
"forks_count": 351,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 351,
"watchers": 894,
"watchers": 897,
"score": 0
},
{
@ -858,11 +858,11 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-01-11T17:25:54Z",
"updated_at": "2022-01-11T20:12:55Z",
"pushed_at": "2021-12-31T11:47:19Z",
"stargazers_count": 598,
"watchers_count": 598,
"forks_count": 90,
"stargazers_count": 599,
"watchers_count": 599,
"forks_count": 91,
"allow_forking": true,
"is_template": false,
"topics": [
@ -887,8 +887,8 @@
"writeups"
],
"visibility": "public",
"forks": 90,
"watchers": 598,
"forks": 91,
"watchers": 599,
"score": 0
},
{
@ -905,11 +905,11 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-01-11T15:40:20Z",
"updated_at": "2022-01-11T23:37:22Z",
"pushed_at": "2022-01-02T07:12:10Z",
"stargazers_count": 1139,
"watchers_count": 1139,
"forks_count": 290,
"stargazers_count": 1142,
"watchers_count": 1142,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
"topics": [
@ -919,8 +919,8 @@
"security"
],
"visibility": "public",
"forks": 290,
"watchers": 1139,
"forks": 291,
"watchers": 1142,
"score": 0
},
{
@ -1373,10 +1373,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-01-11T18:14:08Z",
"updated_at": "2022-01-11T19:41:14Z",
"pushed_at": "2022-01-11T14:45:44Z",
"stargazers_count": 726,
"watchers_count": 726,
"stargazers_count": 727,
"watchers_count": 727,
"forks_count": 148,
"allow_forking": true,
"is_template": false,
@ -1393,7 +1393,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 726,
"watchers": 727,
"score": 0
},
{
@ -1885,7 +1885,7 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-01-11T17:36:30Z",
"updated_at": "2022-01-11T22:29:02Z",
"pushed_at": "2022-01-07T09:40:06Z",
"stargazers_count": 569,
"watchers_count": 569,
@ -1986,17 +1986,17 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2022-01-11T17:10:11Z",
"updated_at": "2022-01-11T20:09:19Z",
"pushed_at": "2021-12-23T20:40:44Z",
"stargazers_count": 473,
"watchers_count": 473,
"stargazers_count": 475,
"watchers_count": 475,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 473,
"watchers": 475,
"score": 0
},
{
@ -3539,16 +3539,16 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-11T17:41:44Z",
"updated_at": "2022-01-11T23:49:05Z",
"pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2569,
"watchers_count": 2569,
"forks_count": 613,
"forks_count": 615,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 613,
"forks": 615,
"watchers": 2569,
"score": 0
},
@ -4923,10 +4923,10 @@
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
"fork": false,
"created_at": "2021-12-13T21:47:41Z",
"updated_at": "2022-01-07T18:18:24Z",
"updated_at": "2022-01-11T20:28:25Z",
"pushed_at": "2022-01-02T16:34:49Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -4941,7 +4941,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 47,
"watchers": 48,
"score": 0
},
{
@ -5239,10 +5239,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-01-10T21:43:19Z",
"updated_at": "2022-01-11T18:23:02Z",
"pushed_at": "2021-12-27T15:12:20Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 252,
"watchers_count": 252,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -5255,7 +5255,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 251,
"watchers": 252,
"score": 0
},
{
@ -5865,7 +5865,7 @@
"fork": false,
"created_at": "2021-12-14T22:19:29Z",
"updated_at": "2022-01-11T16:06:05Z",
"pushed_at": "2022-01-11T12:00:54Z",
"pushed_at": "2022-01-11T19:37:02Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
@ -5996,17 +5996,17 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2022-01-11T13:08:16Z",
"updated_at": "2022-01-11T23:28:08Z",
"pushed_at": "2022-01-08T17:06:21Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 84,
"stargazers_count": 314,
"watchers_count": 314,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 313,
"forks": 85,
"watchers": 314,
"score": 0
},
{
@ -10102,12 +10102,12 @@
"pushed_at": "2022-01-10T19:26:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 7,
"score": 0
},

View file

@ -9273,12 +9273,21 @@ Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier
- [securifera/CVE-2019-1579](https://github.com/securifera/CVE-2019-1579)
- [Elsfa7-110/CVE-2019-1579](https://github.com/Elsfa7-110/CVE-2019-1579)
### CVE-2019-1652 (2019-01-24)
<code>
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
</code>
- [0x27/CiscoRV320Dump](https://github.com/0x27/CiscoRV320Dump)
### CVE-2019-1653 (2019-01-24)
<code>
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
</code>
- [dubfr33/CVE-2019-1653](https://github.com/dubfr33/CVE-2019-1653)
- [shaheemirza/CiscoSpill](https://github.com/shaheemirza/CiscoSpill)
### CVE-2019-1759 (2019-03-27)
@ -9502,6 +9511,7 @@ The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from ve
Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
</code>
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
### CVE-2019-3663 (2019-11-13)
@ -9771,6 +9781,14 @@ Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed
- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825)
### CVE-2019-5893 (2019-01-10)
<code>
Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.
</code>
- [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection)
### CVE-2019-6111 (2019-01-31)
<code>
@ -9803,6 +9821,7 @@ An out-of-bounds read issue existed that led to the disclosure of kernel memory.
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges.
</code>
- [fatgrass/OsirisJailbreak12](https://github.com/fatgrass/OsirisJailbreak12)
- [TrungNguyen1909/CVE-2019-6225-macOS](https://github.com/TrungNguyen1909/CVE-2019-6225-macOS)
- [raystyle/jailbreak-iOS12](https://github.com/raystyle/jailbreak-iOS12)
@ -9822,6 +9841,14 @@ The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and
- [nikitapbst/cve-2019-6260](https://github.com/nikitapbst/cve-2019-6260)
### CVE-2019-6263 (2019-01-16)
<code>
An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS.
</code>
- [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC)
### CVE-2019-6329 (2019-06-25)
<code>
@ -9902,6 +9929,14 @@ A programming error in the nxdomain-redirect feature can cause an assertion fail
- [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467)
### CVE-2019-6487 (2019-01-18)
<code>
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
</code>
- [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC)
### CVE-2019-6690 (2019-03-17)
<code>
@ -9945,6 +9980,14 @@ SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrus
- [devzspy/CVE-2019-7214](https://github.com/devzspy/CVE-2019-7214)
- [AndyFeiLi/-CVE-2019-7214](https://github.com/AndyFeiLi/-CVE-2019-7214)
### CVE-2019-7216 (2019-01-31)
<code>
An issue was discovered in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php.
</code>
- [Ekultek/CVE-2019-7216](https://github.com/Ekultek/CVE-2019-7216)
### CVE-2019-7219 (2019-04-11)
<code>