mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/04/01 18:08:09
This commit is contained in:
parent
87deee7511
commit
05f63c1a9c
27 changed files with 134 additions and 134 deletions
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-08-03T18:49:02Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-01T02:29:17Z",
|
||||
"updated_at": "2020-04-01T08:55:49Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-22T14:07:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-01T02:29:17Z",
|
||||
"updated_at": "2020-04-01T08:55:49Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-01T02:29:17Z",
|
||||
"updated_at": "2020-04-01T08:55:49Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "a list of BIOS\/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-14T11:52:38Z",
|
||||
"updated_at": "2019-12-14T05:31:57Z",
|
||||
"updated_at": "2020-04-01T04:31:15Z",
|
||||
"pushed_at": "2018-03-27T19:59:31Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2020-03-21T02:14:31Z",
|
||||
"updated_at": "2020-04-01T05:13:01Z",
|
||||
"pushed_at": "2019-06-16T09:53:10Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 157948945,
|
||||
"id": 158057391,
|
||||
"name": "cve-2018-14667",
|
||||
"full_name": "greekn\/cve-2018-14667",
|
||||
"full_name": "nareshmail\/cve-2018-14667",
|
||||
"owner": {
|
||||
"login": "greekn",
|
||||
"id": 22962675,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22962675?v=4",
|
||||
"html_url": "https:\/\/github.com\/greekn"
|
||||
"login": "nareshmail",
|
||||
"id": 6008091,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6008091?v=4",
|
||||
"html_url": "https:\/\/github.com\/nareshmail"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/greekn\/cve-2018-14667",
|
||||
"html_url": "https:\/\/github.com\/nareshmail\/cve-2018-14667",
|
||||
"description": "cve-2018-14667 demo",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-17T03:59:29Z",
|
||||
"updated_at": "2018-12-11T12:00:45Z",
|
||||
"pushed_at": "2018-11-20T08:33:25Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"created_at": "2018-11-18T06:43:46Z",
|
||||
"updated_at": "2020-04-01T03:46:35Z",
|
||||
"pushed_at": "2018-11-17T04:13:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2020-03-30T04:01:31Z",
|
||||
"updated_at": "2020-04-01T06:36:50Z",
|
||||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"forks_count": 295,
|
||||
"forks": 295,
|
||||
"watchers": 323,
|
||||
"watchers": 324,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2018-17456漏洞复现(PoC+Exp)",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T03:17:26Z",
|
||||
"updated_at": "2019-06-22T13:55:38Z",
|
||||
"updated_at": "2020-04-01T07:10:42Z",
|
||||
"pushed_at": "2019-06-22T13:55:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-01T02:29:17Z",
|
||||
"updated_at": "2020-04-01T08:55:49Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-04-01T01:56:58Z",
|
||||
"updated_at": "2020-04-01T05:14:53Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 212,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -362,8 +362,8 @@
|
|||
"pushed_at": "2019-06-01T04:12:19Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1025,7 +1025,7 @@
|
|||
"description": "dump",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T06:57:19Z",
|
||||
"updated_at": "2020-03-27T10:57:00Z",
|
||||
"updated_at": "2020-04-01T08:10:15Z",
|
||||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 455,
|
||||
"watchers_count": 455,
|
||||
|
@ -1558,8 +1558,8 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1015,
|
||||
"watchers_count": 1015,
|
||||
"forks_count": 349,
|
||||
"forks": 349,
|
||||
"forks_count": 350,
|
||||
"forks": 350,
|
||||
"watchers": 1015,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1627,8 +1627,8 @@
|
|||
"pushed_at": "2020-03-20T10:50:06Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 321,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1991,13 +1991,13 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2020-03-25T06:14:00Z",
|
||||
"updated_at": "2020-04-01T08:46:13Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 268,
|
||||
"watchers": 267,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1040 with Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-14T11:16:03Z",
|
||||
"updated_at": "2020-03-30T04:46:41Z",
|
||||
"updated_at": "2020-04-01T05:23:47Z",
|
||||
"pushed_at": "2020-03-20T09:11:20Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-17T15:53:25Z",
|
||||
"updated_at": "2019-09-17T15:53:51Z",
|
||||
"updated_at": "2020-04-01T05:23:50Z",
|
||||
"pushed_at": "2019-09-17T15:53:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-03-31T07:53:28Z",
|
||||
"updated_at": "2020-04-01T06:32:15Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1555,
|
||||
"watchers_count": 1555,
|
||||
"stargazers_count": 1554,
|
||||
"watchers_count": 1554,
|
||||
"forks_count": 219,
|
||||
"forks": 219,
|
||||
"watchers": 1555,
|
||||
"watchers": 1554,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2020-03-31T20:12:23Z",
|
||||
"updated_at": "2020-04-01T07:34:19Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -217,10 +217,10 @@
|
|||
"html_url": "https:\/\/github.com\/keshiba"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278",
|
||||
"description": "POC for the CVE-2019-16278 vulnerability",
|
||||
"description": "Exploit for the CVE-2019-16278 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T08:54:06Z",
|
||||
"updated_at": "2020-03-31T19:28:23Z",
|
||||
"updated_at": "2020-04-01T06:07:06Z",
|
||||
"pushed_at": "2020-03-31T19:28:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-05T12:29:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-01T02:29:17Z",
|
||||
"updated_at": "2020-04-01T08:55:49Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2020-03-31T22:39:08Z",
|
||||
"pushed_at": "2020-03-31T18:04:48Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"updated_at": "2020-04-01T08:28:45Z",
|
||||
"pushed_at": "2020-04-01T05:57:35Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -267,11 +267,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-03-31T15:29:52Z",
|
||||
"updated_at": "2020-03-31T19:30:11Z",
|
||||
"pushed_at": "2020-03-31T15:39:38Z",
|
||||
"pushed_at": "2020-04-01T06:57:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -105,7 +105,7 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-04-01T02:49:36Z",
|
||||
"updated_at": "2020-04-01T05:00:27Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 406,
|
||||
"watchers_count": 406,
|
||||
|
@ -427,13 +427,13 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2020-03-31T14:55:49Z",
|
||||
"updated_at": "2020-04-01T05:59:01Z",
|
||||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 185,
|
||||
"watchers": 186,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -956,13 +956,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-04-01T02:58:44Z",
|
||||
"updated_at": "2020-04-01T08:58:47Z",
|
||||
"pushed_at": "2020-03-31T20:07:46Z",
|
||||
"stargazers_count": 608,
|
||||
"watchers_count": 608,
|
||||
"forks_count": 154,
|
||||
"forks": 154,
|
||||
"watchers": 608,
|
||||
"stargazers_count": 640,
|
||||
"watchers_count": 640,
|
||||
"forks_count": 163,
|
||||
"forks": 163,
|
||||
"watchers": 640,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1002,13 +1002,13 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2020-04-01T03:08:22Z",
|
||||
"updated_at": "2020-04-01T09:04:46Z",
|
||||
"pushed_at": "2020-03-30T16:08:13Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 66,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1094,13 +1094,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T01:46:08Z",
|
||||
"updated_at": "2020-04-01T02:49:51Z",
|
||||
"updated_at": "2020-04-01T08:56:53Z",
|
||||
"pushed_at": "2020-04-01T01:46:17Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-01T02:29:17Z",
|
||||
"updated_at": "2020-04-01T08:55:49Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-30T03:33:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -4541,7 +4541,7 @@ A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check
|
|||
The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via org.ajax4jsf.resource.UserResource$UriData.
|
||||
</code>
|
||||
|
||||
- [greekn/cve-2018-14667](https://github.com/greekn/cve-2018-14667)
|
||||
- [nareshmail/cve-2018-14667](https://github.com/nareshmail/cve-2018-14667)
|
||||
- [zeroto01/CVE-2018-14667](https://github.com/zeroto01/CVE-2018-14667)
|
||||
- [r00t4dm/CVE-2018-14667](https://github.com/r00t4dm/CVE-2018-14667)
|
||||
- [syriusbughunt/CVE-2018-14667](https://github.com/syriusbughunt/CVE-2018-14667)
|
||||
|
|
Loading…
Reference in a new issue