Auto Update 2021/12/13 06:13:24

This commit is contained in:
motikan2010-bot 2021-12-13 15:13:24 +09:00
parent 57c1ff2234
commit e029fc6316
37 changed files with 705 additions and 369 deletions

View file

@ -13,17 +13,17 @@
"description": "CVE-2013-6117",
"fork": false,
"created_at": "2018-07-23T14:56:03Z",
"updated_at": "2021-07-01T10:57:40Z",
"updated_at": "2021-12-13T01:13:28Z",
"pushed_at": "2018-07-23T18:16:34Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-12T13:33:21Z",
"updated_at": "2021-12-13T03:08:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1235,
"watchers_count": 1235,
"stargazers_count": 1236,
"watchers_count": 1236,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1235,
"watchers": 1236,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-12T13:33:21Z",
"updated_at": "2021-12-13T03:08:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1235,
"watchers_count": 1235,
"stargazers_count": 1236,
"watchers_count": 1236,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1235,
"watchers": 1236,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Test and exploit for CVE-2017-12542",
"fork": false,
"created_at": "2018-02-05T18:55:56Z",
"updated_at": "2021-11-12T03:53:16Z",
"updated_at": "2021-12-13T01:19:01Z",
"pushed_at": "2018-04-15T12:01:38Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 78,
"watchers": 79,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-12T13:33:21Z",
"updated_at": "2021-12-13T03:08:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1235,
"watchers_count": 1235,
"stargazers_count": 1236,
"watchers_count": 1236,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1235,
"watchers": 1236,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
"fork": false,
"created_at": "2017-08-04T01:12:47Z",
"updated_at": "2021-12-12T10:17:02Z",
"updated_at": "2021-12-13T01:56:19Z",
"pushed_at": "2018-11-18T11:14:20Z",
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 30,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 87,
"forks": 31,
"watchers": 88,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-12T13:33:21Z",
"updated_at": "2021-12-13T03:08:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1235,
"watchers_count": 1235,
"stargazers_count": 1236,
"watchers_count": 1236,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1235,
"watchers": 1236,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2021-12-07T19:36:37Z",
"updated_at": "2021-12-13T01:19:38Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1693,
"watchers_count": 1693,
"stargazers_count": 1694,
"watchers_count": 1694,
"forks_count": 254,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 254,
"watchers": 1693,
"watchers": 1694,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2021-11-18T09:28:53Z",
"updated_at": "2021-12-13T05:29:36Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 65,
"watchers": 211,
"watchers": 212,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-12T14:54:13Z",
"updated_at": "2021-12-13T03:29:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3038,
"watchers_count": 3038,
"stargazers_count": 3039,
"watchers_count": 3039,
"forks_count": 900,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 900,
"watchers": 3038,
"watchers": 3039,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-12T13:33:21Z",
"updated_at": "2021-12-13T03:08:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1235,
"watchers_count": 1235,
"stargazers_count": 1236,
"watchers_count": 1236,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1235,
"watchers": 1236,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-12-08T12:43:26Z",
"updated_at": "2021-12-13T05:29:34Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 294,
"watchers_count": 294,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
@ -138,7 +138,7 @@
],
"visibility": "public",
"forks": 50,
"watchers": 293,
"watchers": 294,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-12T14:54:13Z",
"updated_at": "2021-12-13T03:29:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3038,
"watchers_count": 3038,
"stargazers_count": 3039,
"watchers_count": 3039,
"forks_count": 900,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 900,
"watchers": 3038,
"watchers": 3039,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-12T13:33:21Z",
"updated_at": "2021-12-13T03:08:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1235,
"watchers_count": 1235,
"stargazers_count": 1236,
"watchers_count": 1236,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1235,
"watchers": 1236,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-07-25T05:28:51Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 10,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-5837 exploit",
"fork": false,
"created_at": "2020-04-16T08:15:18Z",
"updated_at": "2021-12-12T22:38:57Z",
"updated_at": "2021-12-13T03:15:05Z",
"pushed_at": "2020-05-13T09:45:12Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 33,
"watchers": 35,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-03-26T01:34:38Z",
"updated_at": "2021-02-18T03:16:04Z",
"updated_at": "2021-12-13T02:47:54Z",
"pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 108,
"watchers": 109,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2021-12-10T01:15:37Z",
"updated_at": "2021-12-13T06:09:29Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 37,
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 207,
"forks": 38,
"watchers": 208,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN.",
"fork": false,
"created_at": "2021-07-29T12:17:50Z",
"updated_at": "2021-12-09T23:37:53Z",
"updated_at": "2021-12-13T04:36:46Z",
"pushed_at": "2021-08-02T16:14:44Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-12-12T06:37:59Z",
"updated_at": "2021-12-13T02:26:20Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1474,
"watchers_count": 1474,
"stargazers_count": 1476,
"watchers_count": 1476,
"forks_count": 544,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 544,
"watchers": 1474,
"watchers": 1476,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-19T01:08:48Z",
"updated_at": "2021-10-20T10:41:57Z",
"updated_at": "2021-12-13T03:39:02Z",
"pushed_at": "2021-10-19T01:18:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE 2021-21315 PoC",
"fork": false,
"created_at": "2021-03-01T18:52:41Z",
"updated_at": "2021-12-02T05:28:28Z",
"updated_at": "2021-12-13T01:10:06Z",
"pushed_at": "2021-06-09T13:27:20Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 136,
"watchers": 137,
"score": 0
},
{

View file

@ -84,10 +84,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-12-12T10:17:50Z",
"updated_at": "2021-12-13T03:09:44Z",
"pushed_at": "2021-12-12T10:17:47Z",
"stargazers_count": 327,
"watchers_count": 327,
"stargazers_count": 328,
"watchers_count": 328,
"forks_count": 125,
"allow_forking": true,
"is_template": false,
@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 125,
"watchers": 327,
"watchers": 328,
"score": 0
},
{

View file

@ -128,17 +128,17 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-12-10T06:40:46Z",
"updated_at": "2021-12-13T02:44:03Z",
"pushed_at": "2021-06-09T10:13:56Z",
"stargazers_count": 291,
"watchers_count": 291,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 291,
"watchers": 292,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 167,
"score": 0
},
@ -449,10 +449,10 @@
"description": "CVE-2021-22205 on Docker",
"fork": false,
"created_at": "2021-11-10T13:57:55Z",
"updated_at": "2021-12-10T07:55:00Z",
"updated_at": "2021-12-13T05:14:50Z",
"pushed_at": "2021-12-10T07:54:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -466,7 +466,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -179,18 +179,18 @@
"description": "Apache Druid remote code execution vulnerability - Apache Druid 远程代码执行漏洞利用",
"fork": false,
"created_at": "2021-12-12T14:40:12Z",
"updated_at": "2021-12-12T17:43:32Z",
"updated_at": "2021-12-13T02:27:48Z",
"pushed_at": "2021-12-12T14:55:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-25646"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "PoC of FortiWAN auth bypass (https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-048)",
"fork": false,
"created_at": "2021-12-09T12:55:30Z",
"updated_at": "2021-12-09T12:59:21Z",
"updated_at": "2021-12-13T05:07:49Z",
"pushed_at": "2021-12-09T12:59:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -765,17 +765,17 @@
"description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.",
"fork": false,
"created_at": "2021-03-16T07:31:25Z",
"updated_at": "2021-12-06T16:38:42Z",
"updated_at": "2021-12-13T04:20:31Z",
"pushed_at": "2021-05-01T17:20:15Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-04-27T03:55:38Z",
"updated_at": "2021-07-13T04:26:52Z",
"updated_at": "2021-12-13T03:33:48Z",
"pushed_at": "2021-04-26T14:23:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -41,15 +41,15 @@
"fork": false,
"created_at": "2021-09-28T06:27:49Z",
"updated_at": "2021-11-13T08:06:42Z",
"pushed_at": "2021-09-29T06:15:17Z",
"pushed_at": "2021-12-13T06:02:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 2,
"score": 0
}

View file

@ -1990,7 +1990,7 @@
"description": "CVE-2021-41773 on Docker",
"fork": false,
"created_at": "2021-11-09T05:13:17Z",
"updated_at": "2021-11-25T09:54:45Z",
"updated_at": "2021-12-13T05:21:19Z",
"pushed_at": "2021-11-25T09:54:42Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -259,10 +259,10 @@
"description": "CVE-2021-41773 on Docker",
"fork": false,
"created_at": "2021-11-25T09:07:00Z",
"updated_at": "2021-11-25T09:55:28Z",
"updated_at": "2021-12-13T05:52:38Z",
"pushed_at": "2021-11-25T09:52:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -276,7 +276,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2021-12-13T00:02:28Z",
"updated_at": "2021-12-13T06:09:24Z",
"pushed_at": "2021-12-11T15:43:11Z",
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 19,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 19,
"watchers": 123,
"forks": 34,
"watchers": 179,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2021-12-13T00:08:20Z",
"updated_at": "2021-12-13T06:10:59Z",
"pushed_at": "2021-12-12T10:50:54Z",
"stargazers_count": 438,
"watchers_count": 438,
"forks_count": 94,
"stargazers_count": 591,
"watchers_count": 591,
"forks_count": 142,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 94,
"watchers": 438,
"forks": 142,
"watchers": 591,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2021-12-12T23:41:59Z",
"updated_at": "2021-12-13T04:26:57Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 213,
"watchers_count": 213,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 209,
"watchers": 213,
"score": 0
},
{
@ -484,17 +484,17 @@
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
"fork": false,
"created_at": "2021-12-11T18:49:30Z",
"updated_at": "2021-12-12T23:15:31Z",
"updated_at": "2021-12-13T01:26:18Z",
"pushed_at": "2021-12-11T19:10:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

File diff suppressed because it is too large Load diff

View file

@ -3727,7 +3727,7 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
- [StandB/CVE-2021-44228-poc](https://github.com/StandB/CVE-2021-44228-poc)
- [seamus-dev/CVE-2021-44228](https://github.com/seamus-dev/CVE-2021-44228)
- [takito1812/log4j-detect](https://github.com/takito1812/log4j-detect)
- [alerithe/log4j-patcher](https://github.com/alerithe/log4j-patcher)
- [alerithe/log4noshell](https://github.com/alerithe/log4noshell)
- [Azeemering/CVE-2021-44228-DFIR-Notes](https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes)
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
@ -3806,6 +3806,17 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
- [dotPY-hax/log4py](https://github.com/dotPY-hax/log4py)
- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC)
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
- [lwsnz/log4j-win-quick](https://github.com/lwsnz/log4j-win-quick)
- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan)
- [rubo77/log4j_checker_beta](https://github.com/rubo77/log4j_checker_beta)
- [ahmad4fifz-dev/CVE-2021-44228](https://github.com/ahmad4fifz-dev/CVE-2021-44228)
## 2020