mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/01/01 18:13:25
This commit is contained in:
parent
2bd60900ba
commit
f1e258f158
20 changed files with 163 additions and 165 deletions
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2017-01-06T23:34:03Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -29,7 +29,7 @@
|
|||
"vulnerable-container"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -148,17 +148,17 @@
|
|||
"description": "Exploit for Node-jose < 0.11.0 written in Ruby",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T11:29:15Z",
|
||||
"updated_at": "2021-05-11T11:31:03Z",
|
||||
"updated_at": "2022-01-01T12:10:59Z",
|
||||
"pushed_at": "2021-05-11T11:31:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"forks_count": 55,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -29,7 +29,7 @@
|
|||
"usb"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"forks": 56,
|
||||
"watchers": 437,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2021-12-27T02:23:46Z",
|
||||
"updated_at": "2022-01-01T13:38:54Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3080,
|
||||
"watchers_count": 3080,
|
||||
"forks_count": 914,
|
||||
"forks_count": 915,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,7 +69,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 914,
|
||||
"forks": 915,
|
||||
"watchers": 3080,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2021-12-29T14:32:33Z",
|
||||
"updated_at": "2022-01-01T16:36:22Z",
|
||||
"pushed_at": "2021-11-10T21:19:47Z",
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 226,
|
||||
"watchers": 227,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "POC Exploit written in Ruby",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T11:32:18Z",
|
||||
"updated_at": "2021-05-11T11:33:16Z",
|
||||
"updated_at": "2022-01-01T12:10:58Z",
|
||||
"pushed_at": "2021-05-11T11:33:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Powershell SMBv3 Compression checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T09:13:48Z",
|
||||
"updated_at": "2021-12-15T14:38:34Z",
|
||||
"updated_at": "2022-01-01T14:46:21Z",
|
||||
"pushed_at": "2020-04-14T11:38:39Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 31,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3080,
|
||||
"watchers_count": 3080,
|
||||
"forks_count": 914,
|
||||
"forks_count": 915,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,7 +42,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 914,
|
||||
"forks": 915,
|
||||
"watchers": 3080,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2020-02-19T12:33:57Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC script that shows RCE vulnerability over Intellian Satellite controller",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-28T23:27:20Z",
|
||||
"updated_at": "2022-01-01T11:47:09Z",
|
||||
"updated_at": "2022-01-01T17:32:14Z",
|
||||
"pushed_at": "2020-01-30T11:42:26Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -25,7 +25,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 62,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,56 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 389866984,
|
||||
"name": "CVE-2021-3438",
|
||||
"full_name": "Crystalware\/CVE-2021-3438",
|
||||
"owner": {
|
||||
"login": "Crystalware",
|
||||
"id": 49976592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
|
||||
"html_url": "https:\/\/github.com\/Crystalware"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2021-3438",
|
||||
"description": "Proof of concept code for CVE-2021-3438",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-27T06:05:08Z",
|
||||
"updated_at": "2021-07-29T03:57:57Z",
|
||||
"pushed_at": "2021-07-29T03:57:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 390295076,
|
||||
"name": "CVE-2021-3438",
|
||||
"full_name": "TobiasS1402\/CVE-2021-3438",
|
||||
"owner": {
|
||||
"login": "TobiasS1402",
|
||||
"id": 46230851,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46230851?v=4",
|
||||
"html_url": "https:\/\/github.com\/TobiasS1402"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TobiasS1402\/CVE-2021-3438",
|
||||
"description": "Detection and remediation for CVE-2021-3438 with Powershell",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-28T09:36:42Z",
|
||||
"updated_at": "2021-07-28T14:51:57Z",
|
||||
"pushed_at": "2021-07-28T14:41:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-09-13T12:12:17Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 22,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -29,7 +29,7 @@
|
|||
"windowsexploits"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 23,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-12T09:38:48Z",
|
||||
"updated_at": "2022-01-01T12:08:44Z",
|
||||
"pushed_at": "2022-01-01T12:08:41Z",
|
||||
"updated_at": "2022-01-01T12:27:43Z",
|
||||
"pushed_at": "2022-01-01T12:27:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-12T09:36:56Z",
|
||||
"updated_at": "2022-01-01T12:11:58Z",
|
||||
"pushed_at": "2021-11-07T20:04:50Z",
|
||||
"updated_at": "2022-01-01T12:23:21Z",
|
||||
"pushed_at": "2022-01-01T12:23:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
29
2021/CVE-2021-40906.json
Normal file
29
2021/CVE-2021-40906.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 416269763,
|
||||
"name": "CVE-2021-40906",
|
||||
"full_name": "Edgarloyola\/CVE-2021-40906",
|
||||
"owner": {
|
||||
"login": "Edgarloyola",
|
||||
"id": 43635073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43635073?v=4",
|
||||
"html_url": "https:\/\/github.com\/Edgarloyola"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Edgarloyola\/CVE-2021-40906",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-12T09:30:38Z",
|
||||
"updated_at": "2022-01-01T12:29:28Z",
|
||||
"pushed_at": "2022-01-01T12:29:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -390,17 +390,17 @@
|
|||
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2022-01-01T11:33:36Z",
|
||||
"updated_at": "2022-01-01T16:07:29Z",
|
||||
"pushed_at": "2021-12-27T10:27:42Z",
|
||||
"stargazers_count": 857,
|
||||
"watchers_count": 857,
|
||||
"forks_count": 339,
|
||||
"stargazers_count": 859,
|
||||
"watchers_count": 859,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 857,
|
||||
"forks": 340,
|
||||
"watchers": 859,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -601,17 +601,17 @@
|
|||
"description": "Hashes for vulnerable LOG4J versions",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T18:06:06Z",
|
||||
"updated_at": "2021-12-29T11:35:54Z",
|
||||
"updated_at": "2022-01-01T14:35:10Z",
|
||||
"pushed_at": "2021-12-17T17:02:24Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 139,
|
||||
"watchers": 140,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -858,10 +858,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-01-01T10:15:56Z",
|
||||
"updated_at": "2022-01-01T13:05:00Z",
|
||||
"pushed_at": "2021-12-31T11:47:19Z",
|
||||
"stargazers_count": 563,
|
||||
"watchers_count": 563,
|
||||
"stargazers_count": 564,
|
||||
"watchers_count": 564,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -888,7 +888,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 563,
|
||||
"watchers": 564,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1768,10 +1768,10 @@
|
|||
"description": "Detections for CVE-2021-44228 inside of nested binaries",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T16:08:47Z",
|
||||
"updated_at": "2021-12-25T15:41:48Z",
|
||||
"updated_at": "2022-01-01T14:36:56Z",
|
||||
"pushed_at": "2021-12-18T22:20:25Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1787,7 +1787,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2868,7 +2868,7 @@
|
|||
"description": "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T15:30:55Z",
|
||||
"updated_at": "2021-12-31T12:04:46Z",
|
||||
"updated_at": "2022-01-01T14:41:00Z",
|
||||
"pushed_at": "2021-12-18T10:46:45Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
|
@ -3138,10 +3138,10 @@
|
|||
"description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T21:45:33Z",
|
||||
"updated_at": "2021-12-31T17:34:58Z",
|
||||
"updated_at": "2022-01-01T13:35:42Z",
|
||||
"pushed_at": "2021-12-18T01:08:59Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -3154,7 +3154,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3198,17 +3198,17 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2021-12-30T08:48:21Z",
|
||||
"updated_at": "2022-01-01T12:18:00Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 292,
|
||||
"watchers": 293,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3511,17 +3511,17 @@
|
|||
"description": "OpenIOC rules to facilitate hunting for indicators of compromise",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:55:32Z",
|
||||
"updated_at": "2021-12-30T04:21:15Z",
|
||||
"updated_at": "2022-01-01T17:18:17Z",
|
||||
"pushed_at": "2021-12-30T04:21:13Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3538,17 +3538,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-01-01T11:43:51Z",
|
||||
"updated_at": "2022-01-01T15:55:30Z",
|
||||
"pushed_at": "2021-12-30T13:20:50Z",
|
||||
"stargazers_count": 2478,
|
||||
"watchers_count": 2478,
|
||||
"stargazers_count": 2480,
|
||||
"watchers_count": 2480,
|
||||
"forks_count": 579,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 579,
|
||||
"watchers": 2478,
|
||||
"watchers": 2480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4393,8 +4393,8 @@
|
|||
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T16:39:16Z",
|
||||
"updated_at": "2022-01-01T12:00:28Z",
|
||||
"pushed_at": "2022-01-01T12:00:25Z",
|
||||
"updated_at": "2022-01-01T18:00:27Z",
|
||||
"pushed_at": "2022-01-01T18:00:24Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 10,
|
||||
|
@ -4895,17 +4895,17 @@
|
|||
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:39:51Z",
|
||||
"updated_at": "2021-12-31T06:19:13Z",
|
||||
"updated_at": "2022-01-01T13:32:58Z",
|
||||
"pushed_at": "2021-12-21T01:24:46Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 262,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5413,7 +5413,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2022-01-01T08:53:50Z",
|
||||
"pushed_at": "2021-12-31T21:29:58Z",
|
||||
"pushed_at": "2022-01-01T17:26:50Z",
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"forks_count": 67,
|
||||
|
@ -5691,17 +5691,17 @@
|
|||
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T18:08:45Z",
|
||||
"updated_at": "2021-12-31T02:27:09Z",
|
||||
"updated_at": "2022-01-01T12:34:11Z",
|
||||
"pushed_at": "2021-12-20T14:44:27Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6634,8 +6634,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T18:51:07Z",
|
||||
"updated_at": "2021-12-24T15:04:05Z",
|
||||
"pushed_at": "2021-12-30T20:33:13Z",
|
||||
"updated_at": "2022-01-01T14:37:49Z",
|
||||
"pushed_at": "2022-01-01T14:37:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
|
@ -6802,7 +6802,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-15T22:30:34Z",
|
||||
"updated_at": "2021-12-31T23:22:04Z",
|
||||
"pushed_at": "2021-12-31T23:22:02Z",
|
||||
"pushed_at": "2022-01-01T12:44:19Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 15,
|
||||
|
@ -8626,7 +8626,7 @@
|
|||
"pushed_at": "2021-12-20T12:03:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -8637,7 +8637,7 @@
|
|||
"scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -9411,17 +9411,17 @@
|
|||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T13:18:49Z",
|
||||
"updated_at": "2021-12-31T07:52:51Z",
|
||||
"updated_at": "2022-01-01T15:39:56Z",
|
||||
"pushed_at": "2021-12-29T12:56:57Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9860,5 +9860,35 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 443563564,
|
||||
"name": "-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||||
"full_name": "marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||||
"owner": {
|
||||
"login": "marklindsey11",
|
||||
"id": 81498475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
|
||||
"html_url": "https:\/\/github.com\/marklindsey11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||||
"description": "Log4j Vulnerability Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-01T15:13:22Z",
|
||||
"updated_at": "2022-01-01T15:31:19Z",
|
||||
"pushed_at": "2022-01-01T15:31:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": true,
|
||||
"topics": [
|
||||
"hunting",
|
||||
"threat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,7 +67,7 @@
|
|||
"description": "CVE-2021-44832",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-30T20:24:07Z",
|
||||
"updated_at": "2021-12-30T20:29:05Z",
|
||||
"updated_at": "2022-01-01T14:18:33Z",
|
||||
"pushed_at": "2021-12-30T20:28:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-29T07:32:30Z",
|
||||
"updated_at": "2022-01-01T08:11:05Z",
|
||||
"updated_at": "2022-01-01T17:07:06Z",
|
||||
"pushed_at": "2021-12-31T08:30:33Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -188,7 +188,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
13
README.md
13
README.md
|
@ -383,15 +383,6 @@ A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote auth
|
|||
|
||||
- [jet-pentest/CVE-2021-3395](https://github.com/jet-pentest/CVE-2021-3395)
|
||||
|
||||
### CVE-2021-3438 (2021-05-20)
|
||||
|
||||
<code>
|
||||
A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.
|
||||
</code>
|
||||
|
||||
- [Crystalware/CVE-2021-3438](https://github.com/Crystalware/CVE-2021-3438)
|
||||
- [TobiasS1402/CVE-2021-3438](https://github.com/TobiasS1402/CVE-2021-3438)
|
||||
|
||||
### CVE-2021-3441 (2021-10-29)
|
||||
|
||||
<code>
|
||||
|
@ -3007,6 +2998,9 @@ Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in
|
|||
### CVE-2021-40905
|
||||
- [Edgarloyola/CVE-2021-40905](https://github.com/Edgarloyola/CVE-2021-40905)
|
||||
|
||||
### CVE-2021-40906
|
||||
- [Edgarloyola/CVE-2021-40906](https://github.com/Edgarloyola/CVE-2021-40906)
|
||||
|
||||
### CVE-2021-40978 (2021-10-07)
|
||||
|
||||
<code>
|
||||
|
@ -3997,6 +3991,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [a5tra/log4j-exploit-builder](https://github.com/a5tra/log4j-exploit-builder)
|
||||
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
|
||||
- [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app)
|
||||
- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
|
||||
|
||||
### CVE-2021-44659 (2021-12-22)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue