mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/12/13 06:13:24
This commit is contained in:
parent
57c1ff2234
commit
e029fc6316
37 changed files with 705 additions and 369 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2013-6117",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-23T14:56:03Z",
|
||||
"updated_at": "2021-07-01T10:57:40Z",
|
||||
"updated_at": "2021-12-13T01:13:28Z",
|
||||
"pushed_at": "2018-07-23T18:16:34Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-12T13:33:21Z",
|
||||
"updated_at": "2021-12-13T03:08:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1235,
|
||||
"watchers_count": 1235,
|
||||
"stargazers_count": 1236,
|
||||
"watchers_count": 1236,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1235,
|
||||
"watchers": 1236,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-12T13:33:21Z",
|
||||
"updated_at": "2021-12-13T03:08:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1235,
|
||||
"watchers_count": 1235,
|
||||
"stargazers_count": 1236,
|
||||
"watchers_count": 1236,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1235,
|
||||
"watchers": 1236,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Test and exploit for CVE-2017-12542",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-05T18:55:56Z",
|
||||
"updated_at": "2021-11-12T03:53:16Z",
|
||||
"updated_at": "2021-12-13T01:19:01Z",
|
||||
"pushed_at": "2018-04-15T12:01:38Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-12T13:33:21Z",
|
||||
"updated_at": "2021-12-13T03:08:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1235,
|
||||
"watchers_count": 1235,
|
||||
"stargazers_count": 1236,
|
||||
"watchers_count": 1236,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1235,
|
||||
"watchers": 1236,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-04T01:12:47Z",
|
||||
"updated_at": "2021-12-12T10:17:02Z",
|
||||
"updated_at": "2021-12-13T01:56:19Z",
|
||||
"pushed_at": "2018-11-18T11:14:20Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 30,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 87,
|
||||
"forks": 31,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-12T13:33:21Z",
|
||||
"updated_at": "2021-12-13T03:08:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1235,
|
||||
"watchers_count": 1235,
|
||||
"stargazers_count": 1236,
|
||||
"watchers_count": 1236,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1235,
|
||||
"watchers": 1236,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-12-07T19:36:37Z",
|
||||
"updated_at": "2021-12-13T01:19:38Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1693,
|
||||
"watchers_count": 1693,
|
||||
"stargazers_count": 1694,
|
||||
"watchers_count": 1694,
|
||||
"forks_count": 254,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 254,
|
||||
"watchers": 1693,
|
||||
"watchers": 1694,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T10:12:44Z",
|
||||
"updated_at": "2021-11-18T09:28:53Z",
|
||||
"updated_at": "2021-12-13T05:29:36Z",
|
||||
"pushed_at": "2019-02-08T12:38:05Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 211,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-12T14:54:13Z",
|
||||
"updated_at": "2021-12-13T03:29:39Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3038,
|
||||
"watchers_count": 3038,
|
||||
"stargazers_count": 3039,
|
||||
"watchers_count": 3039,
|
||||
"forks_count": 900,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 900,
|
||||
"watchers": 3038,
|
||||
"watchers": 3039,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-12T13:33:21Z",
|
||||
"updated_at": "2021-12-13T03:08:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1235,
|
||||
"watchers_count": 1235,
|
||||
"stargazers_count": 1236,
|
||||
"watchers_count": 1236,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1235,
|
||||
"watchers": 1236,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2021-12-08T12:43:26Z",
|
||||
"updated_at": "2021-12-13T05:29:34Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -138,7 +138,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 293,
|
||||
"watchers": 294,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-12T14:54:13Z",
|
||||
"updated_at": "2021-12-13T03:29:39Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3038,
|
||||
"watchers_count": 3038,
|
||||
"stargazers_count": 3039,
|
||||
"watchers_count": 3039,
|
||||
"forks_count": 900,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 900,
|
||||
"watchers": 3038,
|
||||
"watchers": 3039,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-12T13:33:21Z",
|
||||
"updated_at": "2021-12-13T03:08:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1235,
|
||||
"watchers_count": 1235,
|
||||
"stargazers_count": 1236,
|
||||
"watchers_count": 1236,
|
||||
"forks_count": 276,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 276,
|
||||
"watchers": 1235,
|
||||
"watchers": 1236,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-07-25T05:28:51Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-5837 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T08:15:18Z",
|
||||
"updated_at": "2021-12-12T22:38:57Z",
|
||||
"updated_at": "2021-12-13T03:15:05Z",
|
||||
"pushed_at": "2020-05-13T09:45:12Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 33,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-26T01:34:38Z",
|
||||
"updated_at": "2021-02-18T03:16:04Z",
|
||||
"updated_at": "2021-12-13T02:47:54Z",
|
||||
"pushed_at": "2020-04-14T12:31:19Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2021-12-10T01:15:37Z",
|
||||
"updated_at": "2021-12-13T06:09:29Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 37,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 207,
|
||||
"forks": 38,
|
||||
"watchers": 208,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN.",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T12:17:50Z",
|
||||
"updated_at": "2021-12-09T23:37:53Z",
|
||||
"updated_at": "2021-12-13T04:36:46Z",
|
||||
"pushed_at": "2021-08-02T16:14:44Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-12-12T06:37:59Z",
|
||||
"updated_at": "2021-12-13T02:26:20Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1474,
|
||||
"watchers_count": 1474,
|
||||
"stargazers_count": 1476,
|
||||
"watchers_count": 1476,
|
||||
"forks_count": 544,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 544,
|
||||
"watchers": 1474,
|
||||
"watchers": 1476,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-19T01:08:48Z",
|
||||
"updated_at": "2021-10-20T10:41:57Z",
|
||||
"updated_at": "2021-12-13T03:39:02Z",
|
||||
"pushed_at": "2021-10-19T01:18:49Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE 2021-21315 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T18:52:41Z",
|
||||
"updated_at": "2021-12-02T05:28:28Z",
|
||||
"updated_at": "2021-12-13T01:10:06Z",
|
||||
"pushed_at": "2021-06-09T13:27:20Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 136,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -84,10 +84,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-12-12T10:17:50Z",
|
||||
"updated_at": "2021-12-13T03:09:44Z",
|
||||
"pushed_at": "2021-12-12T10:17:47Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -96,7 +96,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 327,
|
||||
"watchers": 328,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,17 +128,17 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-12-10T06:40:46Z",
|
||||
"updated_at": "2021-12-13T02:44:03Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 291,
|
||||
"watchers": 292,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 167,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -449,10 +449,10 @@
|
|||
"description": "CVE-2021-22205 on Docker",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-10T13:57:55Z",
|
||||
"updated_at": "2021-12-10T07:55:00Z",
|
||||
"updated_at": "2021-12-13T05:14:50Z",
|
||||
"pushed_at": "2021-12-10T07:54:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -466,7 +466,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -179,18 +179,18 @@
|
|||
"description": "Apache Druid remote code execution vulnerability - Apache Druid 远程代码执行漏洞利用",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T14:40:12Z",
|
||||
"updated_at": "2021-12-12T17:43:32Z",
|
||||
"updated_at": "2021-12-13T02:27:48Z",
|
||||
"pushed_at": "2021-12-12T14:55:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-25646"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC of FortiWAN auth bypass (https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-048)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T12:55:30Z",
|
||||
"updated_at": "2021-12-09T12:59:21Z",
|
||||
"updated_at": "2021-12-13T05:07:49Z",
|
||||
"pushed_at": "2021-12-09T12:59:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -765,17 +765,17 @@
|
|||
"description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T07:31:25Z",
|
||||
"updated_at": "2021-12-06T16:38:42Z",
|
||||
"updated_at": "2021-12-13T04:20:31Z",
|
||||
"pushed_at": "2021-05-01T17:20:15Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-27T03:55:38Z",
|
||||
"updated_at": "2021-07-13T04:26:52Z",
|
||||
"updated_at": "2021-12-13T03:33:48Z",
|
||||
"pushed_at": "2021-04-26T14:23:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,15 +41,15 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-09-28T06:27:49Z",
|
||||
"updated_at": "2021-11-13T08:06:42Z",
|
||||
"pushed_at": "2021-09-29T06:15:17Z",
|
||||
"pushed_at": "2021-12-13T06:02:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 22,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 23,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1990,7 +1990,7 @@
|
|||
"description": "CVE-2021-41773 on Docker",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-09T05:13:17Z",
|
||||
"updated_at": "2021-11-25T09:54:45Z",
|
||||
"updated_at": "2021-12-13T05:21:19Z",
|
||||
"pushed_at": "2021-11-25T09:54:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -259,10 +259,10 @@
|
|||
"description": "CVE-2021-41773 on Docker",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-25T09:07:00Z",
|
||||
"updated_at": "2021-11-25T09:55:28Z",
|
||||
"updated_at": "2021-12-13T05:52:38Z",
|
||||
"pushed_at": "2021-11-25T09:52:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -276,7 +276,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2021-12-13T00:02:28Z",
|
||||
"updated_at": "2021-12-13T06:09:24Z",
|
||||
"pushed_at": "2021-12-11T15:43:11Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 19,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,8 +27,8 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 123,
|
||||
"forks": 34,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2021-12-13T00:08:20Z",
|
||||
"updated_at": "2021-12-13T06:10:59Z",
|
||||
"pushed_at": "2021-12-12T10:50:54Z",
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"forks_count": 94,
|
||||
"stargazers_count": 591,
|
||||
"watchers_count": 591,
|
||||
"forks_count": 142,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 438,
|
||||
"forks": 142,
|
||||
"watchers": 591,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2021-12-12T23:41:59Z",
|
||||
"updated_at": "2021-12-13T04:26:57Z",
|
||||
"pushed_at": "2021-12-09T03:16:21Z",
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 209,
|
||||
"watchers": 213,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -484,17 +484,17 @@
|
|||
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T18:49:30Z",
|
||||
"updated_at": "2021-12-12T23:15:31Z",
|
||||
"updated_at": "2021-12-13T01:26:18Z",
|
||||
"pushed_at": "2021-12-11T19:10:03Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
File diff suppressed because it is too large
Load diff
13
README.md
13
README.md
|
@ -3727,7 +3727,7 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
|
|||
- [StandB/CVE-2021-44228-poc](https://github.com/StandB/CVE-2021-44228-poc)
|
||||
- [seamus-dev/CVE-2021-44228](https://github.com/seamus-dev/CVE-2021-44228)
|
||||
- [takito1812/log4j-detect](https://github.com/takito1812/log4j-detect)
|
||||
- [alerithe/log4j-patcher](https://github.com/alerithe/log4j-patcher)
|
||||
- [alerithe/log4noshell](https://github.com/alerithe/log4noshell)
|
||||
- [Azeemering/CVE-2021-44228-DFIR-Notes](https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes)
|
||||
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
|
||||
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
|
||||
|
@ -3806,6 +3806,17 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
|
|||
- [dotPY-hax/log4py](https://github.com/dotPY-hax/log4py)
|
||||
- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC)
|
||||
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
|
||||
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
|
||||
- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
|
||||
- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
|
||||
- [lwsnz/log4j-win-quick](https://github.com/lwsnz/log4j-win-quick)
|
||||
- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
|
||||
- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
|
||||
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
|
||||
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
|
||||
- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan)
|
||||
- [rubo77/log4j_checker_beta](https://github.com/rubo77/log4j_checker_beta)
|
||||
- [ahmad4fifz-dev/CVE-2021-44228](https://github.com/ahmad4fifz-dev/CVE-2021-44228)
|
||||
|
||||
|
||||
## 2020
|
||||
|
|
Loading…
Reference in a new issue