mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/04/01 00:11:14
This commit is contained in:
parent
25209d0503
commit
0c3e692625
35 changed files with 207 additions and 146 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-30T08:47:45Z",
|
||||
"updated_at": "2021-03-31T12:06:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"stargazers_count": 980,
|
||||
"watchers_count": 980,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 978,
|
||||
"watchers": 980,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-30T08:47:45Z",
|
||||
"updated_at": "2021-03-31T12:06:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"stargazers_count": 980,
|
||||
"watchers_count": 980,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 978,
|
||||
"watchers": 980,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"forks_count": 110,
|
||||
"forks": 110,
|
||||
"watchers": 276,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-30T08:47:45Z",
|
||||
"updated_at": "2021-03-31T12:06:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"stargazers_count": 980,
|
||||
"watchers_count": 980,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 978,
|
||||
"watchers": 980,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -68,29 +68,6 @@
|
|||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116402577,
|
||||
"name": "cve-2017-5753",
|
||||
"full_name": "xsscx\/cve-2017-5753",
|
||||
"owner": {
|
||||
"login": "xsscx",
|
||||
"id": 10790582,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10790582?v=4",
|
||||
"html_url": "https:\/\/github.com\/xsscx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xsscx\/cve-2017-5753",
|
||||
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T16:05:05Z",
|
||||
"updated_at": "2019-12-01T20:12:59Z",
|
||||
"pushed_at": "2018-01-06T13:06:25Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116442461,
|
||||
"name": "spectre-attack-demo",
|
||||
|
@ -137,6 +114,29 @@
|
|||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 116532057,
|
||||
"name": "cve-2017-5753",
|
||||
"full_name": "albertleecn\/cve-2017-5753",
|
||||
"owner": {
|
||||
"login": "albertleecn",
|
||||
"id": 4608961,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4608961?v=4",
|
||||
"html_url": "https:\/\/github.com\/albertleecn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/albertleecn\/cve-2017-5753",
|
||||
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-07T02:46:38Z",
|
||||
"updated_at": "2021-03-31T12:50:11Z",
|
||||
"pushed_at": "2018-01-06T13:06:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263311084,
|
||||
"name": "Spectre-Vulnerability-CVE-2017-5753-",
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-30T08:47:45Z",
|
||||
"updated_at": "2021-03-31T12:06:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"stargazers_count": 980,
|
||||
"watchers_count": 980,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 978,
|
||||
"watchers": 980,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-12T07:17:21Z",
|
||||
"updated_at": "2021-03-26T06:37:25Z",
|
||||
"updated_at": "2021-03-31T12:40:31Z",
|
||||
"pushed_at": "2020-07-08T06:51:47Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1646,8 +1646,8 @@
|
|||
"description": "CVE-2019-0708批量检测",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-11T05:38:26Z",
|
||||
"updated_at": "2020-12-06T10:24:24Z",
|
||||
"pushed_at": "2019-06-11T06:40:41Z",
|
||||
"updated_at": "2021-03-31T10:07:36Z",
|
||||
"pushed_at": "2021-03-31T10:07:34Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
|
@ -2409,8 +2409,8 @@
|
|||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 198,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Atlassian JIRA Template injection vulnerability RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-16T02:27:00Z",
|
||||
"updated_at": "2021-03-26T09:25:39Z",
|
||||
"updated_at": "2021-03-31T13:18:00Z",
|
||||
"pushed_at": "2019-07-22T06:47:52Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-31T07:36:03Z",
|
||||
"updated_at": "2021-03-31T12:20:23Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2451,
|
||||
"watchers_count": 2451,
|
||||
"stargazers_count": 2453,
|
||||
"watchers_count": 2453,
|
||||
"forks_count": 704,
|
||||
"forks": 704,
|
||||
"watchers": 2451,
|
||||
"watchers": 2453,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"forks_count": 154,
|
||||
"forks": 154,
|
||||
"forks_count": 155,
|
||||
"forks": 155,
|
||||
"watchers": 747,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-30T08:47:45Z",
|
||||
"updated_at": "2021-03-31T12:06:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"stargazers_count": 980,
|
||||
"watchers_count": 980,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 978,
|
||||
"watchers": 980,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T14:09:02Z",
|
||||
"updated_at": "2021-03-01T14:10:37Z",
|
||||
"updated_at": "2021-03-31T13:33:47Z",
|
||||
"pushed_at": "2021-03-01T14:10:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-18T03:25:22Z",
|
||||
"updated_at": "2021-01-24T09:54:44Z",
|
||||
"updated_at": "2021-03-31T12:57:07Z",
|
||||
"pushed_at": "2019-10-22T06:44:20Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-24T19:33:10Z",
|
||||
"updated_at": "2021-03-27T03:16:33Z",
|
||||
"updated_at": "2021-03-31T14:20:21Z",
|
||||
"pushed_at": "2021-03-21T20:59:46Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -891,8 +891,8 @@
|
|||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1104,
|
||||
"watchers_count": 1104,
|
||||
"forks_count": 359,
|
||||
"forks": 359,
|
||||
"forks_count": 358,
|
||||
"forks": 358,
|
||||
"watchers": 1104,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-02-14T15:08:01Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-03-24T02:10:56Z",
|
||||
"updated_at": "2021-03-31T11:53:46Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 290,
|
||||
"watchers_count": 290,
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 290,
|
||||
"watchers": 291,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-31T07:36:03Z",
|
||||
"updated_at": "2021-03-31T12:20:23Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2451,
|
||||
"watchers_count": 2451,
|
||||
"stargazers_count": 2453,
|
||||
"watchers_count": 2453,
|
||||
"forks_count": 704,
|
||||
"forks": 704,
|
||||
"watchers": 2451,
|
||||
"watchers": 2453,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-03-31T07:34:04Z",
|
||||
"updated_at": "2021-03-31T15:05:40Z",
|
||||
"pushed_at": "2021-03-30T04:09:42Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 285,
|
||||
"watchers": 287,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2020-17136 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-18T11:16:36Z",
|
||||
"updated_at": "2021-03-18T15:11:29Z",
|
||||
"pushed_at": "2021-03-18T14:41:57Z",
|
||||
"updated_at": "2021-03-31T14:42:21Z",
|
||||
"pushed_at": "2021-03-31T14:42:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-03-02T20:25:35Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T21:00:15Z",
|
||||
"updated_at": "2021-03-02T02:08:51Z",
|
||||
"updated_at": "2021-03-31T12:41:15Z",
|
||||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 209,
|
||||
"watchers": 210,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-30T08:47:45Z",
|
||||
"updated_at": "2021-03-31T12:06:16Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"stargazers_count": 980,
|
||||
"watchers_count": 980,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 978,
|
||||
"watchers": 980,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2021-03-31T06:15:05Z",
|
||||
"updated_at": "2021-03-31T10:51:13Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 229,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1006,8 +1006,8 @@
|
|||
"pushed_at": "2020-07-17T08:09:30Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2021-02-06T08:49:46Z",
|
||||
"updated_at": "2021-03-31T12:52:29Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 197,
|
||||
"watchers": 198,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for CVE-2021-1699",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T08:22:49Z",
|
||||
"updated_at": "2021-03-31T08:29:25Z",
|
||||
"updated_at": "2021-03-31T13:35:56Z",
|
||||
"pushed_at": "2021-03-31T08:29:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-03-31T07:56:51Z",
|
||||
"updated_at": "2021-03-31T13:51:22Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21975.json
Normal file
25
2021/CVE-2021-21975.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 353356863,
|
||||
"name": "VMWare-vRealize-SSRF",
|
||||
"full_name": "Henry4E36\/VMWare-vRealize-SSRF",
|
||||
"owner": {
|
||||
"login": "Henry4E36",
|
||||
"id": 41940481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
|
||||
"html_url": "https:\/\/github.com\/Henry4E36"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Henry4E36\/VMWare-vRealize-SSRF",
|
||||
"description": "VMWare vRealize SSRF-CVE-2021-21975",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T12:56:09Z",
|
||||
"updated_at": "2021-03-31T13:42:25Z",
|
||||
"pushed_at": "2021-03-31T12:58:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "带回显版本的漏洞利用脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:15:27Z",
|
||||
"updated_at": "2021-03-09T14:42:22Z",
|
||||
"updated_at": "2021-03-31T12:35:15Z",
|
||||
"pushed_at": "2021-03-05T11:09:06Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-03-31T07:34:04Z",
|
||||
"updated_at": "2021-03-31T15:05:40Z",
|
||||
"pushed_at": "2021-03-30T04:09:42Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 285,
|
||||
"watchers": 287,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-03-31T06:35:58Z",
|
||||
"updated_at": "2021-03-31T11:44:59Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 37,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29386.json
Normal file
25
2021/CVE-2021-29386.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 316086221,
|
||||
"name": "PowerSchool-Grade-Stealer",
|
||||
"full_name": "Umarovm\/PowerSchool-Grade-Stealer",
|
||||
"owner": {
|
||||
"login": "Umarovm",
|
||||
"id": 25722145,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25722145?v=4",
|
||||
"html_url": "https:\/\/github.com\/Umarovm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Umarovm\/PowerSchool-Grade-Stealer",
|
||||
"description": "Due to a reflected XSS vulnerability in PowerSchool (CVE-2021-29386), it is possible to view other people's grades just by having them click on a link while they are logged in to PowerSchool. This demonstrates that with a proof-of-concept.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-26T00:43:36Z",
|
||||
"updated_at": "2021-03-31T12:18:37Z",
|
||||
"pushed_at": "2021-03-31T12:18:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-03-29T09:22:16Z",
|
||||
"updated_at": "2021-03-31T11:19:52Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"stargazers_count": 663,
|
||||
"watchers_count": 663,
|
||||
"forks_count": 187,
|
||||
"forks": 187,
|
||||
"watchers": 662,
|
||||
"watchers": 663,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2021-03-31T08:16:06Z",
|
||||
"pushed_at": "2021-03-29T13:42:04Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"updated_at": "2021-03-31T12:00:12Z",
|
||||
"pushed_at": "2021-03-31T12:00:09Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 148,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -346,6 +346,9 @@ The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulner
|
|||
|
||||
- [freakanonymous/CVE-2021-21973-Automateme](https://github.com/freakanonymous/CVE-2021-21973-Automateme)
|
||||
|
||||
### CVE-2021-21975
|
||||
- [Henry4E36/VMWare-vRealize-SSRF](https://github.com/Henry4E36/VMWare-vRealize-SSRF)
|
||||
|
||||
### CVE-2021-21978 (2021-03-03)
|
||||
|
||||
<code>
|
||||
|
@ -364,7 +367,12 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
|
|||
|
||||
- [lyy289065406/CVE-2021-22192](https://github.com/lyy289065406/CVE-2021-22192)
|
||||
|
||||
### CVE-2021-22986
|
||||
### CVE-2021-22986 (2021-03-31)
|
||||
|
||||
<code>
|
||||
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
|
||||
</code>
|
||||
|
||||
- [dorkerdevil/CVE-2021-22986-Poc](https://github.com/dorkerdevil/CVE-2021-22986-Poc)
|
||||
- [S1xHcL/f5_rce_poc](https://github.com/S1xHcL/f5_rce_poc)
|
||||
- [Osyanina/westone-CVE-2021-22986-scanner](https://github.com/Osyanina/westone-CVE-2021-22986-scanner)
|
||||
|
@ -635,6 +643,9 @@ Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leve
|
|||
|
||||
- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
|
||||
|
||||
### CVE-2021-29386
|
||||
- [Umarovm/PowerSchool-Grade-Stealer](https://github.com/Umarovm/PowerSchool-Grade-Stealer)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -12086,9 +12097,9 @@ Systems with microprocessors utilizing speculative execution and branch predicti
|
|||
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
|
||||
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
|
||||
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
|
||||
- [xsscx/cve-2017-5753](https://github.com/xsscx/cve-2017-5753)
|
||||
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
|
||||
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
|
||||
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
|
||||
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
|
||||
|
||||
### CVE-2017-5754 (2018-01-04)
|
||||
|
|
Loading…
Reference in a new issue