From e029fc631613a0485ef6418f17097cc47424f209 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 13 Dec 2021 15:13:24 +0900 Subject: [PATCH] Auto Update 2021/12/13 06:13:24 --- 2013/CVE-2013-6117.json | 8 +- 2014/CVE-2014-4210.json | 8 +- 2016/CVE-2016-0638.json | 8 +- 2017/CVE-2017-12542.json | 8 +- 2017/CVE-2017-3248.json | 8 +- 2017/CVE-2017-5645.json | 12 +- 2018/CVE-2018-2628.json | 8 +- 2019/CVE-2019-11043.json | 8 +- 2019/CVE-2019-1652.json | 8 +- 2019/CVE-2019-17558.json | 8 +- 2019/CVE-2019-2618.json | 8 +- 2020/CVE-2020-1472.json | 8 +- 2020/CVE-2020-14882.json | 8 +- 2020/CVE-2020-2551.json | 8 +- 2020/CVE-2020-35846.json | 4 +- 2020/CVE-2020-5837.json | 8 +- 2020/CVE-2020-7961.json | 8 +- 2020/CVE-2020-9484.json | 12 +- 2021/CVE-2021-1480.json | 8 +- 2021/CVE-2021-1675.json | 8 +- 2021/CVE-2021-21234.json | 8 +- 2021/CVE-2021-21315.json | 8 +- 2021/CVE-2021-21972.json | 8 +- 2021/CVE-2021-21985.json | 8 +- 2021/CVE-2021-22205.json | 12 +- 2021/CVE-2021-25646.json | 6 +- 2021/CVE-2021-26102.json | 8 +- 2021/CVE-2021-26855.json | 8 +- 2021/CVE-2021-26868.json | 12 +- 2021/CVE-2021-30632.json | 6 +- 2021/CVE-2021-41773.json | 2 +- 2021/CVE-2021-42013.json | 8 +- 2021/CVE-2021-42278.json | 12 +- 2021/CVE-2021-42287.json | 12 +- 2021/CVE-2021-43798.json | 16 +- 2021/CVE-2021-44228.json | 763 ++++++++++++++++++++++++++++----------- README.md | 13 +- 37 files changed, 705 insertions(+), 369 deletions(-) diff --git a/2013/CVE-2013-6117.json b/2013/CVE-2013-6117.json index bd4579a959..5a67ef5590 100644 --- a/2013/CVE-2013-6117.json +++ b/2013/CVE-2013-6117.json @@ -13,17 +13,17 @@ "description": "CVE-2013-6117", "fork": false, "created_at": "2018-07-23T14:56:03Z", - "updated_at": "2021-07-01T10:57:40Z", + "updated_at": "2021-12-13T01:13:28Z", "pushed_at": "2018-07-23T18:16:34Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 86f72aea28..484acfd1da 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-12T13:33:21Z", + "updated_at": "2021-12-13T03:08:16Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1235, - "watchers_count": 1235, + "stargazers_count": 1236, + "watchers_count": 1236, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1235, + "watchers": 1236, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 3379533236..44abdb0f7c 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-12T13:33:21Z", + "updated_at": "2021-12-13T03:08:16Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1235, - "watchers_count": 1235, + "stargazers_count": 1236, + "watchers_count": 1236, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1235, + "watchers": 1236, "score": 0 }, { diff --git a/2017/CVE-2017-12542.json b/2017/CVE-2017-12542.json index 3e4eabb524..bf24b85456 100644 --- a/2017/CVE-2017-12542.json +++ b/2017/CVE-2017-12542.json @@ -13,17 +13,17 @@ "description": "Test and exploit for CVE-2017-12542", "fork": false, "created_at": "2018-02-05T18:55:56Z", - "updated_at": "2021-11-12T03:53:16Z", + "updated_at": "2021-12-13T01:19:01Z", "pushed_at": "2018-04-15T12:01:38Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "forks_count": 31, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 31, - "watchers": 78, + "watchers": 79, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 862d63caf0..10175b5ddc 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-12T13:33:21Z", + "updated_at": "2021-12-13T03:08:16Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1235, - "watchers_count": 1235, + "stargazers_count": 1236, + "watchers_count": 1236, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1235, + "watchers": 1236, "score": 0 }, { diff --git a/2017/CVE-2017-5645.json b/2017/CVE-2017-5645.json index 06c67a8804..3b53c2c5c5 100644 --- a/2017/CVE-2017-5645.json +++ b/2017/CVE-2017-5645.json @@ -13,17 +13,17 @@ "description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization", "fork": false, "created_at": "2017-08-04T01:12:47Z", - "updated_at": "2021-12-12T10:17:02Z", + "updated_at": "2021-12-13T01:56:19Z", "pushed_at": "2018-11-18T11:14:20Z", - "stargazers_count": 87, - "watchers_count": 87, - "forks_count": 30, + "stargazers_count": 88, + "watchers_count": 88, + "forks_count": 31, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 30, - "watchers": 87, + "forks": 31, + "watchers": 88, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 1c8810ed69..58b54b2a0e 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-12T13:33:21Z", + "updated_at": "2021-12-13T03:08:16Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1235, - "watchers_count": 1235, + "stargazers_count": 1236, + "watchers_count": 1236, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1235, + "watchers": 1236, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index e122770424..449d3ef8ed 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2021-12-07T19:36:37Z", + "updated_at": "2021-12-13T01:19:38Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1693, - "watchers_count": 1693, + "stargazers_count": 1694, + "watchers_count": 1694, "forks_count": 254, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 254, - "watchers": 1693, + "watchers": 1694, "score": 0 }, { diff --git a/2019/CVE-2019-1652.json b/2019/CVE-2019-1652.json index 1f9d4ff5ac..ba3db299e6 100644 --- a/2019/CVE-2019-1652.json +++ b/2019/CVE-2019-1652.json @@ -13,10 +13,10 @@ "description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!", "fork": false, "created_at": "2019-01-24T10:12:44Z", - "updated_at": "2021-11-18T09:28:53Z", + "updated_at": "2021-12-13T05:29:36Z", "pushed_at": "2019-02-08T12:38:05Z", - "stargazers_count": 211, - "watchers_count": 211, + "stargazers_count": 212, + "watchers_count": 212, "forks_count": 65, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 65, - "watchers": 211, + "watchers": 212, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 74fe065452..c207b897b1 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,10 +40,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-12-12T14:54:13Z", + "updated_at": "2021-12-13T03:29:39Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3038, - "watchers_count": 3038, + "stargazers_count": 3039, + "watchers_count": 3039, "forks_count": 900, "allow_forking": true, "is_template": false, @@ -70,7 +70,7 @@ ], "visibility": "public", "forks": 900, - "watchers": 3038, + "watchers": 3039, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 4120e925e3..0e1fb1b844 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-12T13:33:21Z", + "updated_at": "2021-12-13T03:08:16Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1235, - "watchers_count": 1235, + "stargazers_count": 1236, + "watchers_count": 1236, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1235, + "watchers": 1236, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index c3557d1db6..4b3eba4716 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -121,10 +121,10 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2021-12-08T12:43:26Z", + "updated_at": "2021-12-13T05:29:34Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 293, - "watchers_count": 293, + "stargazers_count": 294, + "watchers_count": 294, "forks_count": 50, "allow_forking": true, "is_template": false, @@ -138,7 +138,7 @@ ], "visibility": "public", "forks": 50, - "watchers": 293, + "watchers": 294, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 4e261c35a4..ac2bc134e0 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-12-12T14:54:13Z", + "updated_at": "2021-12-13T03:29:39Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3038, - "watchers_count": 3038, + "stargazers_count": 3039, + "watchers_count": 3039, "forks_count": 900, "allow_forking": true, "is_template": false, @@ -43,7 +43,7 @@ ], "visibility": "public", "forks": 900, - "watchers": 3038, + "watchers": 3039, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 451bafa11d..7e522c194f 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-12-12T13:33:21Z", + "updated_at": "2021-12-13T03:08:16Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1235, - "watchers_count": 1235, + "stargazers_count": 1236, + "watchers_count": 1236, "forks_count": 276, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 276, - "watchers": 1235, + "watchers": 1236, "score": 0 }, { diff --git a/2020/CVE-2020-35846.json b/2020/CVE-2020-35846.json index eafe92e5d4..871c173c1b 100644 --- a/2020/CVE-2020-35846.json +++ b/2020/CVE-2020-35846.json @@ -17,12 +17,12 @@ "pushed_at": "2021-07-25T05:28:51Z", "stargazers_count": 10, "watchers_count": 10, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 10, "score": 0 }, diff --git a/2020/CVE-2020-5837.json b/2020/CVE-2020-5837.json index 654031fa11..61d8db3e90 100644 --- a/2020/CVE-2020-5837.json +++ b/2020/CVE-2020-5837.json @@ -13,17 +13,17 @@ "description": "CVE-2020-5837 exploit", "fork": false, "created_at": "2020-04-16T08:15:18Z", - "updated_at": "2021-12-12T22:38:57Z", + "updated_at": "2021-12-13T03:15:05Z", "pushed_at": "2020-05-13T09:45:12Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 35, + "watchers_count": 35, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, - "watchers": 33, + "watchers": 35, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7961.json b/2020/CVE-2020-7961.json index 0bf6ee292e..cd6aa1698c 100644 --- a/2020/CVE-2020-7961.json +++ b/2020/CVE-2020-7961.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2020-03-26T01:34:38Z", - "updated_at": "2021-02-18T03:16:04Z", + "updated_at": "2021-12-13T02:47:54Z", "pushed_at": "2020-04-14T12:31:19Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "forks_count": 45, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 45, - "watchers": 108, + "watchers": 109, "score": 0 }, { diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index 7cb8a9d18b..cfad4b2940 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -13,17 +13,17 @@ "description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!", "fork": false, "created_at": "2020-05-19T05:12:53Z", - "updated_at": "2021-12-10T01:15:37Z", + "updated_at": "2021-12-13T06:09:29Z", "pushed_at": "2020-05-19T05:13:19Z", - "stargazers_count": 207, - "watchers_count": 207, - "forks_count": 37, + "stargazers_count": 208, + "watchers_count": 208, + "forks_count": 38, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 37, - "watchers": 207, + "forks": 38, + "watchers": 208, "score": 0 }, { diff --git a/2021/CVE-2021-1480.json b/2021/CVE-2021-1480.json index 11ac0d7a15..2b8a97d880 100644 --- a/2021/CVE-2021-1480.json +++ b/2021/CVE-2021-1480.json @@ -13,17 +13,17 @@ "description": "PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN.", "fork": false, "created_at": "2021-07-29T12:17:50Z", - "updated_at": "2021-12-09T23:37:53Z", + "updated_at": "2021-12-13T04:36:46Z", "pushed_at": "2021-08-02T16:14:44Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 5, + "watchers": 6, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 15dbeb020b..1091603a70 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -40,17 +40,17 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2021-12-12T06:37:59Z", + "updated_at": "2021-12-13T02:26:20Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1474, - "watchers_count": 1474, + "stargazers_count": 1476, + "watchers_count": 1476, "forks_count": 544, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 544, - "watchers": 1474, + "watchers": 1476, "score": 0 }, { diff --git a/2021/CVE-2021-21234.json b/2021/CVE-2021-21234.json index ee1c895a5e..550e833913 100644 --- a/2021/CVE-2021-21234.json +++ b/2021/CVE-2021-21234.json @@ -40,17 +40,17 @@ "description": null, "fork": false, "created_at": "2021-10-19T01:08:48Z", - "updated_at": "2021-10-20T10:41:57Z", + "updated_at": "2021-12-13T03:39:02Z", "pushed_at": "2021-10-19T01:18:49Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21315.json b/2021/CVE-2021-21315.json index fd36b49b4e..66d02f8254 100644 --- a/2021/CVE-2021-21315.json +++ b/2021/CVE-2021-21315.json @@ -13,10 +13,10 @@ "description": "CVE 2021-21315 PoC", "fork": false, "created_at": "2021-03-01T18:52:41Z", - "updated_at": "2021-12-02T05:28:28Z", + "updated_at": "2021-12-13T01:10:06Z", "pushed_at": "2021-06-09T13:27:20Z", - "stargazers_count": 136, - "watchers_count": 136, + "stargazers_count": 137, + "watchers_count": 137, "forks_count": 21, "allow_forking": true, "is_template": false, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 136, + "watchers": 137, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index cb088f7e39..46680945a2 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -84,10 +84,10 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2021-12-12T10:17:50Z", + "updated_at": "2021-12-13T03:09:44Z", "pushed_at": "2021-12-12T10:17:47Z", - "stargazers_count": 327, - "watchers_count": 327, + "stargazers_count": 328, + "watchers_count": 328, "forks_count": 125, "allow_forking": true, "is_template": false, @@ -96,7 +96,7 @@ ], "visibility": "public", "forks": 125, - "watchers": 327, + "watchers": 328, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index b6d7c3560a..8fffa91933 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -128,17 +128,17 @@ "description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)", "fork": false, "created_at": "2021-06-03T09:59:21Z", - "updated_at": "2021-12-10T06:40:46Z", + "updated_at": "2021-12-13T02:44:03Z", "pushed_at": "2021-06-09T10:13:56Z", - "stargazers_count": 291, - "watchers_count": 291, + "stargazers_count": 292, + "watchers_count": 292, "forks_count": 63, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 63, - "watchers": 291, + "watchers": 292, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index d0bf7f7805..9c41575495 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -17,12 +17,12 @@ "pushed_at": "2021-11-02T14:45:24Z", "stargazers_count": 167, "watchers_count": 167, - "forks_count": 39, + "forks_count": 40, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 39, + "forks": 40, "watchers": 167, "score": 0 }, @@ -449,10 +449,10 @@ "description": "CVE-2021-22205 on Docker", "fork": false, "created_at": "2021-11-10T13:57:55Z", - "updated_at": "2021-12-10T07:55:00Z", + "updated_at": "2021-12-13T05:14:50Z", "pushed_at": "2021-12-10T07:54:57Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -466,7 +466,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 415acd6e15..a7dccca6be 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -179,18 +179,18 @@ "description": "Apache Druid remote code execution vulnerability - Apache Druid 远程代码执行漏洞利用", "fork": false, "created_at": "2021-12-12T14:40:12Z", - "updated_at": "2021-12-12T17:43:32Z", + "updated_at": "2021-12-13T02:27:48Z", "pushed_at": "2021-12-12T14:55:26Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-25646" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2021/CVE-2021-26102.json b/2021/CVE-2021-26102.json index 297789b9e9..dcc6af610e 100644 --- a/2021/CVE-2021-26102.json +++ b/2021/CVE-2021-26102.json @@ -13,17 +13,17 @@ "description": "PoC of FortiWAN auth bypass (https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-048)", "fork": false, "created_at": "2021-12-09T12:55:30Z", - "updated_at": "2021-12-09T12:59:21Z", + "updated_at": "2021-12-13T05:07:49Z", "pushed_at": "2021-12-09T12:59:18Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 767135a260..1d7ebe5219 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -765,17 +765,17 @@ "description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.", "fork": false, "created_at": "2021-03-16T07:31:25Z", - "updated_at": "2021-12-06T16:38:42Z", + "updated_at": "2021-12-13T04:20:31Z", "pushed_at": "2021-05-01T17:20:15Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 22, + "watchers": 23, "score": 0 }, { diff --git a/2021/CVE-2021-26868.json b/2021/CVE-2021-26868.json index 9a9d34b2e3..af4cab95cf 100644 --- a/2021/CVE-2021-26868.json +++ b/2021/CVE-2021-26868.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-04-27T03:55:38Z", - "updated_at": "2021-07-13T04:26:52Z", + "updated_at": "2021-12-13T03:33:48Z", "pushed_at": "2021-04-26T14:23:48Z", - "stargazers_count": 2, - "watchers_count": 2, - "forks_count": 2, + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 2, + "forks": 3, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json index 78600a27cc..5442aade75 100644 --- a/2021/CVE-2021-30632.json +++ b/2021/CVE-2021-30632.json @@ -41,15 +41,15 @@ "fork": false, "created_at": "2021-09-28T06:27:49Z", "updated_at": "2021-11-13T08:06:42Z", - "pushed_at": "2021-09-29T06:15:17Z", + "pushed_at": "2021-12-13T06:02:21Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 22, + "forks_count": 23, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 22, + "forks": 23, "watchers": 2, "score": 0 } diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 2300065d6a..3be2e06854 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -1990,7 +1990,7 @@ "description": "CVE-2021-41773 on Docker", "fork": false, "created_at": "2021-11-09T05:13:17Z", - "updated_at": "2021-11-25T09:54:45Z", + "updated_at": "2021-12-13T05:21:19Z", "pushed_at": "2021-11-25T09:54:42Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index 945e6b0ff0..9732270cd1 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -259,10 +259,10 @@ "description": "CVE-2021-41773 on Docker", "fork": false, "created_at": "2021-11-25T09:07:00Z", - "updated_at": "2021-11-25T09:55:28Z", + "updated_at": "2021-12-13T05:52:38Z", "pushed_at": "2021-11-25T09:52:44Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -276,7 +276,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index c199bf8306..3010bbe4ee 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,11 +13,11 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2021-12-13T00:02:28Z", + "updated_at": "2021-12-13T06:09:24Z", "pushed_at": "2021-12-11T15:43:11Z", - "stargazers_count": 123, - "watchers_count": 123, - "forks_count": 19, + "stargazers_count": 179, + "watchers_count": 179, + "forks_count": 34, "allow_forking": true, "is_template": false, "topics": [ @@ -27,8 +27,8 @@ "s4u2self" ], "visibility": "public", - "forks": 19, - "watchers": 123, + "forks": 34, + "watchers": 179, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 9e93619f6a..8d0a1103e4 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,17 +13,17 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2021-12-13T00:08:20Z", + "updated_at": "2021-12-13T06:10:59Z", "pushed_at": "2021-12-12T10:50:54Z", - "stargazers_count": 438, - "watchers_count": 438, - "forks_count": 94, + "stargazers_count": 591, + "watchers_count": 591, + "forks_count": 142, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 94, - "watchers": 438, + "forks": 142, + "watchers": 591, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 042f44b8d0..84e9fa4073 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -94,17 +94,17 @@ "description": "Grafana Unauthorized arbitrary file reading vulnerability", "fork": false, "created_at": "2021-12-07T09:02:16Z", - "updated_at": "2021-12-12T23:41:59Z", + "updated_at": "2021-12-13T04:26:57Z", "pushed_at": "2021-12-09T03:16:21Z", - "stargazers_count": 209, - "watchers_count": 209, + "stargazers_count": 213, + "watchers_count": 213, "forks_count": 48, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 48, - "watchers": 209, + "watchers": 213, "score": 0 }, { @@ -484,17 +484,17 @@ "description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).", "fork": false, "created_at": "2021-12-11T18:49:30Z", - "updated_at": "2021-12-12T23:15:31Z", + "updated_at": "2021-12-13T01:26:18Z", "pushed_at": "2021-12-11T19:10:03Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 711adc8467..1a329444bf 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -13,17 +13,17 @@ "description": "Apache Log4j 远程代码执行", "fork": false, "created_at": "2021-12-09T15:27:38Z", - "updated_at": "2021-12-13T00:03:09Z", - "pushed_at": "2021-12-11T14:57:57Z", - "stargazers_count": 1755, - "watchers_count": 1755, - "forks_count": 609, + "updated_at": "2021-12-13T06:09:15Z", + "pushed_at": "2021-12-13T04:42:09Z", + "stargazers_count": 1901, + "watchers_count": 1901, + "forks_count": 655, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 609, - "watchers": 1755, + "forks": 655, + "watchers": 1901, "score": 0 }, { @@ -67,17 +67,17 @@ "description": "This tool patches the CVE-2021-44228 Log4J vulnerability present in all minecraft versions NOTE THIS TOOL MUST BE RE-RUN after downloading or updating versions of minecraft as its not a perminent patch", "fork": false, "created_at": "2021-12-10T00:14:06Z", - "updated_at": "2021-12-11T18:24:53Z", + "updated_at": "2021-12-13T02:56:28Z", "pushed_at": "2021-12-11T07:17:57Z", - "stargazers_count": 6, - "watchers_count": 6, - "forks_count": 1, + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 6, + "forks": 2, + "watchers": 7, "score": 0 }, { @@ -121,17 +121,17 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2021-12-12T23:52:23Z", - "pushed_at": "2021-12-12T11:21:26Z", - "stargazers_count": 79, - "watchers_count": 79, - "forks_count": 16, + "updated_at": "2021-12-13T06:05:13Z", + "pushed_at": "2021-12-13T02:05:57Z", + "stargazers_count": 107, + "watchers_count": 107, + "forks_count": 21, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 16, - "watchers": 79, + "forks": 21, + "watchers": 107, "score": 0 }, { @@ -148,11 +148,11 @@ "description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information", "fork": false, "created_at": "2021-12-10T06:15:38Z", - "updated_at": "2021-12-13T00:05:32Z", + "updated_at": "2021-12-13T05:27:17Z", "pushed_at": "2021-12-12T21:41:42Z", - "stargazers_count": 84, - "watchers_count": 84, - "forks_count": 18, + "stargazers_count": 96, + "watchers_count": 96, + "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [ @@ -165,8 +165,8 @@ "minecraft" ], "visibility": "public", - "forks": 18, - "watchers": 84, + "forks": 19, + "watchers": 96, "score": 0 }, { @@ -183,10 +183,10 @@ "description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.", "fork": false, "created_at": "2021-12-10T06:42:37Z", - "updated_at": "2021-12-12T14:04:26Z", + "updated_at": "2021-12-13T06:01:47Z", "pushed_at": "2021-12-11T02:49:41Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 65, + "watchers_count": 65, "forks_count": 12, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 63, + "watchers": 65, "score": 0 }, { @@ -363,17 +363,17 @@ "description": "Deploys an agent to fix CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process", "fork": false, "created_at": "2021-12-10T10:10:19Z", - "updated_at": "2021-12-12T21:15:22Z", + "updated_at": "2021-12-13T06:07:40Z", "pushed_at": "2021-12-12T10:33:02Z", - "stargazers_count": 94, - "watchers_count": 94, - "forks_count": 7, + "stargazers_count": 95, + "watchers_count": 95, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 94, + "forks": 8, + "watchers": 95, "score": 0 }, { @@ -417,17 +417,17 @@ "description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2021-12-12T23:51:33Z", + "updated_at": "2021-12-13T05:58:55Z", "pushed_at": "2021-12-12T22:12:57Z", - "stargazers_count": 343, - "watchers_count": 343, - "forks_count": 104, + "stargazers_count": 369, + "watchers_count": 369, + "forks_count": 111, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 104, - "watchers": 343, + "forks": 111, + "watchers": 369, "score": 0 }, { @@ -564,17 +564,17 @@ "description": "Checking for vulnerability CVE-2021-44228.", "fork": false, "created_at": "2021-12-10T17:24:47Z", - "updated_at": "2021-12-12T18:01:45Z", + "updated_at": "2021-12-13T02:38:17Z", "pushed_at": "2021-12-12T17:41:02Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 30, + "watchers": 31, "score": 0 }, { @@ -591,17 +591,17 @@ "description": "Hashes for vulnerable LOG4J versions", "fork": false, "created_at": "2021-12-10T18:06:06Z", - "updated_at": "2021-12-12T23:21:30Z", + "updated_at": "2021-12-13T03:54:28Z", "pushed_at": "2021-12-11T04:36:38Z", - "stargazers_count": 61, - "watchers_count": 61, - "forks_count": 10, + "stargazers_count": 64, + "watchers_count": 64, + "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 10, - "watchers": 61, + "forks": 11, + "watchers": 64, "score": 0 }, { @@ -706,17 +706,17 @@ "description": "log4shell sample application (CVE-2021-44228)", "fork": false, "created_at": "2021-12-10T21:13:46Z", - "updated_at": "2021-12-11T00:07:52Z", + "updated_at": "2021-12-13T03:41:16Z", "pushed_at": "2021-12-10T21:15:23Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { @@ -760,35 +760,35 @@ "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading", "fork": false, "created_at": "2021-12-10T21:46:18Z", - "updated_at": "2021-12-12T23:48:45Z", + "updated_at": "2021-12-13T05:47:30Z", "pushed_at": "2021-12-11T16:01:28Z", - "stargazers_count": 61, - "watchers_count": 61, - "forks_count": 21, + "stargazers_count": 73, + "watchers_count": 73, + "forks_count": 24, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 21, - "watchers": 61, + "forks": 24, + "watchers": 73, "score": 0 }, { "id": 437124793, - "name": "log4j-patcher", - "full_name": "alerithe\/log4j-patcher", + "name": "log4noshell", + "full_name": "alerithe\/log4noshell", "owner": { "login": "alerithe", "id": 31022473, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4", "html_url": "https:\/\/github.com\/alerithe" }, - "html_url": "https:\/\/github.com\/alerithe\/log4j-patcher", - "description": "Java Agent that disables Apache Log4J's JNDI Lookup. Quick-fix for CVE-2021-44228", + "html_url": "https:\/\/github.com\/alerithe\/log4noshell", + "description": "Java agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \"Log4Shell.\"", "fork": false, "created_at": "2021-12-10T21:59:31Z", - "updated_at": "2021-12-11T07:45:41Z", - "pushed_at": "2021-12-11T07:45:38Z", + "updated_at": "2021-12-13T05:47:00Z", + "pushed_at": "2021-12-13T05:46:58Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, @@ -848,11 +848,11 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2021-12-12T23:29:50Z", + "updated_at": "2021-12-13T06:08:37Z", "pushed_at": "2021-12-12T18:22:56Z", - "stargazers_count": 128, - "watchers_count": 128, - "forks_count": 30, + "stargazers_count": 180, + "watchers_count": 180, + "forks_count": 36, "allow_forking": true, "is_template": false, "topics": [ @@ -874,8 +874,8 @@ "writeups" ], "visibility": "public", - "forks": 30, - "watchers": 128, + "forks": 36, + "watchers": 180, "score": 0 }, { @@ -892,11 +892,11 @@ "description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2021-12-12T21:01:13Z", + "updated_at": "2021-12-13T02:47:43Z", "pushed_at": "2021-12-12T20:32:33Z", - "stargazers_count": 10, - "watchers_count": 10, - "forks_count": 5, + "stargazers_count": 13, + "watchers_count": 13, + "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [ @@ -906,8 +906,8 @@ "security" ], "visibility": "public", - "forks": 5, - "watchers": 10, + "forks": 6, + "watchers": 13, "score": 0 }, { @@ -951,10 +951,10 @@ "description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam", "fork": false, "created_at": "2021-12-10T23:35:31Z", - "updated_at": "2021-12-13T00:07:24Z", + "updated_at": "2021-12-13T06:11:19Z", "pushed_at": "2021-12-13T00:07:11Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 6, "allow_forking": true, "is_template": false, @@ -966,7 +966,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 20, + "watchers": 22, "score": 0 }, { @@ -1007,17 +1007,23 @@ "html_url": "https:\/\/github.com\/1lann" }, "html_url": "https:\/\/github.com\/1lann\/log4shelldetect", - "description": "Scans files for .jars potentially vulnerable to Log4Shell (CVE-2021-44228) by inspecting the class paths inside the .jar.", + "description": "Rapidly scan filesystems for .jars potentially vulnerable to Log4Shell (CVE-2021-44228) or \"that Log4j JNDI exploit\" by inspecting the class paths inside the .jar.", "fork": false, "created_at": "2021-12-11T01:08:00Z", - "updated_at": "2021-12-12T22:01:22Z", - "pushed_at": "2021-12-12T21:03:00Z", + "updated_at": "2021-12-13T01:45:23Z", + "pushed_at": "2021-12-13T01:39:49Z", "stargazers_count": 12, "watchers_count": 12, "forks_count": 0, "allow_forking": true, "is_template": false, - "topics": [], + "topics": [ + "cve-2021-44228", + "log4j", + "log4shell", + "scanner", + "vulnerability-scanners" + ], "visibility": "public", "forks": 0, "watchers": 12, @@ -1064,17 +1070,17 @@ "description": "A short demo of CVE-2021-44228", "fork": false, "created_at": "2021-12-11T02:45:39Z", - "updated_at": "2021-12-12T11:32:41Z", + "updated_at": "2021-12-13T03:37:10Z", "pushed_at": "2021-12-12T11:32:38Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0 }, { @@ -1091,10 +1097,10 @@ "description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.", "fork": false, "created_at": "2021-12-11T03:08:14Z", - "updated_at": "2021-12-11T07:29:28Z", + "updated_at": "2021-12-13T04:56:27Z", "pushed_at": "2021-12-11T07:31:02Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -1107,7 +1113,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0 }, { @@ -1151,17 +1157,17 @@ "description": "Test for log4j vulnerability across your external footprint", "fork": false, "created_at": "2021-12-11T04:34:51Z", - "updated_at": "2021-12-12T03:52:32Z", + "updated_at": "2021-12-13T01:08:11Z", "pushed_at": "2021-12-11T06:11:45Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0 }, { @@ -1209,20 +1215,20 @@ "html_url": "https:\/\/github.com\/f0ng" }, "html_url": "https:\/\/github.com\/f0ng\/log4j2burpscanner", - "description": "CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名", + "description": "CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名,可自定义ceye.io", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2021-12-12T15:00:33Z", - "pushed_at": "2021-12-12T11:03:19Z", - "stargazers_count": 23, - "watchers_count": 23, - "forks_count": 8, + "updated_at": "2021-12-13T06:12:14Z", + "pushed_at": "2021-12-13T06:10:05Z", + "stargazers_count": 62, + "watchers_count": 62, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 23, + "forks": 10, + "watchers": 62, "score": 0 }, { @@ -1293,17 +1299,17 @@ "description": "Log4Shell CVE-2021-44228 mitigation tester", "fork": false, "created_at": "2021-12-11T10:16:58Z", - "updated_at": "2021-12-12T09:12:45Z", + "updated_at": "2021-12-13T05:14:11Z", "pushed_at": "2021-12-12T09:12:42Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 4, "score": 0 }, { @@ -1347,11 +1353,11 @@ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:18:46Z", - "updated_at": "2021-12-13T00:06:25Z", - "pushed_at": "2021-12-12T20:13:04Z", - "stargazers_count": 38, - "watchers_count": 38, - "forks_count": 7, + "updated_at": "2021-12-13T05:54:46Z", + "pushed_at": "2021-12-13T05:53:29Z", + "stargazers_count": 56, + "watchers_count": 56, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [ @@ -1361,8 +1367,8 @@ "scanner" ], "visibility": "public", - "forks": 7, - "watchers": 38, + "forks": 10, + "watchers": 56, "score": 0 }, { @@ -1595,17 +1601,17 @@ "description": "Public IoCs about log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-11T14:54:45Z", - "updated_at": "2021-12-12T15:08:36Z", + "updated_at": "2021-12-13T04:48:14Z", "pushed_at": "2021-12-12T15:08:33Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 6, "score": 0 }, { @@ -1622,8 +1628,8 @@ "description": "CVE-2021-44228", "fork": false, "created_at": "2021-12-11T15:18:42Z", - "updated_at": "2021-12-12T17:20:41Z", - "pushed_at": "2021-12-12T17:20:39Z", + "updated_at": "2021-12-13T02:14:17Z", + "pushed_at": "2021-12-13T02:14:14Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, @@ -1705,10 +1711,10 @@ "description": "Detections for CVE-2021-44228 inside of nested binaries", "fork": false, "created_at": "2021-12-11T16:08:47Z", - "updated_at": "2021-12-12T03:52:25Z", + "updated_at": "2021-12-13T01:07:57Z", "pushed_at": "2021-12-11T22:47:58Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -1723,7 +1729,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0 }, { @@ -1821,10 +1827,10 @@ "description": "A bare minimum proof-of-concept for Log4j2 JNDI RCE vulnerability (CVE-2021-44228\/Log4Shell).", "fork": false, "created_at": "2021-12-12T01:23:45Z", - "updated_at": "2021-12-12T09:59:28Z", + "updated_at": "2021-12-13T04:06:08Z", "pushed_at": "2021-12-12T09:59:26Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -1839,7 +1845,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0 }, { @@ -1856,17 +1862,17 @@ "description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.", "fork": false, "created_at": "2021-12-12T01:24:51Z", - "updated_at": "2021-12-12T23:51:02Z", + "updated_at": "2021-12-13T05:31:20Z", "pushed_at": "2021-12-12T21:23:51Z", - "stargazers_count": 56, - "watchers_count": 56, - "forks_count": 7, + "stargazers_count": 79, + "watchers_count": 79, + "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 56, + "forks": 9, + "watchers": 79, "score": 0 }, { @@ -1883,22 +1889,23 @@ "description": "An All-In-One Pure Python PoC for CVE-2021-44228", "fork": false, "created_at": "2021-12-12T02:57:49Z", - "updated_at": "2021-12-12T21:15:52Z", - "pushed_at": "2021-12-12T06:36:27Z", - "stargazers_count": 12, - "watchers_count": 12, - "forks_count": 3, + "updated_at": "2021-12-13T05:38:34Z", + "pushed_at": "2021-12-13T04:29:28Z", + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [ + "cli", "cve-2021-44228", "log4j", "python", "rce" ], "visibility": "public", - "forks": 3, - "watchers": 12, + "forks": 6, + "watchers": 18, "score": 0 }, { @@ -1915,17 +1922,17 @@ "description": null, "fork": false, "created_at": "2021-12-12T02:59:54Z", - "updated_at": "2021-12-12T19:31:16Z", + "updated_at": "2021-12-13T05:59:10Z", "pushed_at": "2021-12-12T08:13:14Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 2, + "stargazers_count": 9, + "watchers_count": 9, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 4, + "forks": 3, + "watchers": 9, "score": 0 }, { @@ -2001,8 +2008,8 @@ "description": "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228", "fork": false, "created_at": "2021-12-12T04:23:10Z", - "updated_at": "2021-12-12T23:59:07Z", - "pushed_at": "2021-12-12T23:59:04Z", + "updated_at": "2021-12-13T03:02:32Z", + "pushed_at": "2021-12-13T03:02:29Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, @@ -2163,17 +2170,17 @@ "description": null, "fork": false, "created_at": "2021-12-12T10:53:15Z", - "updated_at": "2021-12-13T00:06:08Z", + "updated_at": "2021-12-13T03:58:51Z", "pushed_at": "2021-12-13T00:03:51Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -2274,11 +2281,11 @@ "description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ", "fork": false, "created_at": "2021-12-12T11:26:42Z", - "updated_at": "2021-12-12T23:16:02Z", + "updated_at": "2021-12-13T04:58:49Z", "pushed_at": "2021-12-12T17:37:11Z", - "stargazers_count": 21, - "watchers_count": 21, - "forks_count": 0, + "stargazers_count": 29, + "watchers_count": 29, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -2291,8 +2298,8 @@ "rce" ], "visibility": "public", - "forks": 0, - "watchers": 21, + "forks": 1, + "watchers": 29, "score": 0 }, { @@ -2363,17 +2370,17 @@ "description": null, "fork": false, "created_at": "2021-12-12T13:00:38Z", - "updated_at": "2021-12-12T13:25:30Z", + "updated_at": "2021-12-13T04:00:49Z", "pushed_at": "2021-12-12T13:25:27Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -2444,17 +2451,17 @@ "description": "Python script that sends CVE-2021-44228 log4j payload requests to url list", "fork": false, "created_at": "2021-12-12T13:28:31Z", - "updated_at": "2021-12-12T18:07:33Z", + "updated_at": "2021-12-13T02:29:20Z", "pushed_at": "2021-12-12T13:39:45Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 5, "score": 0 }, { @@ -2471,17 +2478,17 @@ "description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script", "fork": false, "created_at": "2021-12-12T13:45:08Z", - "updated_at": "2021-12-13T00:07:58Z", + "updated_at": "2021-12-13T05:18:48Z", "pushed_at": "2021-12-12T13:51:35Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 3, + "forks": 1, + "watchers": 5, "score": 0 }, { @@ -2525,10 +2532,10 @@ "description": "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability ", "fork": false, "created_at": "2021-12-12T14:05:05Z", - "updated_at": "2021-12-12T20:10:32Z", + "updated_at": "2021-12-13T01:16:16Z", "pushed_at": "2021-12-12T18:41:42Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -2539,7 +2546,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 14, + "watchers": 15, "score": 0 }, { @@ -2583,8 +2590,8 @@ "description": "CVE-2021-44228 test demo", "fork": false, "created_at": "2021-12-12T14:54:25Z", - "updated_at": "2021-12-12T15:12:56Z", - "pushed_at": "2021-12-12T15:12:53Z", + "updated_at": "2021-12-13T05:10:53Z", + "pushed_at": "2021-12-13T05:10:50Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -2610,17 +2617,17 @@ "description": null, "fork": false, "created_at": "2021-12-12T15:00:04Z", - "updated_at": "2021-12-12T16:13:36Z", + "updated_at": "2021-12-13T04:50:15Z", "pushed_at": "2021-12-12T16:03:21Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 4, "score": 0 }, { @@ -2637,17 +2644,17 @@ "description": null, "fork": false, "created_at": "2021-12-12T15:30:55Z", - "updated_at": "2021-12-12T16:20:03Z", + "updated_at": "2021-12-13T06:00:32Z", "pushed_at": "2021-12-12T15:49:26Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 5, "score": 0 }, { @@ -2664,14 +2671,18 @@ "description": "A micro lab for CVE-2021-44228 (log4j)", "fork": false, "created_at": "2021-12-12T15:44:49Z", - "updated_at": "2021-12-13T00:11:50Z", + "updated_at": "2021-12-13T01:23:40Z", "pushed_at": "2021-12-12T23:28:52Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, - "topics": [], + "topics": [ + "cve-2021-44228", + "log4j", + "log4shell" + ], "visibility": "public", "forks": 0, "watchers": 0, @@ -2718,11 +2729,11 @@ "description": "Spring Boot Log4j - CVE-2021-44228 Docker Lab ", "fork": false, "created_at": "2021-12-12T16:54:33Z", - "updated_at": "2021-12-12T17:58:16Z", + "updated_at": "2021-12-13T04:03:59Z", "pushed_at": "2021-12-12T17:33:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 1, + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ @@ -2731,8 +2742,8 @@ "spring-boot-log4j" ], "visibility": "public", - "forks": 1, - "watchers": 1, + "forks": 2, + "watchers": 2, "score": 0 }, { @@ -2776,8 +2787,8 @@ "description": null, "fork": false, "created_at": "2021-12-12T20:31:19Z", - "updated_at": "2021-12-12T20:58:04Z", - "pushed_at": "2021-12-12T20:58:02Z", + "updated_at": "2021-12-13T05:13:22Z", + "pushed_at": "2021-12-13T05:13:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -2803,11 +2814,11 @@ "description": "Log4j RCE - (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T21:26:44Z", - "updated_at": "2021-12-12T23:34:33Z", - "pushed_at": "2021-12-12T22:41:00Z", - "stargazers_count": 1, - "watchers_count": 1, - "forks_count": 0, + "updated_at": "2021-12-13T04:39:42Z", + "pushed_at": "2021-12-13T00:54:22Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ @@ -2821,8 +2832,8 @@ "remote-code-execution" ], "visibility": "public", - "forks": 0, - "watchers": 1, + "forks": 2, + "watchers": 3, "score": 0 }, { @@ -2866,17 +2877,23 @@ "description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell", "fork": false, "created_at": "2021-12-12T21:45:33Z", - "updated_at": "2021-12-12T22:28:21Z", - "pushed_at": "2021-12-12T22:25:46Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2021-12-13T04:07:45Z", + "pushed_at": "2021-12-13T03:13:27Z", + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, - "topics": [], + "topics": [ + "cve-2021-44228", + "exploit", + "log4j", + "log4shell", + "poc" + ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -2920,17 +2937,17 @@ "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T22:52:02Z", - "updated_at": "2021-12-12T23:55:44Z", + "updated_at": "2021-12-13T04:40:15Z", "pushed_at": "2021-12-12T23:48:16Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 4, "score": 0 }, { @@ -3020,5 +3037,313 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 437687048, + "name": "fail2ban-log4j", + "full_name": "atnetws\/fail2ban-log4j", + "owner": { + "login": "atnetws", + "id": 44603839, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44603839?v=4", + "html_url": "https:\/\/github.com\/atnetws" + }, + "html_url": "https:\/\/github.com\/atnetws\/fail2ban-log4j", + "description": "fail2ban filter that catches attacks againts log4j CVE-2021-44228", + "fork": false, + "created_at": "2021-12-13T00:14:31Z", + "updated_at": "2021-12-13T00:32:12Z", + "pushed_at": "2021-12-13T00:32:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 437687082, + "name": "cve-2021-44228", + "full_name": "kimobu\/cve-2021-44228", + "owner": { + "login": "kimobu", + "id": 18669130, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18669130?v=4", + "html_url": "https:\/\/github.com\/kimobu" + }, + "html_url": "https:\/\/github.com\/kimobu\/cve-2021-44228", + "description": "Some files for red team\/blue team investigations into CVE-2021-44228", + "fork": false, + "created_at": "2021-12-13T00:14:45Z", + "updated_at": "2021-12-13T00:23:01Z", + "pushed_at": "2021-12-13T00:22:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 437688500, + "name": "anti-jndi", + "full_name": "KainsRache\/anti-jndi", + "owner": { + "login": "KainsRache", + "id": 1352675, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1352675?v=4", + "html_url": "https:\/\/github.com\/KainsRache" + }, + "html_url": "https:\/\/github.com\/KainsRache\/anti-jndi", + "description": "Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.", + "fork": false, + "created_at": "2021-12-13T00:23:20Z", + "updated_at": "2021-12-13T02:42:01Z", + "pushed_at": "2021-12-13T02:41:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 437692169, + "name": "log4j-win-quick", + "full_name": "lwsnz\/log4j-win-quick", + "owner": { + "login": "lwsnz", + "id": 24641464, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24641464?v=4", + "html_url": "https:\/\/github.com\/lwsnz" + }, + "html_url": "https:\/\/github.com\/lwsnz\/log4j-win-quick", + "description": "CVE-2021-44228. Quick find and mitigate action for Windows OS.", + "fork": false, + "created_at": "2021-12-13T00:45:48Z", + "updated_at": "2021-12-13T00:52:01Z", + "pushed_at": "2021-12-13T00:49:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [ + "cve-2021-44228" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 437704633, + "name": "Log4j-check", + "full_name": "bigsizeme\/Log4j-check", + "owner": { + "login": "bigsizeme", + "id": 17845094, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4", + "html_url": "https:\/\/github.com\/bigsizeme" + }, + "html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check", + "description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload", + "fork": false, + "created_at": "2021-12-13T01:55:51Z", + "updated_at": "2021-12-13T05:50:17Z", + "pushed_at": "2021-12-13T05:50:14Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 6, + "score": 0 + }, + { + "id": 437709337, + "name": "exploit-CVE-2021-44228", + "full_name": "pedrohavay\/exploit-CVE-2021-44228", + "owner": { + "login": "pedrohavay", + "id": 18234370, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4", + "html_url": "https:\/\/github.com\/pedrohavay" + }, + "html_url": "https:\/\/github.com\/pedrohavay\/exploit-CVE-2021-44228", + "description": "This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).", + "fork": false, + "created_at": "2021-12-13T02:18:57Z", + "updated_at": "2021-12-13T04:50:58Z", + "pushed_at": "2021-12-13T02:41:49Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0 + }, + { + "id": 437721429, + "name": "log4j-nullroute", + "full_name": "0xRyan\/log4j-nullroute", + "owner": { + "login": "0xRyan", + "id": 87556614, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87556614?v=4", + "html_url": "https:\/\/github.com\/0xRyan" + }, + "html_url": "https:\/\/github.com\/0xRyan\/log4j-nullroute", + "description": "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes", + "fork": false, + "created_at": "2021-12-13T03:15:42Z", + "updated_at": "2021-12-13T05:22:40Z", + "pushed_at": "2021-12-13T05:22:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 437729534, + "name": "CVE-2021-44228", + "full_name": "fireeye\/CVE-2021-44228", + "owner": { + "login": "fireeye", + "id": 4984788, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4984788?v=4", + "html_url": "https:\/\/github.com\/fireeye" + }, + "html_url": "https:\/\/github.com\/fireeye\/CVE-2021-44228", + "description": "OpenIOC rules to facilitate hunting for indicators of compromise", + "fork": false, + "created_at": "2021-12-13T03:55:32Z", + "updated_at": "2021-12-13T05:53:23Z", + "pushed_at": "2021-12-13T05:44:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 437729997, + "name": "log4j-scan", + "full_name": "fullhunt\/log4j-scan", + "owner": { + "login": "fullhunt", + "id": 34830403, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34830403?v=4", + "html_url": "https:\/\/github.com\/fullhunt" + }, + "html_url": "https:\/\/github.com\/fullhunt\/log4j-scan", + "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", + "fork": false, + "created_at": "2021-12-13T03:57:50Z", + "updated_at": "2021-12-13T05:58:45Z", + "pushed_at": "2021-12-13T04:48:07Z", + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 2, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 2, + "watchers": 7, + "score": 0 + }, + { + "id": 437733080, + "name": "log4j_checker_beta", + "full_name": "rubo77\/log4j_checker_beta", + "owner": { + "login": "rubo77", + "id": 1591563, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1591563?v=4", + "html_url": "https:\/\/github.com\/rubo77" + }, + "html_url": "https:\/\/github.com\/rubo77\/log4j_checker_beta", + "description": "a fast check, if your server could be vulnerable to CVE-2021-44228", + "fork": false, + "created_at": "2021-12-13T04:14:18Z", + "updated_at": "2021-12-13T04:50:07Z", + "pushed_at": "2021-12-13T04:50:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 437735699, + "name": "CVE-2021-44228", + "full_name": "ahmad4fifz-dev\/CVE-2021-44228", + "owner": { + "login": "ahmad4fifz-dev", + "id": 95916211, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95916211?v=4", + "html_url": "https:\/\/github.com\/ahmad4fifz-dev" + }, + "html_url": "https:\/\/github.com\/ahmad4fifz-dev\/CVE-2021-44228", + "description": "CVE-2021-44228 on Podman", + "fork": false, + "created_at": "2021-12-13T04:29:04Z", + "updated_at": "2021-12-13T04:38:49Z", + "pushed_at": "2021-12-13T04:29:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [ + "apache", + "containerization", + "cve", + "cve-2021-44228", + "log4j2", + "logging", + "podman", + "rce" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 2c38b1f0d2..2f2169a806 100644 --- a/README.md +++ b/README.md @@ -3727,7 +3727,7 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and - [StandB/CVE-2021-44228-poc](https://github.com/StandB/CVE-2021-44228-poc) - [seamus-dev/CVE-2021-44228](https://github.com/seamus-dev/CVE-2021-44228) - [takito1812/log4j-detect](https://github.com/takito1812/log4j-detect) -- [alerithe/log4j-patcher](https://github.com/alerithe/log4j-patcher) +- [alerithe/log4noshell](https://github.com/alerithe/log4noshell) - [Azeemering/CVE-2021-44228-DFIR-Notes](https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes) - [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words) - [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc) @@ -3806,6 +3806,17 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and - [dotPY-hax/log4py](https://github.com/dotPY-hax/log4py) - [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC) - [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228) +- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j) +- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228) +- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi) +- [lwsnz/log4j-win-quick](https://github.com/lwsnz/log4j-win-quick) +- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check) +- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228) +- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute) +- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228) +- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan) +- [rubo77/log4j_checker_beta](https://github.com/rubo77/log4j_checker_beta) +- [ahmad4fifz-dev/CVE-2021-44228](https://github.com/ahmad4fifz-dev/CVE-2021-44228) ## 2020