Auto Update 2022/01/28 18:14:30

This commit is contained in:
motikan2010-bot 2022-01-29 03:14:30 +09:00
parent 209b460b4a
commit e018242643
44 changed files with 510 additions and 573 deletions

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2022-01-19T06:22:53Z",
"pushed_at": "2022-01-26T14:31:32Z",
"pushed_at": "2022-01-28T16:33:37Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 8,

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-28T00:58:31Z",
"updated_at": "2022-01-28T15:35:12Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1274,
"watchers_count": 1274,
"stargazers_count": 1275,
"watchers_count": 1275,
"forks_count": 278,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 278,
"watchers": 1274,
"watchers": 1275,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-28T00:58:31Z",
"updated_at": "2022-01-28T15:35:12Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1274,
"watchers_count": 1274,
"stargazers_count": 1275,
"watchers_count": 1275,
"forks_count": 278,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 278,
"watchers": 1274,
"watchers": 1275,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2017-12149 jboss反序列化 可回显",
"fork": false,
"created_at": "2017-11-28T02:52:47Z",
"updated_at": "2022-01-14T06:46:11Z",
"updated_at": "2022-01-28T16:16:14Z",
"pushed_at": "2019-03-13T08:57:50Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 133,
"watchers": 134,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-28T00:58:31Z",
"updated_at": "2022-01-28T15:35:12Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1274,
"watchers_count": 1274,
"stargazers_count": 1275,
"watchers_count": 1275,
"forks_count": 278,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 278,
"watchers": 1274,
"watchers": 1275,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-28T00:58:31Z",
"updated_at": "2022-01-28T15:35:12Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1274,
"watchers_count": 1274,
"stargazers_count": 1275,
"watchers_count": 1275,
"forks_count": 278,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 278,
"watchers": 1274,
"watchers": 1275,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2022-01-23T16:56:20Z",
"updated_at": "2022-01-28T17:28:18Z",
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 439,
"watchers_count": 439,
"stargazers_count": 440,
"watchers_count": 440,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 439,
"watchers": 440,
"score": 0
},
{

View file

@ -74,10 +74,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2022-01-26T15:17:50Z",
"updated_at": "2022-01-28T16:29:42Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 513,
"watchers_count": 513,
"stargazers_count": 514,
"watchers_count": 514,
"forks_count": 166,
"allow_forking": true,
"is_template": false,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 513,
"watchers": 514,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-01-27T15:48:22Z",
"updated_at": "2022-01-28T17:57:03Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3110,
"watchers_count": 3110,
"forks_count": 921,
"stargazers_count": 3121,
"watchers_count": 3121,
"forks_count": 923,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 921,
"watchers": 3110,
"forks": 923,
"watchers": 3121,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-28T00:58:31Z",
"updated_at": "2022-01-28T15:35:12Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1274,
"watchers_count": 1274,
"stargazers_count": 1275,
"watchers_count": 1275,
"forks_count": 278,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 278,
"watchers": 1274,
"watchers": 1275,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.",
"fork": false,
"created_at": "2020-01-10T09:19:10Z",
"updated_at": "2022-01-21T07:26:32Z",
"updated_at": "2022-01-28T15:37:18Z",
"pushed_at": "2020-01-15T08:36:05Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 20,
"watchers": 21,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2022-01-19T19:54:59Z",
"updated_at": "2022-01-28T15:27:13Z",
"pushed_at": "2022-01-05T15:52:13Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 77,
"watchers": 79,
"score": 0
},
{

View file

@ -881,7 +881,7 @@
"fork": false,
"created_at": "2020-03-16T15:39:22Z",
"updated_at": "2022-01-28T11:04:40Z",
"pushed_at": "2022-01-28T11:31:43Z",
"pushed_at": "2022-01-28T12:14:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-01-27T15:48:22Z",
"updated_at": "2022-01-28T17:57:03Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3110,
"watchers_count": 3110,
"forks_count": 921,
"stargazers_count": 3121,
"watchers_count": 3121,
"forks_count": 923,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 921,
"watchers": 3110,
"forks": 923,
"watchers": 3121,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-28T00:58:31Z",
"updated_at": "2022-01-28T15:35:12Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1274,
"watchers_count": 1274,
"stargazers_count": 1275,
"watchers_count": 1275,
"forks_count": 278,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 278,
"watchers": 1274,
"watchers": 1275,
"score": 0
},
{

View file

@ -1026,12 +1026,12 @@
"pushed_at": "2020-07-10T15:31:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 4,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-03-26T01:34:38Z",
"updated_at": "2022-01-09T21:23:37Z",
"updated_at": "2022-01-28T13:49:54Z",
"pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-07-13T14:40:34Z",
"updated_at": "2021-07-29T18:53:02Z",
"updated_at": "2022-01-28T15:32:44Z",
"pushed_at": "2020-07-13T14:47:02Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 411962225,
"name": "vScalation-CVE-2021-22015",
"full_name": "PenteraIO\/vScalation-CVE-2021-22015",
"owner": {
"login": "PenteraIO",
"id": 60603602,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60603602?v=4",
"html_url": "https:\/\/github.com\/PenteraIO"
},
"html_url": "https:\/\/github.com\/PenteraIO\/vScalation-CVE-2021-22015",
"description": "Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter",
"fork": false,
"created_at": "2021-09-30T07:16:27Z",
"updated_at": "2021-10-01T17:55:05Z",
"pushed_at": "2021-09-30T09:26:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 412296277,
"name": "CVE-2021-22555-esc-priv",
"full_name": "daletoniris\/CVE-2021-22555-esc-priv",
"owner": {
"login": "daletoniris",
"id": 4347515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4347515?v=4",
"html_url": "https:\/\/github.com\/daletoniris"
},
"html_url": "https:\/\/github.com\/daletoniris\/CVE-2021-22555-esc-priv",
"description": null,
"fork": false,
"created_at": "2021-10-01T02:18:45Z",
"updated_at": "2021-10-01T02:19:18Z",
"pushed_at": "2021-10-01T02:19:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 411772722,
"name": "CVE-2021-25162",
"full_name": "twentybel0w\/CVE-2021-25162",
"owner": {
"login": "twentybel0w",
"id": 30179317,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30179317?v=4",
"html_url": "https:\/\/github.com\/twentybel0w"
},
"html_url": "https:\/\/github.com\/twentybel0w\/CVE-2021-25162",
"description": "CVE-2021-25162",
"fork": false,
"created_at": "2021-09-29T17:40:17Z",
"updated_at": "2021-09-29T17:41:14Z",
"pushed_at": "2021-09-29T17:41:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-25741 vulnerability",
"fork": false,
"created_at": "2022-01-19T14:05:20Z",
"updated_at": "2022-01-27T11:14:43Z",
"updated_at": "2022-01-28T15:21:29Z",
"pushed_at": "2022-01-19T19:15:36Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-03-11T17:34:15Z",
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 36,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"forks": 35,
"watchers": 106,
"score": 0
},

View file

@ -179,17 +179,17 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2022-01-28T02:02:31Z",
"updated_at": "2022-01-28T12:48:54Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 35,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 70,
"forks": 36,
"watchers": 71,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "A simple script to check for ProxyShell",
"fork": false,
"created_at": "2022-01-17T15:12:58Z",
"updated_at": "2022-01-17T15:14:33Z",
"updated_at": "2022-01-28T14:37:22Z",
"pushed_at": "2022-01-17T15:19:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 412035553,
"name": "CVE-2021-34730",
"full_name": "badmonkey7\/CVE-2021-34730",
"owner": {
"login": "badmonkey7",
"id": 41368882,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41368882?v=4",
"html_url": "https:\/\/github.com\/badmonkey7"
},
"html_url": "https:\/\/github.com\/badmonkey7\/CVE-2021-34730",
"description": "Cisco RV110w UPnP stack overflow ",
"fork": false,
"created_at": "2021-09-30T11:21:04Z",
"updated_at": "2021-12-15T14:43:06Z",
"pushed_at": "2021-09-30T11:33:35Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 24,
"score": 0
}
]

View file

@ -1,31 +1,4 @@
[
{
"id": 411886593,
"name": "Serv-U-CVE-2021-35211",
"full_name": "NattiSamson\/Serv-U-CVE-2021-35211",
"owner": {
"login": "NattiSamson",
"id": 45117900,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45117900?v=4",
"html_url": "https:\/\/github.com\/NattiSamson"
},
"html_url": "https:\/\/github.com\/NattiSamson\/Serv-U-CVE-2021-35211",
"description": "Simple Serv-U CVE-2021-35211 PoC",
"fork": false,
"created_at": "2021-09-30T01:45:42Z",
"updated_at": "2021-12-20T21:11:58Z",
"pushed_at": "2021-09-30T01:46:00Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"score": 0
},
{
"id": 447857478,
"name": "CVE-2021-35211",

View file

@ -25,32 +25,5 @@
"forks": 5,
"watchers": 5,
"score": 0
},
{
"id": 409929982,
"name": "OMIGOD_cve-2021-38647",
"full_name": "Vulnmachines\/OMIGOD_cve-2021-38647",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/OMIGOD_cve-2021-38647",
"description": "CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root.",
"fork": false,
"created_at": "2021-09-24T10:53:52Z",
"updated_at": "2021-10-10T08:48:26Z",
"pushed_at": "2021-10-01T06:08:11Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Linux LPE using polkit-1 written in Rust. ",
"fork": false,
"created_at": "2022-01-27T16:28:56Z",
"updated_at": "2022-01-27T16:50:40Z",
"updated_at": "2022-01-28T14:10:50Z",
"pushed_at": "2022-01-27T17:50:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-01-28T02:54:38Z",
"updated_at": "2022-01-28T06:36:31Z",
"pushed_at": "2022-01-28T05:56:29Z",
"pushed_at": "2022-01-28T15:08:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,

View file

@ -13,11 +13,11 @@
"description": "Local Privilege Escalation in polkit's pkexec",
"fork": false,
"created_at": "2022-01-25T23:11:30Z",
"updated_at": "2022-01-28T11:21:52Z",
"updated_at": "2022-01-28T16:09:12Z",
"pushed_at": "2022-01-26T01:01:15Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 21,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,8 +26,8 @@
"exploit"
],
"visibility": "public",
"forks": 21,
"watchers": 37,
"forks": 23,
"watchers": 38,
"score": 0
},
{
@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-01-28T12:02:50Z",
"pushed_at": "2022-01-28T07:34:39Z",
"stargazers_count": 838,
"watchers_count": 838,
"forks_count": 255,
"updated_at": "2022-01-28T17:55:20Z",
"pushed_at": "2022-01-28T17:01:05Z",
"stargazers_count": 946,
"watchers_count": 946,
"forks_count": 269,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 255,
"watchers": 838,
"forks": 269,
"watchers": 946,
"score": 0
},
{
@ -154,11 +154,11 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-01-28T12:07:31Z",
"updated_at": "2022-01-28T17:41:46Z",
"pushed_at": "2022-01-28T01:27:52Z",
"stargazers_count": 541,
"watchers_count": 541,
"forks_count": 176,
"stargazers_count": 614,
"watchers_count": 614,
"forks_count": 190,
"allow_forking": true,
"is_template": false,
"topics": [
@ -167,8 +167,8 @@
"poc"
],
"visibility": "public",
"forks": 176,
"watchers": 541,
"forks": 190,
"watchers": 614,
"score": 0
},
{
@ -185,17 +185,17 @@
"description": "Bash implementation of CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T01:05:55Z",
"updated_at": "2022-01-28T05:54:32Z",
"updated_at": "2022-01-28T17:07:43Z",
"pushed_at": "2022-01-26T01:05:56Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0
},
{
@ -239,17 +239,17 @@
"description": "PoC for CVE-2021-4034 dubbed pwnkit",
"fork": false,
"created_at": "2022-01-26T01:34:44Z",
"updated_at": "2022-01-28T09:33:21Z",
"updated_at": "2022-01-28T17:27:32Z",
"pushed_at": "2022-01-27T15:13:51Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 22,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 60,
"forks": 24,
"watchers": 63,
"score": 0
},
{
@ -266,17 +266,17 @@
"description": "PoC for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T02:02:25Z",
"updated_at": "2022-01-28T10:40:07Z",
"updated_at": "2022-01-28T17:41:56Z",
"pushed_at": "2022-01-26T02:27:53Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 29,
"watchers": 31,
"score": 0
},
{
@ -320,10 +320,10 @@
"description": "CVE-2021-4034: Local Privilege Escalation in polkit's pkexec proof of concept",
"fork": false,
"created_at": "2022-01-26T03:20:18Z",
"updated_at": "2022-01-28T09:01:01Z",
"updated_at": "2022-01-28T16:11:20Z",
"pushed_at": "2022-01-26T16:22:46Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -337,7 +337,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 14,
"watchers": 13,
"score": 0
},
{
@ -354,17 +354,17 @@
"description": "Exploit for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T03:33:47Z",
"updated_at": "2022-01-28T08:19:28Z",
"updated_at": "2022-01-28T17:48:53Z",
"pushed_at": "2022-01-27T11:57:05Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 62,
"watchers": 65,
"score": 0
},
{
@ -902,19 +902,19 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-01-28T12:11:57Z",
"updated_at": "2022-01-28T18:11:49Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 38,
"stargazers_count": 260,
"watchers_count": 260,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-4034"
],
"visibility": "public",
"forks": 38,
"watchers": 207,
"forks": 44,
"watchers": 260,
"score": 0
},
{
@ -1228,17 +1228,17 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2022-01-28T10:44:58Z",
"updated_at": "2022-01-28T17:26:31Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"forks": 7,
"watchers": 15,
"score": 0
},
{
@ -1255,10 +1255,10 @@
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
"fork": false,
"created_at": "2022-01-26T18:01:26Z",
"updated_at": "2022-01-28T09:07:25Z",
"pushed_at": "2022-01-28T08:50:29Z",
"stargazers_count": 8,
"watchers_count": 8,
"updated_at": "2022-01-28T15:22:38Z",
"pushed_at": "2022-01-28T12:28:49Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -1281,7 +1281,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 10,
"score": 0
},
{
@ -1387,17 +1387,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-26T19:46:19Z",
"updated_at": "2022-01-26T19:46:57Z",
"updated_at": "2022-01-28T15:56:36Z",
"pushed_at": "2022-01-26T19:46:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -1442,7 +1442,7 @@
"fork": false,
"created_at": "2022-01-26T20:52:32Z",
"updated_at": "2022-01-27T11:47:03Z",
"pushed_at": "2022-01-28T01:59:25Z",
"pushed_at": "2022-01-28T16:58:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
@ -1780,10 +1780,10 @@
"description": "CVE-2021-4034 PoC , polkit < 0.131",
"fork": false,
"created_at": "2022-01-27T14:29:55Z",
"updated_at": "2022-01-27T14:57:21Z",
"updated_at": "2022-01-28T15:53:33Z",
"pushed_at": "2022-01-27T14:54:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1795,7 +1795,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -1900,12 +1900,12 @@
"pushed_at": "2022-01-27T18:32:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -1978,7 +1978,7 @@
"fork": false,
"created_at": "2022-01-28T03:58:34Z",
"updated_at": "2022-01-28T04:33:54Z",
"pushed_at": "2022-01-28T05:17:36Z",
"pushed_at": "2022-01-28T18:03:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -2004,10 +2004,10 @@
"description": "Exploit for the PwnKit vulnerability, CVE-2021-4034, written in Go",
"fork": false,
"created_at": "2022-01-28T04:24:20Z",
"updated_at": "2022-01-28T11:10:16Z",
"pushed_at": "2022-01-28T04:27:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2022-01-28T15:18:00Z",
"pushed_at": "2022-01-28T16:23:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -2018,7 +2018,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
},
{
@ -2074,5 +2074,248 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 453070166,
"name": "POC-CVE-2021-4034",
"full_name": "Yakumwamba\/POC-CVE-2021-4034",
"owner": {
"login": "Yakumwamba",
"id": 72974932,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72974932?v=4",
"html_url": "https:\/\/github.com\/Yakumwamba"
},
"html_url": "https:\/\/github.com\/Yakumwamba\/POC-CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2022-01-28T13:04:22Z",
"updated_at": "2022-01-28T16:04:16Z",
"pushed_at": "2022-01-28T16:10:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 453070905,
"name": "CVE-2021-4034",
"full_name": "Pr0f3ssor\/CVE-2021-4034",
"owner": {
"login": "Pr0f3ssor",
"id": 96302619,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96302619?v=4",
"html_url": "https:\/\/github.com\/Pr0f3ssor"
},
"html_url": "https:\/\/github.com\/Pr0f3ssor\/CVE-2021-4034",
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-28T13:06:45Z",
"updated_at": "2022-01-28T13:26:23Z",
"pushed_at": "2022-01-28T13:26:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 453080818,
"name": "CVE-2021-4034",
"full_name": "Sakura-nee\/CVE-2021-4034",
"owner": {
"login": "Sakura-nee",
"id": 74785477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4",
"html_url": "https:\/\/github.com\/Sakura-nee"
},
"html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-4034",
"description": "CVE-2021-4034",
"fork": false,
"created_at": "2022-01-28T13:38:24Z",
"updated_at": "2022-01-28T13:42:53Z",
"pushed_at": "2022-01-28T13:42:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 453085145,
"name": "pwnkit",
"full_name": "oreosec\/pwnkit",
"owner": {
"login": "oreosec",
"id": 40876702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40876702?v=4",
"html_url": "https:\/\/github.com\/oreosec"
},
"html_url": "https:\/\/github.com\/oreosec\/pwnkit",
"description": "CVE-2021-4034",
"fork": false,
"created_at": "2022-01-28T13:51:17Z",
"updated_at": "2022-01-28T15:05:03Z",
"pushed_at": "2022-01-28T13:59:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 453089649,
"name": "CVE-2021-4034-POC",
"full_name": "CYB3RK1D\/CVE-2021-4034-POC",
"owner": {
"login": "CYB3RK1D",
"id": 37270599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37270599?v=4",
"html_url": "https:\/\/github.com\/CYB3RK1D"
},
"html_url": "https:\/\/github.com\/CYB3RK1D\/CVE-2021-4034-POC",
"description": null,
"fork": false,
"created_at": "2022-01-28T14:04:58Z",
"updated_at": "2022-01-28T16:21:31Z",
"pushed_at": "2022-01-28T17:07:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 453113353,
"name": "CVE-2021-4034",
"full_name": "Rvn0xsy\/CVE-2021-4034",
"owner": {
"login": "Rvn0xsy",
"id": 19944759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19944759?v=4",
"html_url": "https:\/\/github.com\/Rvn0xsy"
},
"html_url": "https:\/\/github.com\/Rvn0xsy\/CVE-2021-4034",
"description": "CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-28T15:13:28Z",
"updated_at": "2022-01-28T18:07:33Z",
"pushed_at": "2022-01-28T15:37:41Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 453114485,
"name": "CVE-2021-4034",
"full_name": "Kirill89\/CVE-2021-4034",
"owner": {
"login": "Kirill89",
"id": 2003936,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2003936?v=4",
"html_url": "https:\/\/github.com\/Kirill89"
},
"html_url": "https:\/\/github.com\/Kirill89\/CVE-2021-4034",
"description": "pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034",
"fork": false,
"created_at": "2022-01-28T15:16:44Z",
"updated_at": "2022-01-28T15:17:50Z",
"pushed_at": "2022-01-28T15:17:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 453145579,
"name": "CVE-2021-4034",
"full_name": "qq224015\/CVE-2021-4034",
"owner": {
"login": "qq224015",
"id": 17867645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17867645?v=4",
"html_url": "https:\/\/github.com\/qq224015"
},
"html_url": "https:\/\/github.com\/qq224015\/CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2022-01-28T16:50:45Z",
"updated_at": "2022-01-28T16:50:45Z",
"pushed_at": "2022-01-28T16:50:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 453170577,
"name": "CVE-2021-4034",
"full_name": "n3onhacks\/CVE-2021-4034",
"owner": {
"login": "n3onhacks",
"id": 97998625,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97998625?v=4",
"html_url": "https:\/\/github.com\/n3onhacks"
},
"html_url": "https:\/\/github.com\/n3onhacks\/CVE-2021-4034",
"description": "BASH file, no download capabilties? Copy and paste it!",
"fork": false,
"created_at": "2022-01-28T18:12:54Z",
"updated_at": "2022-01-28T18:13:50Z",
"pushed_at": "2022-01-28T18:13:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,31 +1,4 @@
[
{
"id": 404270939,
"name": "CVE-2021-40444",
"full_name": "ozergoker\/CVE-2021-40444",
"owner": {
"login": "ozergoker",
"id": 86879266,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
"html_url": "https:\/\/github.com\/ozergoker"
},
"html_url": "https:\/\/github.com\/ozergoker\/CVE-2021-40444",
"description": "Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444",
"fork": false,
"created_at": "2021-09-08T08:32:40Z",
"updated_at": "2022-01-09T21:16:38Z",
"pushed_at": "2021-09-29T11:39:26Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 18,
"score": 0
},
{
"id": 405152543,
"name": "CVE-2021-40444",
@ -40,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-01-27T05:20:41Z",
"updated_at": "2022-01-28T16:52:30Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1353,
"watchers_count": 1353,
"stargazers_count": 1356,
"watchers_count": 1356,
"forks_count": 444,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 444,
"watchers": 1353,
"watchers": 1356,
"score": 0
},
{

View file

@ -1,29 +0,0 @@
[
{
"id": 411188978,
"name": "CVE-2021-41647",
"full_name": "MobiusBinary\/CVE-2021-41647",
"owner": {
"login": "MobiusBinary",
"id": 91082958,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
"html_url": "https:\/\/github.com\/MobiusBinary"
},
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41647",
"description": null,
"fork": false,
"created_at": "2021-09-28T07:59:21Z",
"updated_at": "2021-10-01T14:29:04Z",
"pushed_at": "2021-10-01T14:29:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 411945715,
"name": "CVE-2021-41648",
"full_name": "MobiusBinary\/CVE-2021-41648",
"owner": {
"login": "MobiusBinary",
"id": 91082958,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
"html_url": "https:\/\/github.com\/MobiusBinary"
},
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41648",
"description": null,
"fork": false,
"created_at": "2021-09-30T06:16:30Z",
"updated_at": "2021-10-01T13:50:36Z",
"pushed_at": "2021-10-01T13:50:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 411700383,
"name": "CVE-2021-41649",
"full_name": "MobiusBinary\/CVE-2021-41649",
"owner": {
"login": "MobiusBinary",
"id": 91082958,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
"html_url": "https:\/\/github.com\/MobiusBinary"
},
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41649",
"description": null,
"fork": false,
"created_at": "2021-09-29T14:09:34Z",
"updated_at": "2021-10-01T13:51:00Z",
"pushed_at": "2021-10-01T13:50:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1240,12 +1240,12 @@
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 119,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Prestashop >= 1.7.5.0 < 1.7.8.2 - SQL injection",
"fork": false,
"created_at": "2022-01-28T00:26:40Z",
"updated_at": "2022-01-28T00:26:40Z",
"updated_at": "2022-01-28T18:05:46Z",
"pushed_at": "2022-01-28T00:27:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2022-01-27T08:01:15Z",
"updated_at": "2022-01-28T12:19:08Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 332,
"watchers_count": 332,
"forks_count": 97,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 97,
"watchers": 333,
"watchers": 332,
"score": 0
},
{
@ -909,7 +909,7 @@
"pushed_at": "2022-01-22T14:55:02Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"forks_count": 311,
"forks_count": 312,
"allow_forking": true,
"is_template": false,
"topics": [
@ -919,7 +919,7 @@
"security"
],
"visibility": "public",
"forks": 311,
"forks": 312,
"watchers": 1200,
"score": 0
},
@ -1373,11 +1373,11 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-01-28T10:36:22Z",
"updated_at": "2022-01-28T15:08:00Z",
"pushed_at": "2022-01-27T11:10:09Z",
"stargazers_count": 752,
"watchers_count": 752,
"forks_count": 154,
"stargazers_count": 754,
"watchers_count": 754,
"forks_count": 155,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1395,8 +1395,8 @@
"scanner"
],
"visibility": "public",
"forks": 154,
"watchers": 752,
"forks": 155,
"watchers": 754,
"score": 0
},
{
@ -1888,10 +1888,10 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-01-28T09:46:38Z",
"updated_at": "2022-01-28T16:23:54Z",
"pushed_at": "2022-01-17T19:47:41Z",
"stargazers_count": 595,
"watchers_count": 595,
"stargazers_count": 597,
"watchers_count": 597,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
@ -1910,7 +1910,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 595,
"watchers": 597,
"score": 0
},
{
@ -3542,17 +3542,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-28T10:48:21Z",
"updated_at": "2022-01-28T17:04:51Z",
"pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2668,
"watchers_count": 2668,
"stargazers_count": 2669,
"watchers_count": 2669,
"forks_count": 641,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 641,
"watchers": 2668,
"watchers": 2669,
"score": 0
},
{
@ -6377,17 +6377,17 @@
"description": "An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.",
"fork": false,
"created_at": "2021-12-15T12:07:05Z",
"updated_at": "2022-01-27T14:52:15Z",
"updated_at": "2022-01-28T14:08:59Z",
"pushed_at": "2021-12-17T07:41:47Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 36,
"watchers": 37,
"score": 0
},
{
@ -8733,17 +8733,17 @@
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
"fork": false,
"created_at": "2021-12-20T15:22:50Z",
"updated_at": "2021-12-21T17:37:29Z",
"updated_at": "2022-01-28T12:44:13Z",
"pushed_at": "2021-12-21T17:37:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"forks": 3,
"watchers": 2,
"score": 0
},
{
@ -10603,5 +10603,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 452823928,
"name": "log4j-polkit-poc",
"full_name": "0xalwayslucky\/log4j-polkit-poc",
"owner": {
"login": "0xalwayslucky",
"id": 28390940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28390940?v=4",
"html_url": "https:\/\/github.com\/0xalwayslucky"
},
"html_url": "https:\/\/github.com\/0xalwayslucky\/log4j-polkit-poc",
"description": "vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034",
"fork": false,
"created_at": "2022-01-27T19:54:16Z",
"updated_at": "2022-01-28T15:09:55Z",
"pushed_at": "2022-01-28T15:08:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2022-01-28T11:17:13Z",
"updated_at": "2022-01-28T17:35:40Z",
"pushed_at": "2022-01-25T17:00:16Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 217,
"watchers_count": 217,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 214,
"watchers": 217,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-26T16:27:50Z",
"updated_at": "2022-01-26T16:33:02Z",
"updated_at": "2022-01-28T14:27:12Z",
"pushed_at": "2022-01-26T16:45:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-25T23:58:17Z",
"updated_at": "2022-01-28T08:33:20Z",
"updated_at": "2022-01-28T14:00:04Z",
"pushed_at": "2022-01-26T00:18:26Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2022-01-28T11:28:41Z",
"updated_at": "2022-01-28T16:39:07Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 37,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 80,
"forks": 38,
"watchers": 83,
"score": 0
}
]

View file

@ -80,17 +80,17 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-01-27T20:09:59Z",
"updated_at": "2022-01-28T13:14:11Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 89,
"watchers": 317,
"watchers": 318,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "TightVNC Vulnerability.",
"fork": false,
"created_at": "2022-01-26T18:49:43Z",
"updated_at": "2022-01-28T06:18:13Z",
"updated_at": "2022-01-28T17:24:52Z",
"pushed_at": "2022-01-26T18:53:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 9,
"score": 0
}
]

View file

@ -663,6 +663,15 @@ A vulnerability was found in the Linux kernel's KVM subsystem in arch/x86/kvm/la
- [jpmcb/pwnkit-go](https://github.com/jpmcb/pwnkit-go)
- [JoyGhoshs/CVE-2021-4034](https://github.com/JoyGhoshs/CVE-2021-4034)
- [galoget/PwnKit-CVE-2021-4034](https://github.com/galoget/PwnKit-CVE-2021-4034)
- [Yakumwamba/POC-CVE-2021-4034](https://github.com/Yakumwamba/POC-CVE-2021-4034)
- [Pr0f3ssor/CVE-2021-4034](https://github.com/Pr0f3ssor/CVE-2021-4034)
- [Sakura-nee/CVE-2021-4034](https://github.com/Sakura-nee/CVE-2021-4034)
- [oreosec/pwnkit](https://github.com/oreosec/pwnkit)
- [CYB3RK1D/CVE-2021-4034-POC](https://github.com/CYB3RK1D/CVE-2021-4034-POC)
- [Rvn0xsy/CVE-2021-4034](https://github.com/Rvn0xsy/CVE-2021-4034)
- [Kirill89/CVE-2021-4034](https://github.com/Kirill89/CVE-2021-4034)
- [qq224015/CVE-2021-4034](https://github.com/qq224015/CVE-2021-4034)
- [n3onhacks/CVE-2021-4034](https://github.com/n3onhacks/CVE-2021-4034)
### CVE-2021-4104 (2021-12-14)
@ -985,14 +994,6 @@ The vCenter Server contains an arbitrary file upload vulnerability in the Analyt
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
- [timb-machine-mirrors/CVE-2021-22005](https://github.com/timb-machine-mirrors/CVE-2021-22005)
### CVE-2021-22015 (2021-09-23)
<code>
The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.
</code>
- [PenteraIO/vScalation-CVE-2021-22015](https://github.com/PenteraIO/vScalation-CVE-2021-22015)
### CVE-2021-22053 (2021-11-19)
<code>
@ -1082,14 +1083,6 @@ When requests to the internal network for webhooks are enabled, a server-side re
- [antx-code/CVE-2021-22214](https://github.com/antx-code/CVE-2021-22214)
- [kh4sh3i/GitLab-SSRF-CVE-2021-22214](https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214)
### CVE-2021-22555 (2021-07-07)
<code>
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
</code>
- [daletoniris/CVE-2021-22555-esc-priv](https://github.com/daletoniris/CVE-2021-22555-esc-priv)
### CVE-2021-22569 (2022-01-07)
<code>
@ -1280,14 +1273,6 @@ The Formidable Form Builder WordPress plugin before 4.09.05 allows to inject cer
- [S1lkys/CVE-2021-24884](https://github.com/S1lkys/CVE-2021-24884)
### CVE-2021-25162 (2021-03-29)
<code>
A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
</code>
- [twentybel0w/CVE-2021-25162](https://github.com/twentybel0w/CVE-2021-25162)
### CVE-2021-25281 (2021-02-26)
<code>
@ -2370,21 +2355,12 @@ Telenot CompasX versions prior to 32.0 use a weak seed for random number generat
- [x41sec/CVE-2021-34600](https://github.com/x41sec/CVE-2021-34600)
### CVE-2021-34730 (2021-08-18)
<code>
A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of incoming UPnP traffic. An attacker could exploit this vulnerability by sending a crafted UPnP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition. Cisco has not released software updates that address this vulnerability.
</code>
- [badmonkey7/CVE-2021-34730](https://github.com/badmonkey7/CVE-2021-34730)
### CVE-2021-35211 (2021-07-14)
<code>
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
</code>
- [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211)
- [BishopFox/CVE-2021-35211](https://github.com/BishopFox/CVE-2021-35211)
### CVE-2021-35215 (2021-09-01)
@ -2573,7 +2549,6 @@ Open Management Infrastructure Remote Code Execution Vulnerability
</code>
- [corelight/CVE-2021-38647](https://github.com/corelight/CVE-2021-38647)
- [Vulnmachines/OMIGOD_cve-2021-38647](https://github.com/Vulnmachines/OMIGOD_cve-2021-38647)
### CVE-2021-38666 (2021-11-09)
@ -2670,7 +2645,6 @@ A crafted request uri-path can cause mod_proxy to forward the request to an orig
Microsoft MSHTML Remote Code Execution Vulnerability
</code>
- [ozergoker/CVE-2021-40444](https://github.com/ozergoker/CVE-2021-40444)
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
- [aslitsecurity/CVE-2021-40444_builders](https://github.com/aslitsecurity/CVE-2021-40444_builders)
- [klezVirus/CVE-2021-40444](https://github.com/klezVirus/CVE-2021-40444)
@ -2856,30 +2830,6 @@ Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Review
- [hax3xploit/CVE-2021-41646](https://github.com/hax3xploit/CVE-2021-41646)
### CVE-2021-41647 (2021-10-01)
<code>
An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable &quot;username&quot; parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
</code>
- [MobiusBinary/CVE-2021-41647](https://github.com/MobiusBinary/CVE-2021-41647)
### CVE-2021-41648 (2021-10-01)
<code>
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
</code>
- [MobiusBinary/CVE-2021-41648](https://github.com/MobiusBinary/CVE-2021-41648)
### CVE-2021-41649 (2021-10-01)
<code>
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
</code>
- [MobiusBinary/CVE-2021-41649](https://github.com/MobiusBinary/CVE-2021-41649)
### CVE-2021-41651 (2021-10-04)
<code>
@ -3850,6 +3800,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [semelnyk/CVE-2021-44228-ScannersListFromRF](https://github.com/semelnyk/CVE-2021-44228-ScannersListFromRF)
- [ThanhHien98/Log4j](https://github.com/ThanhHien98/Log4j)
- [ThanhHien98/CVE-2021-44228](https://github.com/ThanhHien98/CVE-2021-44228)
- [0xalwayslucky/log4j-polkit-poc](https://github.com/0xalwayslucky/log4j-polkit-poc)
### CVE-2021-44270
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)