mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/11/18 00:09:23
This commit is contained in:
parent
c80c0c5c3d
commit
07e50323f4
33 changed files with 198 additions and 150 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2020-10-30T01:08:31Z",
|
||||
"updated_at": "2020-11-17T14:37:11Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2246,
|
||||
"watchers_count": 2246,
|
||||
"stargazers_count": 2247,
|
||||
"watchers_count": 2247,
|
||||
"forks_count": 482,
|
||||
"forks": 482,
|
||||
"watchers": 2246,
|
||||
"watchers": 2247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-17T07:58:03Z",
|
||||
"updated_at": "2020-11-17T11:25:27Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 766,
|
||||
"watchers": 767,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-17T07:58:03Z",
|
||||
"updated_at": "2020-11-17T11:25:27Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 766,
|
||||
"watchers": 767,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -585,10 +585,10 @@
|
|||
"html_url": "https:\/\/github.com\/dcsync"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dcsync\/rtfkit",
|
||||
"description": "RTF exploit kits for cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174",
|
||||
"description": "generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-16T22:21:54Z",
|
||||
"updated_at": "2020-11-17T08:14:59Z",
|
||||
"updated_at": "2020-11-17T13:20:19Z",
|
||||
"pushed_at": "2020-11-16T22:32:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 17,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313596733,
|
||||
"name": "HG532d-RCE-Exploit",
|
||||
"full_name": "wilfred-wulbou\/HG532d-RCE-Exploit",
|
||||
"owner": {
|
||||
"login": "wilfred-wulbou",
|
||||
"id": 25276623,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25276623?v=4",
|
||||
"html_url": "https:\/\/github.com\/wilfred-wulbou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wilfred-wulbou\/HG532d-RCE-Exploit",
|
||||
"description": "A Remote Code Execution (RCE) exploit for Huawei HG532d based on CVE-2017-17215 vulnerability. Modded from original PoC code from exploit-db.com",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-17T11:22:20Z",
|
||||
"updated_at": "2020-11-17T11:51:43Z",
|
||||
"pushed_at": "2020-11-17T11:33:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-17T07:58:03Z",
|
||||
"updated_at": "2020-11-17T11:25:27Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 766,
|
||||
"watchers": 767,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-04-10T16:06:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -102,10 +102,10 @@
|
|||
"html_url": "https:\/\/github.com\/dcsync"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dcsync\/rtfkit",
|
||||
"description": "RTF exploit kits for cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174",
|
||||
"description": "generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-16T22:21:54Z",
|
||||
"updated_at": "2020-11-17T08:14:59Z",
|
||||
"updated_at": "2020-11-17T13:20:19Z",
|
||||
"pushed_at": "2020-11-16T22:32:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T14:14:12Z",
|
||||
"updated_at": "2020-11-04T20:19:55Z",
|
||||
"updated_at": "2020-11-17T11:14:58Z",
|
||||
"pushed_at": "2020-07-24T17:54:54Z",
|
||||
"stargazers_count": 469,
|
||||
"watchers_count": 469,
|
||||
"stargazers_count": 470,
|
||||
"watchers_count": 470,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"watchers": 469,
|
||||
"watchers": 470,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-17T07:58:03Z",
|
||||
"updated_at": "2020-11-17T11:25:27Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 766,
|
||||
"watchers": 767,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2020-11-06T14:04:19Z",
|
||||
"updated_at": "2020-11-17T09:59:26Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 441,
|
||||
"watchers_count": 441,
|
||||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"forks_count": 204,
|
||||
"forks": 204,
|
||||
"watchers": 441,
|
||||
"watchers": 440,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2106,13 +2106,13 @@
|
|||
"description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-07T05:15:23Z",
|
||||
"updated_at": "2020-04-06T02:00:19Z",
|
||||
"updated_at": "2020-11-17T15:10:29Z",
|
||||
"pushed_at": "2019-09-20T04:53:41Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-05T12:53:52Z",
|
||||
"updated_at": "2020-11-17T01:48:15Z",
|
||||
"updated_at": "2020-11-17T14:42:20Z",
|
||||
"pushed_at": "2019-04-09T16:49:19Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 220,
|
||||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Jackson Rce For CVE-2019-12384 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-24T07:12:14Z",
|
||||
"updated_at": "2020-11-16T19:35:45Z",
|
||||
"updated_at": "2020-11-17T14:38:51Z",
|
||||
"pushed_at": "2019-07-24T07:31:42Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 68,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2020-11-10T16:10:15Z",
|
||||
"updated_at": "2020-11-17T14:42:06Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-17T06:26:35Z",
|
||||
"updated_at": "2020-11-17T15:09:04Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2056,
|
||||
"watchers_count": 2056,
|
||||
"forks_count": 554,
|
||||
"forks": 554,
|
||||
"watchers": 2056,
|
||||
"stargazers_count": 2058,
|
||||
"watchers_count": 2058,
|
||||
"forks_count": 555,
|
||||
"forks": 555,
|
||||
"watchers": 2058,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T12:42:54Z",
|
||||
"updated_at": "2020-10-28T06:04:16Z",
|
||||
"updated_at": "2020-11-17T10:13:22Z",
|
||||
"pushed_at": "2019-05-21T14:52:36Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2020-11-10T07:13:02Z",
|
||||
"updated_at": "2020-11-17T09:11:55Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 511,
|
||||
"watchers_count": 511,
|
||||
"stargazers_count": 512,
|
||||
"watchers_count": 512,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 511,
|
||||
"watchers": 512,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-17T07:58:03Z",
|
||||
"updated_at": "2020-11-17T11:25:27Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 766,
|
||||
"watchers": 767,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-11T09:08:02Z",
|
||||
"updated_at": "2020-10-22T09:55:46Z",
|
||||
"updated_at": "2020-11-17T09:49:41Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2020-11-01T10:33:58Z",
|
||||
"updated_at": "2020-11-17T14:53:06Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 181,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-11-13T05:27:25Z",
|
||||
"updated_at": "2020-11-17T12:24:25Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 234,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T16:04:30Z",
|
||||
"updated_at": "2020-11-11T05:58:02Z",
|
||||
"updated_at": "2020-11-17T12:39:16Z",
|
||||
"pushed_at": "2020-10-07T08:10:46Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-11-13T03:09:36Z",
|
||||
"updated_at": "2020-11-17T12:11:12Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 240,
|
||||
"watchers": 241,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,13 +266,13 @@
|
|||
"description": "Exploitation Script for CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T15:29:52Z",
|
||||
"updated_at": "2020-10-19T15:20:34Z",
|
||||
"updated_at": "2020-11-17T12:36:40Z",
|
||||
"pushed_at": "2020-04-01T06:57:50Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -611,13 +611,13 @@
|
|||
"description": "Advanced scanner for CVE-2020-0796 - SMBv3 RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-14T02:07:16Z",
|
||||
"updated_at": "2020-10-18T05:44:56Z",
|
||||
"updated_at": "2020-11-17T14:47:44Z",
|
||||
"pushed_at": "2020-08-09T13:15:48Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -864,13 +864,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-11-15T08:33:45Z",
|
||||
"updated_at": "2020-11-17T09:42:43Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 1031,
|
||||
"watchers_count": 1031,
|
||||
"forks_count": 346,
|
||||
"forks": 346,
|
||||
"watchers": 1031,
|
||||
"stargazers_count": 1032,
|
||||
"watchers_count": 1032,
|
||||
"forks_count": 347,
|
||||
"forks": 347,
|
||||
"watchers": 1032,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2020-11-17T07:16:47Z",
|
||||
"updated_at": "2020-11-17T12:39:14Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 344,
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 345,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-11-16T13:02:27Z",
|
||||
"updated_at": "2020-11-17T13:44:20Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 220,
|
||||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-17T06:26:35Z",
|
||||
"updated_at": "2020-11-17T15:09:04Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2056,
|
||||
"watchers_count": 2056,
|
||||
"forks_count": 554,
|
||||
"forks": 554,
|
||||
"watchers": 2056,
|
||||
"stargazers_count": 2058,
|
||||
"watchers_count": 2058,
|
||||
"forks_count": 555,
|
||||
"forks": 555,
|
||||
"watchers": 2058,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-11-17T09:04:26Z",
|
||||
"updated_at": "2020-11-17T12:47:01Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 183,
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 184,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -481,5 +481,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313643357,
|
||||
"name": "CVE-2020-14882",
|
||||
"full_name": "BabyTeam1024\/CVE-2020-14882",
|
||||
"owner": {
|
||||
"login": "BabyTeam1024",
|
||||
"id": 74447452,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/74447452?v=4",
|
||||
"html_url": "https:\/\/github.com\/BabyTeam1024"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-17T14:23:23Z",
|
||||
"updated_at": "2020-11-17T14:23:23Z",
|
||||
"pushed_at": "2020-11-17T14:23:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Fix CVE-2020-15228 (set-env, add-path in Github-Actions)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T11:59:47Z",
|
||||
"updated_at": "2020-11-16T10:31:53Z",
|
||||
"updated_at": "2020-11-17T14:06:12Z",
|
||||
"pushed_at": "2020-11-16T10:31:51Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-15999",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T16:16:25Z",
|
||||
"updated_at": "2020-11-16T10:46:21Z",
|
||||
"updated_at": "2020-11-17T11:48:50Z",
|
||||
"pushed_at": "2020-11-03T17:53:20Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,13 +174,13 @@
|
|||
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-16T23:03:15Z",
|
||||
"updated_at": "2020-11-02T17:37:16Z",
|
||||
"updated_at": "2020-11-17T13:20:45Z",
|
||||
"pushed_at": "2020-10-16T23:12:52Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2020-11-15T13:05:44Z",
|
||||
"updated_at": "2020-11-17T12:37:47Z",
|
||||
"pushed_at": "2020-06-10T10:49:38Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-17T07:58:03Z",
|
||||
"updated_at": "2020-11-17T11:25:27Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 766,
|
||||
"watchers": 767,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic coherence.jar RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T09:04:43Z",
|
||||
"updated_at": "2020-11-14T14:26:59Z",
|
||||
"updated_at": "2020-11-17T09:44:11Z",
|
||||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2311,6 +2311,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [AirEvan/CVE-2020-14882-GUI-Test](https://github.com/AirEvan/CVE-2020-14882-GUI-Test)
|
||||
- [corelight/CVE-2020-14882-weblogicRCE](https://github.com/corelight/CVE-2020-14882-weblogicRCE)
|
||||
- [x51/CVE-2020-14882](https://github.com/x51/CVE-2020-14882)
|
||||
- [BabyTeam1024/CVE-2020-14882](https://github.com/BabyTeam1024/CVE-2020-14882)
|
||||
|
||||
### CVE-2020-14883 (2020-10-21)
|
||||
|
||||
|
@ -11718,6 +11719,7 @@ Huawei HG532 with some customized versions has a remote code execution vulnerabi
|
|||
</code>
|
||||
|
||||
- [1337g/CVE-2017-17215](https://github.com/1337g/CVE-2017-17215)
|
||||
- [wilfred-wulbou/HG532d-RCE-Exploit](https://github.com/wilfred-wulbou/HG532d-RCE-Exploit)
|
||||
|
||||
### CVE-2017-17309 (2018-06-14)
|
||||
|
||||
|
|
Loading…
Reference in a new issue