mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/01/28 18:14:30
This commit is contained in:
parent
209b460b4a
commit
e018242643
44 changed files with 510 additions and 573 deletions
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2022-01-19T06:22:53Z",
|
||||
"pushed_at": "2022-01-26T14:31:32Z",
|
||||
"pushed_at": "2022-01-28T16:33:37Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 8,
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-01-28T00:58:31Z",
|
||||
"updated_at": "2022-01-28T15:35:12Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"forks_count": 278,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 278,
|
||||
"watchers": 1274,
|
||||
"watchers": 1275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-01-28T00:58:31Z",
|
||||
"updated_at": "2022-01-28T15:35:12Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"forks_count": 278,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 278,
|
||||
"watchers": 1274,
|
||||
"watchers": 1275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2017-12149 jboss反序列化 可回显",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-28T02:52:47Z",
|
||||
"updated_at": "2022-01-14T06:46:11Z",
|
||||
"updated_at": "2022-01-28T16:16:14Z",
|
||||
"pushed_at": "2019-03-13T08:57:50Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-01-28T00:58:31Z",
|
||||
"updated_at": "2022-01-28T15:35:12Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"forks_count": 278,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 278,
|
||||
"watchers": 1274,
|
||||
"watchers": 1275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-01-28T00:58:31Z",
|
||||
"updated_at": "2022-01-28T15:35:12Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"forks_count": 278,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 278,
|
||||
"watchers": 1274,
|
||||
"watchers": 1275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2022-01-23T16:56:20Z",
|
||||
"updated_at": "2022-01-28T17:28:18Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 439,
|
||||
"watchers_count": 439,
|
||||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 439,
|
||||
"watchers": 440,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -74,10 +74,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2022-01-26T15:17:50Z",
|
||||
"updated_at": "2022-01-28T16:29:42Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 513,
|
||||
"watchers_count": 513,
|
||||
"stargazers_count": 514,
|
||||
"watchers_count": 514,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 513,
|
||||
"watchers": 514,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-01-27T15:48:22Z",
|
||||
"updated_at": "2022-01-28T17:57:03Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3110,
|
||||
"watchers_count": 3110,
|
||||
"forks_count": 921,
|
||||
"stargazers_count": 3121,
|
||||
"watchers_count": 3121,
|
||||
"forks_count": 923,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,8 +69,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 921,
|
||||
"watchers": 3110,
|
||||
"forks": 923,
|
||||
"watchers": 3121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-01-28T00:58:31Z",
|
||||
"updated_at": "2022-01-28T15:35:12Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"forks_count": 278,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 278,
|
||||
"watchers": 1274,
|
||||
"watchers": 1275,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T09:19:10Z",
|
||||
"updated_at": "2022-01-21T07:26:32Z",
|
||||
"updated_at": "2022-01-28T15:37:18Z",
|
||||
"pushed_at": "2020-01-15T08:36:05Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Root your MediaTek device using mtk-su (CVE-2020-0069).",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2022-01-19T19:54:59Z",
|
||||
"updated_at": "2022-01-28T15:27:13Z",
|
||||
"pushed_at": "2022-01-05T15:52:13Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 77,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -881,7 +881,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-03-16T15:39:22Z",
|
||||
"updated_at": "2022-01-28T11:04:40Z",
|
||||
"pushed_at": "2022-01-28T11:31:43Z",
|
||||
"pushed_at": "2022-01-28T12:14:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-01-27T15:48:22Z",
|
||||
"updated_at": "2022-01-28T17:57:03Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3110,
|
||||
"watchers_count": 3110,
|
||||
"forks_count": 921,
|
||||
"stargazers_count": 3121,
|
||||
"watchers_count": 3121,
|
||||
"forks_count": 923,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,8 +42,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 921,
|
||||
"watchers": 3110,
|
||||
"forks": 923,
|
||||
"watchers": 3121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-01-28T00:58:31Z",
|
||||
"updated_at": "2022-01-28T15:35:12Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"forks_count": 278,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 278,
|
||||
"watchers": 1274,
|
||||
"watchers": 1275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1026,12 +1026,12 @@
|
|||
"pushed_at": "2020-07-10T15:31:07Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-26T01:34:38Z",
|
||||
"updated_at": "2022-01-09T21:23:37Z",
|
||||
"updated_at": "2022-01-28T13:49:54Z",
|
||||
"pushed_at": "2020-04-14T12:31:19Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T14:40:34Z",
|
||||
"updated_at": "2021-07-29T18:53:02Z",
|
||||
"updated_at": "2022-01-28T15:32:44Z",
|
||||
"pushed_at": "2020-07-13T14:47:02Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 411962225,
|
||||
"name": "vScalation-CVE-2021-22015",
|
||||
"full_name": "PenteraIO\/vScalation-CVE-2021-22015",
|
||||
"owner": {
|
||||
"login": "PenteraIO",
|
||||
"id": 60603602,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60603602?v=4",
|
||||
"html_url": "https:\/\/github.com\/PenteraIO"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PenteraIO\/vScalation-CVE-2021-22015",
|
||||
"description": "Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-30T07:16:27Z",
|
||||
"updated_at": "2021-10-01T17:55:05Z",
|
||||
"pushed_at": "2021-09-30T09:26:48Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 412296277,
|
||||
"name": "CVE-2021-22555-esc-priv",
|
||||
"full_name": "daletoniris\/CVE-2021-22555-esc-priv",
|
||||
"owner": {
|
||||
"login": "daletoniris",
|
||||
"id": 4347515,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4347515?v=4",
|
||||
"html_url": "https:\/\/github.com\/daletoniris"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/daletoniris\/CVE-2021-22555-esc-priv",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-01T02:18:45Z",
|
||||
"updated_at": "2021-10-01T02:19:18Z",
|
||||
"pushed_at": "2021-10-01T02:19:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 411772722,
|
||||
"name": "CVE-2021-25162",
|
||||
"full_name": "twentybel0w\/CVE-2021-25162",
|
||||
"owner": {
|
||||
"login": "twentybel0w",
|
||||
"id": 30179317,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30179317?v=4",
|
||||
"html_url": "https:\/\/github.com\/twentybel0w"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/twentybel0w\/CVE-2021-25162",
|
||||
"description": "CVE-2021-25162",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-29T17:40:17Z",
|
||||
"updated_at": "2021-09-29T17:41:14Z",
|
||||
"pushed_at": "2021-09-29T17:41:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-25741 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-19T14:05:20Z",
|
||||
"updated_at": "2022-01-27T11:14:43Z",
|
||||
"updated_at": "2022-01-28T15:21:29Z",
|
||||
"pushed_at": "2022-01-19T19:15:36Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-03-11T17:34:15Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 36,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"forks": 35,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -179,17 +179,17 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2022-01-28T02:02:31Z",
|
||||
"updated_at": "2022-01-28T12:48:54Z",
|
||||
"pushed_at": "2021-12-14T05:12:17Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 35,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 70,
|
||||
"forks": 36,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "A simple script to check for ProxyShell",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T15:12:58Z",
|
||||
"updated_at": "2022-01-17T15:14:33Z",
|
||||
"updated_at": "2022-01-28T14:37:22Z",
|
||||
"pushed_at": "2022-01-17T15:19:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 412035553,
|
||||
"name": "CVE-2021-34730",
|
||||
"full_name": "badmonkey7\/CVE-2021-34730",
|
||||
"owner": {
|
||||
"login": "badmonkey7",
|
||||
"id": 41368882,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41368882?v=4",
|
||||
"html_url": "https:\/\/github.com\/badmonkey7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/badmonkey7\/CVE-2021-34730",
|
||||
"description": "Cisco RV110w UPnP stack overflow ",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-30T11:21:04Z",
|
||||
"updated_at": "2021-12-15T14:43:06Z",
|
||||
"pushed_at": "2021-09-30T11:33:35Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 411886593,
|
||||
"name": "Serv-U-CVE-2021-35211",
|
||||
"full_name": "NattiSamson\/Serv-U-CVE-2021-35211",
|
||||
"owner": {
|
||||
"login": "NattiSamson",
|
||||
"id": 45117900,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45117900?v=4",
|
||||
"html_url": "https:\/\/github.com\/NattiSamson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NattiSamson\/Serv-U-CVE-2021-35211",
|
||||
"description": "Simple Serv-U CVE-2021-35211 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-30T01:45:42Z",
|
||||
"updated_at": "2021-12-20T21:11:58Z",
|
||||
"pushed_at": "2021-09-30T01:46:00Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 447857478,
|
||||
"name": "CVE-2021-35211",
|
||||
|
|
|
@ -25,32 +25,5 @@
|
|||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 409929982,
|
||||
"name": "OMIGOD_cve-2021-38647",
|
||||
"full_name": "Vulnmachines\/OMIGOD_cve-2021-38647",
|
||||
"owner": {
|
||||
"login": "Vulnmachines",
|
||||
"id": 79006904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines\/OMIGOD_cve-2021-38647",
|
||||
"description": "CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-24T10:53:52Z",
|
||||
"updated_at": "2021-10-10T08:48:26Z",
|
||||
"pushed_at": "2021-10-01T06:08:11Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Linux LPE using polkit-1 written in Rust. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T16:28:56Z",
|
||||
"updated_at": "2022-01-27T16:50:40Z",
|
||||
"updated_at": "2022-01-28T14:10:50Z",
|
||||
"pushed_at": "2022-01-27T17:50:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-28T02:54:38Z",
|
||||
"updated_at": "2022-01-28T06:36:31Z",
|
||||
"pushed_at": "2022-01-28T05:56:29Z",
|
||||
"pushed_at": "2022-01-28T15:08:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Local Privilege Escalation in polkit's pkexec",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:11:30Z",
|
||||
"updated_at": "2022-01-28T11:21:52Z",
|
||||
"updated_at": "2022-01-28T16:09:12Z",
|
||||
"pushed_at": "2022-01-26T01:01:15Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 21,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -26,8 +26,8 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 37,
|
||||
"forks": 23,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -73,17 +73,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-01-28T12:02:50Z",
|
||||
"pushed_at": "2022-01-28T07:34:39Z",
|
||||
"stargazers_count": 838,
|
||||
"watchers_count": 838,
|
||||
"forks_count": 255,
|
||||
"updated_at": "2022-01-28T17:55:20Z",
|
||||
"pushed_at": "2022-01-28T17:01:05Z",
|
||||
"stargazers_count": 946,
|
||||
"watchers_count": 946,
|
||||
"forks_count": 269,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 255,
|
||||
"watchers": 838,
|
||||
"forks": 269,
|
||||
"watchers": 946,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -154,11 +154,11 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2022-01-28T12:07:31Z",
|
||||
"updated_at": "2022-01-28T17:41:46Z",
|
||||
"pushed_at": "2022-01-28T01:27:52Z",
|
||||
"stargazers_count": 541,
|
||||
"watchers_count": 541,
|
||||
"forks_count": 176,
|
||||
"stargazers_count": 614,
|
||||
"watchers_count": 614,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -167,8 +167,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 176,
|
||||
"watchers": 541,
|
||||
"forks": 190,
|
||||
"watchers": 614,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -185,17 +185,17 @@
|
|||
"description": "Bash implementation of CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T01:05:55Z",
|
||||
"updated_at": "2022-01-28T05:54:32Z",
|
||||
"updated_at": "2022-01-28T17:07:43Z",
|
||||
"pushed_at": "2022-01-26T01:05:56Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -239,17 +239,17 @@
|
|||
"description": "PoC for CVE-2021-4034 dubbed pwnkit",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T01:34:44Z",
|
||||
"updated_at": "2022-01-28T09:33:21Z",
|
||||
"updated_at": "2022-01-28T17:27:32Z",
|
||||
"pushed_at": "2022-01-27T15:13:51Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 22,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 60,
|
||||
"forks": 24,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,17 +266,17 @@
|
|||
"description": "PoC for CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T02:02:25Z",
|
||||
"updated_at": "2022-01-28T10:40:07Z",
|
||||
"updated_at": "2022-01-28T17:41:56Z",
|
||||
"pushed_at": "2022-01-26T02:27:53Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 29,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -320,10 +320,10 @@
|
|||
"description": "CVE-2021-4034: Local Privilege Escalation in polkit's pkexec proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T03:20:18Z",
|
||||
"updated_at": "2022-01-28T09:01:01Z",
|
||||
"updated_at": "2022-01-28T16:11:20Z",
|
||||
"pushed_at": "2022-01-26T16:22:46Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -337,7 +337,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 14,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -354,17 +354,17 @@
|
|||
"description": "Exploit for CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T03:33:47Z",
|
||||
"updated_at": "2022-01-28T08:19:28Z",
|
||||
"updated_at": "2022-01-28T17:48:53Z",
|
||||
"pushed_at": "2022-01-27T11:57:05Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 62,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -902,19 +902,19 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-01-28T12:11:57Z",
|
||||
"updated_at": "2022-01-28T18:11:49Z",
|
||||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 38,
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 207,
|
||||
"forks": 44,
|
||||
"watchers": 260,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1228,17 +1228,17 @@
|
|||
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T17:53:16Z",
|
||||
"updated_at": "2022-01-28T10:44:58Z",
|
||||
"updated_at": "2022-01-28T17:26:31Z",
|
||||
"pushed_at": "2022-01-28T00:29:15Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1255,10 +1255,10 @@
|
|||
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T18:01:26Z",
|
||||
"updated_at": "2022-01-28T09:07:25Z",
|
||||
"pushed_at": "2022-01-28T08:50:29Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"updated_at": "2022-01-28T15:22:38Z",
|
||||
"pushed_at": "2022-01-28T12:28:49Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1281,7 +1281,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1387,17 +1387,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T19:46:19Z",
|
||||
"updated_at": "2022-01-26T19:46:57Z",
|
||||
"updated_at": "2022-01-28T15:56:36Z",
|
||||
"pushed_at": "2022-01-26T19:46:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1442,7 +1442,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-26T20:52:32Z",
|
||||
"updated_at": "2022-01-27T11:47:03Z",
|
||||
"pushed_at": "2022-01-28T01:59:25Z",
|
||||
"pushed_at": "2022-01-28T16:58:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
@ -1780,10 +1780,10 @@
|
|||
"description": "CVE-2021-4034 PoC , polkit < 0.131",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:29:55Z",
|
||||
"updated_at": "2022-01-27T14:57:21Z",
|
||||
"updated_at": "2022-01-28T15:53:33Z",
|
||||
"pushed_at": "2022-01-27T14:54:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1795,7 +1795,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1900,12 +1900,12 @@
|
|||
"pushed_at": "2022-01-27T18:32:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1978,7 +1978,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-28T03:58:34Z",
|
||||
"updated_at": "2022-01-28T04:33:54Z",
|
||||
"pushed_at": "2022-01-28T05:17:36Z",
|
||||
"pushed_at": "2022-01-28T18:03:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -2004,10 +2004,10 @@
|
|||
"description": "Exploit for the PwnKit vulnerability, CVE-2021-4034, written in Go",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T04:24:20Z",
|
||||
"updated_at": "2022-01-28T11:10:16Z",
|
||||
"pushed_at": "2022-01-28T04:27:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2022-01-28T15:18:00Z",
|
||||
"pushed_at": "2022-01-28T16:23:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2018,7 +2018,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2074,5 +2074,248 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453070166,
|
||||
"name": "POC-CVE-2021-4034",
|
||||
"full_name": "Yakumwamba\/POC-CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "Yakumwamba",
|
||||
"id": 72974932,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72974932?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yakumwamba"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yakumwamba\/POC-CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T13:04:22Z",
|
||||
"updated_at": "2022-01-28T16:04:16Z",
|
||||
"pushed_at": "2022-01-28T16:10:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453070905,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "Pr0f3ssor\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "Pr0f3ssor",
|
||||
"id": 96302619,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96302619?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pr0f3ssor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pr0f3ssor\/CVE-2021-4034",
|
||||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T13:06:45Z",
|
||||
"updated_at": "2022-01-28T13:26:23Z",
|
||||
"pushed_at": "2022-01-28T13:26:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453080818,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "Sakura-nee\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "Sakura-nee",
|
||||
"id": 74785477,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sakura-nee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-4034",
|
||||
"description": "CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T13:38:24Z",
|
||||
"updated_at": "2022-01-28T13:42:53Z",
|
||||
"pushed_at": "2022-01-28T13:42:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453085145,
|
||||
"name": "pwnkit",
|
||||
"full_name": "oreosec\/pwnkit",
|
||||
"owner": {
|
||||
"login": "oreosec",
|
||||
"id": 40876702,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40876702?v=4",
|
||||
"html_url": "https:\/\/github.com\/oreosec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oreosec\/pwnkit",
|
||||
"description": "CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T13:51:17Z",
|
||||
"updated_at": "2022-01-28T15:05:03Z",
|
||||
"pushed_at": "2022-01-28T13:59:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453089649,
|
||||
"name": "CVE-2021-4034-POC",
|
||||
"full_name": "CYB3RK1D\/CVE-2021-4034-POC",
|
||||
"owner": {
|
||||
"login": "CYB3RK1D",
|
||||
"id": 37270599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37270599?v=4",
|
||||
"html_url": "https:\/\/github.com\/CYB3RK1D"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CYB3RK1D\/CVE-2021-4034-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T14:04:58Z",
|
||||
"updated_at": "2022-01-28T16:21:31Z",
|
||||
"pushed_at": "2022-01-28T17:07:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453113353,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "Rvn0xsy\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "Rvn0xsy",
|
||||
"id": 19944759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19944759?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rvn0xsy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rvn0xsy\/CVE-2021-4034",
|
||||
"description": "CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T15:13:28Z",
|
||||
"updated_at": "2022-01-28T18:07:33Z",
|
||||
"pushed_at": "2022-01-28T15:37:41Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453114485,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "Kirill89\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "Kirill89",
|
||||
"id": 2003936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2003936?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kirill89"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kirill89\/CVE-2021-4034",
|
||||
"description": "pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T15:16:44Z",
|
||||
"updated_at": "2022-01-28T15:17:50Z",
|
||||
"pushed_at": "2022-01-28T15:17:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453145579,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "qq224015\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "qq224015",
|
||||
"id": 17867645,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17867645?v=4",
|
||||
"html_url": "https:\/\/github.com\/qq224015"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qq224015\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T16:50:45Z",
|
||||
"updated_at": "2022-01-28T16:50:45Z",
|
||||
"pushed_at": "2022-01-28T16:50:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453170577,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "n3onhacks\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "n3onhacks",
|
||||
"id": 97998625,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97998625?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3onhacks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3onhacks\/CVE-2021-4034",
|
||||
"description": "BASH file, no download capabilties? Copy and paste it!",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T18:12:54Z",
|
||||
"updated_at": "2022-01-28T18:13:50Z",
|
||||
"pushed_at": "2022-01-28T18:13:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 404270939,
|
||||
"name": "CVE-2021-40444",
|
||||
"full_name": "ozergoker\/CVE-2021-40444",
|
||||
"owner": {
|
||||
"login": "ozergoker",
|
||||
"id": 86879266,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
|
||||
"html_url": "https:\/\/github.com\/ozergoker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ozergoker\/CVE-2021-40444",
|
||||
"description": "Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-08T08:32:40Z",
|
||||
"updated_at": "2022-01-09T21:16:38Z",
|
||||
"pushed_at": "2021-09-29T11:39:26Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 405152543,
|
||||
"name": "CVE-2021-40444",
|
||||
|
@ -40,17 +13,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2022-01-27T05:20:41Z",
|
||||
"updated_at": "2022-01-28T16:52:30Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1353,
|
||||
"watchers_count": 1353,
|
||||
"stargazers_count": 1356,
|
||||
"watchers_count": 1356,
|
||||
"forks_count": 444,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 444,
|
||||
"watchers": 1353,
|
||||
"watchers": 1356,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 411188978,
|
||||
"name": "CVE-2021-41647",
|
||||
"full_name": "MobiusBinary\/CVE-2021-41647",
|
||||
"owner": {
|
||||
"login": "MobiusBinary",
|
||||
"id": 91082958,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
|
||||
"html_url": "https:\/\/github.com\/MobiusBinary"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41647",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-28T07:59:21Z",
|
||||
"updated_at": "2021-10-01T14:29:04Z",
|
||||
"pushed_at": "2021-10-01T14:29:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 411945715,
|
||||
"name": "CVE-2021-41648",
|
||||
"full_name": "MobiusBinary\/CVE-2021-41648",
|
||||
"owner": {
|
||||
"login": "MobiusBinary",
|
||||
"id": 91082958,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
|
||||
"html_url": "https:\/\/github.com\/MobiusBinary"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41648",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-30T06:16:30Z",
|
||||
"updated_at": "2021-10-01T13:50:36Z",
|
||||
"pushed_at": "2021-10-01T13:50:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 411700383,
|
||||
"name": "CVE-2021-41649",
|
||||
"full_name": "MobiusBinary\/CVE-2021-41649",
|
||||
"owner": {
|
||||
"login": "MobiusBinary",
|
||||
"id": 91082958,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
|
||||
"html_url": "https:\/\/github.com\/MobiusBinary"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41649",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-29T14:09:34Z",
|
||||
"updated_at": "2021-10-01T13:51:00Z",
|
||||
"pushed_at": "2021-10-01T13:50:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1240,12 +1240,12 @@
|
|||
"pushed_at": "2021-10-09T03:49:21Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 40,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"forks": 41,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Prestashop >= 1.7.5.0 < 1.7.8.2 - SQL injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T00:26:40Z",
|
||||
"updated_at": "2022-01-28T00:26:40Z",
|
||||
"updated_at": "2022-01-28T18:05:46Z",
|
||||
"pushed_at": "2022-01-28T00:27:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Remote Code Injection In Log4j",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T05:23:44Z",
|
||||
"updated_at": "2022-01-27T08:01:15Z",
|
||||
"updated_at": "2022-01-28T12:19:08Z",
|
||||
"pushed_at": "2022-01-18T12:01:52Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"forks_count": 97,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 97,
|
||||
"watchers": 333,
|
||||
"watchers": 332,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -909,7 +909,7 @@
|
|||
"pushed_at": "2022-01-22T14:55:02Z",
|
||||
"stargazers_count": 1200,
|
||||
"watchers_count": 1200,
|
||||
"forks_count": 311,
|
||||
"forks_count": 312,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,7 +919,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"forks": 312,
|
||||
"watchers": 1200,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1373,11 +1373,11 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2022-01-28T10:36:22Z",
|
||||
"updated_at": "2022-01-28T15:08:00Z",
|
||||
"pushed_at": "2022-01-27T11:10:09Z",
|
||||
"stargazers_count": 752,
|
||||
"watchers_count": 752,
|
||||
"forks_count": 154,
|
||||
"stargazers_count": 754,
|
||||
"watchers_count": 754,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1395,8 +1395,8 @@
|
|||
"scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 154,
|
||||
"watchers": 752,
|
||||
"forks": 155,
|
||||
"watchers": 754,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1888,10 +1888,10 @@
|
|||
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2022-01-28T09:46:38Z",
|
||||
"updated_at": "2022-01-28T16:23:54Z",
|
||||
"pushed_at": "2022-01-17T19:47:41Z",
|
||||
"stargazers_count": 595,
|
||||
"watchers_count": 595,
|
||||
"stargazers_count": 597,
|
||||
"watchers_count": 597,
|
||||
"forks_count": 96,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1910,7 +1910,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"watchers": 595,
|
||||
"watchers": 597,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3542,17 +3542,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-01-28T10:48:21Z",
|
||||
"updated_at": "2022-01-28T17:04:51Z",
|
||||
"pushed_at": "2022-01-02T20:21:42Z",
|
||||
"stargazers_count": 2668,
|
||||
"watchers_count": 2668,
|
||||
"stargazers_count": 2669,
|
||||
"watchers_count": 2669,
|
||||
"forks_count": 641,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 641,
|
||||
"watchers": 2668,
|
||||
"watchers": 2669,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6377,17 +6377,17 @@
|
|||
"description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T12:07:05Z",
|
||||
"updated_at": "2022-01-27T14:52:15Z",
|
||||
"updated_at": "2022-01-28T14:08:59Z",
|
||||
"pushed_at": "2021-12-17T07:41:47Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8733,17 +8733,17 @@
|
|||
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T15:22:50Z",
|
||||
"updated_at": "2021-12-21T17:37:29Z",
|
||||
"updated_at": "2022-01-28T12:44:13Z",
|
||||
"pushed_at": "2021-12-21T17:37:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -10603,5 +10603,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 452823928,
|
||||
"name": "log4j-polkit-poc",
|
||||
"full_name": "0xalwayslucky\/log4j-polkit-poc",
|
||||
"owner": {
|
||||
"login": "0xalwayslucky",
|
||||
"id": 28390940,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28390940?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xalwayslucky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xalwayslucky\/log4j-polkit-poc",
|
||||
"description": "vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T19:54:16Z",
|
||||
"updated_at": "2022-01-28T15:09:55Z",
|
||||
"pushed_at": "2022-01-28T15:08:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0185",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-19T06:19:38Z",
|
||||
"updated_at": "2022-01-28T11:17:13Z",
|
||||
"updated_at": "2022-01-28T17:35:40Z",
|
||||
"pushed_at": "2022-01-25T17:00:16Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 214,
|
||||
"watchers": 217,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T16:27:50Z",
|
||||
"updated_at": "2022-01-26T16:33:02Z",
|
||||
"updated_at": "2022-01-28T14:27:12Z",
|
||||
"pushed_at": "2022-01-26T16:45:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:58:17Z",
|
||||
"updated_at": "2022-01-28T08:33:20Z",
|
||||
"updated_at": "2022-01-28T14:00:04Z",
|
||||
"pushed_at": "2022-01-26T00:18:26Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2022-01-28T11:28:41Z",
|
||||
"updated_at": "2022-01-28T16:39:07Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 37,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 80,
|
||||
"forks": 38,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -80,17 +80,17 @@
|
|||
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T02:28:50Z",
|
||||
"updated_at": "2022-01-27T20:09:59Z",
|
||||
"updated_at": "2022-01-28T13:14:11Z",
|
||||
"pushed_at": "2022-01-20T02:07:59Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"forks_count": 89,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 89,
|
||||
"watchers": 317,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "TightVNC Vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T18:49:43Z",
|
||||
"updated_at": "2022-01-28T06:18:13Z",
|
||||
"updated_at": "2022-01-28T17:24:52Z",
|
||||
"pushed_at": "2022-01-26T18:53:03Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
69
README.md
69
README.md
|
@ -663,6 +663,15 @@ A vulnerability was found in the Linux kernel's KVM subsystem in arch/x86/kvm/la
|
|||
- [jpmcb/pwnkit-go](https://github.com/jpmcb/pwnkit-go)
|
||||
- [JoyGhoshs/CVE-2021-4034](https://github.com/JoyGhoshs/CVE-2021-4034)
|
||||
- [galoget/PwnKit-CVE-2021-4034](https://github.com/galoget/PwnKit-CVE-2021-4034)
|
||||
- [Yakumwamba/POC-CVE-2021-4034](https://github.com/Yakumwamba/POC-CVE-2021-4034)
|
||||
- [Pr0f3ssor/CVE-2021-4034](https://github.com/Pr0f3ssor/CVE-2021-4034)
|
||||
- [Sakura-nee/CVE-2021-4034](https://github.com/Sakura-nee/CVE-2021-4034)
|
||||
- [oreosec/pwnkit](https://github.com/oreosec/pwnkit)
|
||||
- [CYB3RK1D/CVE-2021-4034-POC](https://github.com/CYB3RK1D/CVE-2021-4034-POC)
|
||||
- [Rvn0xsy/CVE-2021-4034](https://github.com/Rvn0xsy/CVE-2021-4034)
|
||||
- [Kirill89/CVE-2021-4034](https://github.com/Kirill89/CVE-2021-4034)
|
||||
- [qq224015/CVE-2021-4034](https://github.com/qq224015/CVE-2021-4034)
|
||||
- [n3onhacks/CVE-2021-4034](https://github.com/n3onhacks/CVE-2021-4034)
|
||||
|
||||
### CVE-2021-4104 (2021-12-14)
|
||||
|
||||
|
@ -985,14 +994,6 @@ The vCenter Server contains an arbitrary file upload vulnerability in the Analyt
|
|||
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
|
||||
- [timb-machine-mirrors/CVE-2021-22005](https://github.com/timb-machine-mirrors/CVE-2021-22005)
|
||||
|
||||
### CVE-2021-22015 (2021-09-23)
|
||||
|
||||
<code>
|
||||
The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.
|
||||
</code>
|
||||
|
||||
- [PenteraIO/vScalation-CVE-2021-22015](https://github.com/PenteraIO/vScalation-CVE-2021-22015)
|
||||
|
||||
### CVE-2021-22053 (2021-11-19)
|
||||
|
||||
<code>
|
||||
|
@ -1082,14 +1083,6 @@ When requests to the internal network for webhooks are enabled, a server-side re
|
|||
- [antx-code/CVE-2021-22214](https://github.com/antx-code/CVE-2021-22214)
|
||||
- [kh4sh3i/GitLab-SSRF-CVE-2021-22214](https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214)
|
||||
|
||||
### CVE-2021-22555 (2021-07-07)
|
||||
|
||||
<code>
|
||||
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
|
||||
</code>
|
||||
|
||||
- [daletoniris/CVE-2021-22555-esc-priv](https://github.com/daletoniris/CVE-2021-22555-esc-priv)
|
||||
|
||||
### CVE-2021-22569 (2022-01-07)
|
||||
|
||||
<code>
|
||||
|
@ -1280,14 +1273,6 @@ The Formidable Form Builder WordPress plugin before 4.09.05 allows to inject cer
|
|||
|
||||
- [S1lkys/CVE-2021-24884](https://github.com/S1lkys/CVE-2021-24884)
|
||||
|
||||
### CVE-2021-25162 (2021-03-29)
|
||||
|
||||
<code>
|
||||
A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
|
||||
</code>
|
||||
|
||||
- [twentybel0w/CVE-2021-25162](https://github.com/twentybel0w/CVE-2021-25162)
|
||||
|
||||
### CVE-2021-25281 (2021-02-26)
|
||||
|
||||
<code>
|
||||
|
@ -2370,21 +2355,12 @@ Telenot CompasX versions prior to 32.0 use a weak seed for random number generat
|
|||
|
||||
- [x41sec/CVE-2021-34600](https://github.com/x41sec/CVE-2021-34600)
|
||||
|
||||
### CVE-2021-34730 (2021-08-18)
|
||||
|
||||
<code>
|
||||
A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of incoming UPnP traffic. An attacker could exploit this vulnerability by sending a crafted UPnP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition. Cisco has not released software updates that address this vulnerability.
|
||||
</code>
|
||||
|
||||
- [badmonkey7/CVE-2021-34730](https://github.com/badmonkey7/CVE-2021-34730)
|
||||
|
||||
### CVE-2021-35211 (2021-07-14)
|
||||
|
||||
<code>
|
||||
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
|
||||
</code>
|
||||
|
||||
- [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211)
|
||||
- [BishopFox/CVE-2021-35211](https://github.com/BishopFox/CVE-2021-35211)
|
||||
|
||||
### CVE-2021-35215 (2021-09-01)
|
||||
|
@ -2573,7 +2549,6 @@ Open Management Infrastructure Remote Code Execution Vulnerability
|
|||
</code>
|
||||
|
||||
- [corelight/CVE-2021-38647](https://github.com/corelight/CVE-2021-38647)
|
||||
- [Vulnmachines/OMIGOD_cve-2021-38647](https://github.com/Vulnmachines/OMIGOD_cve-2021-38647)
|
||||
|
||||
### CVE-2021-38666 (2021-11-09)
|
||||
|
||||
|
@ -2670,7 +2645,6 @@ A crafted request uri-path can cause mod_proxy to forward the request to an orig
|
|||
Microsoft MSHTML Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [ozergoker/CVE-2021-40444](https://github.com/ozergoker/CVE-2021-40444)
|
||||
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
|
||||
- [aslitsecurity/CVE-2021-40444_builders](https://github.com/aslitsecurity/CVE-2021-40444_builders)
|
||||
- [klezVirus/CVE-2021-40444](https://github.com/klezVirus/CVE-2021-40444)
|
||||
|
@ -2856,30 +2830,6 @@ Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Review
|
|||
|
||||
- [hax3xploit/CVE-2021-41646](https://github.com/hax3xploit/CVE-2021-41646)
|
||||
|
||||
### CVE-2021-41647 (2021-10-01)
|
||||
|
||||
<code>
|
||||
An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
|
||||
</code>
|
||||
|
||||
- [MobiusBinary/CVE-2021-41647](https://github.com/MobiusBinary/CVE-2021-41647)
|
||||
|
||||
### CVE-2021-41648 (2021-10-01)
|
||||
|
||||
<code>
|
||||
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
|
||||
</code>
|
||||
|
||||
- [MobiusBinary/CVE-2021-41648](https://github.com/MobiusBinary/CVE-2021-41648)
|
||||
|
||||
### CVE-2021-41649 (2021-10-01)
|
||||
|
||||
<code>
|
||||
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
|
||||
</code>
|
||||
|
||||
- [MobiusBinary/CVE-2021-41649](https://github.com/MobiusBinary/CVE-2021-41649)
|
||||
|
||||
### CVE-2021-41651 (2021-10-04)
|
||||
|
||||
<code>
|
||||
|
@ -3850,6 +3800,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [semelnyk/CVE-2021-44228-ScannersListFromRF](https://github.com/semelnyk/CVE-2021-44228-ScannersListFromRF)
|
||||
- [ThanhHien98/Log4j](https://github.com/ThanhHien98/Log4j)
|
||||
- [ThanhHien98/CVE-2021-44228](https://github.com/ThanhHien98/CVE-2021-44228)
|
||||
- [0xalwayslucky/log4j-polkit-poc](https://github.com/0xalwayslucky/log4j-polkit-poc)
|
||||
|
||||
### CVE-2021-44270
|
||||
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
|
||||
|
|
Loading…
Reference in a new issue