mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/09/28 06:08:50
This commit is contained in:
parent
aa467a643f
commit
0ff8fe87ec
25 changed files with 93 additions and 339 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 291075050,
|
||||
"name": "CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
|
||||
"full_name": "Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
|
||||
"owner": {
|
||||
"login": "Parcer0",
|
||||
"id": 70012338,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/70012338?v=4",
|
||||
"html_url": "https:\/\/github.com\/Parcer0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-28T15:01:49Z",
|
||||
"updated_at": "2020-08-28T15:04:23Z",
|
||||
"pushed_at": "2020-08-28T15:04:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 224839310,
|
||||
"name": "CVE-2007-0038",
|
||||
"full_name": "Axua\/CVE-2007-0038",
|
||||
"owner": {
|
||||
"login": "Axua",
|
||||
"id": 28788087,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
|
||||
"html_url": "https:\/\/github.com\/Axua"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038",
|
||||
"description": "IE7 buffer overflow through an ANI file",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-29T11:15:39Z",
|
||||
"updated_at": "2020-04-30T04:01:07Z",
|
||||
"pushed_at": "2019-11-29T11:16:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 27229028,
|
||||
"name": "spydir",
|
||||
"full_name": "z3APA3A\/spydir",
|
||||
"owner": {
|
||||
"login": "z3APA3A",
|
||||
"id": 7222768,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7222768?v=4",
|
||||
"html_url": "https:\/\/github.com\/z3APA3A"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z3APA3A\/spydir",
|
||||
"description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)",
|
||||
"fork": false,
|
||||
"created_at": "2014-11-27T14:36:05Z",
|
||||
"updated_at": "2020-09-04T11:59:08Z",
|
||||
"pushed_at": "2017-04-08T16:40:03Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 162495501,
|
||||
"name": "CVE-2007-1567",
|
||||
"full_name": "war4uthor\/CVE-2007-1567",
|
||||
"owner": {
|
||||
"login": "war4uthor",
|
||||
"id": 45926018,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45926018?v=4",
|
||||
"html_url": "https:\/\/github.com\/war4uthor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2007-1567",
|
||||
"description": "CVE-2007-1567 - WarFTP 1.65 'USER' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-19T22:02:54Z",
|
||||
"updated_at": "2018-12-19T22:14:07Z",
|
||||
"pushed_at": "2018-12-19T22:06:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,29 +22,6 @@
|
|||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 195401614,
|
||||
"name": "metasploitable2",
|
||||
"full_name": "Unix13\/metasploitable2",
|
||||
"owner": {
|
||||
"login": "Unix13",
|
||||
"id": 52569108,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/52569108?v=4",
|
||||
"html_url": "https:\/\/github.com\/Unix13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Unix13\/metasploitable2",
|
||||
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-05T11:55:41Z",
|
||||
"updated_at": "2020-08-26T14:48:27Z",
|
||||
"pushed_at": "2018-07-11T18:22:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 211957347,
|
||||
"name": "smb_usermap",
|
||||
|
@ -113,51 +90,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 257885318,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "3x1t1um\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "3x1t1um",
|
||||
"id": 54857145,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54857145?v=4",
|
||||
"html_url": "https:\/\/github.com\/3x1t1um"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T11:47:16Z",
|
||||
"updated_at": "2020-08-04T14:13:55Z",
|
||||
"pushed_at": "2020-08-04T14:13:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 264335823,
|
||||
"name": "smb-usermap-destroyer",
|
||||
"full_name": "nickvourd\/smb-usermap-destroyer",
|
||||
"owner": {
|
||||
"login": "nickvourd",
|
||||
"id": 32869078,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/32869078?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickvourd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickvourd\/smb-usermap-destroyer",
|
||||
"description": "Smb Usermap Destoyer is a python2 exploit for CVE-2007-2447 ( 'Username' map script' Command Execution ).",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-16T01:36:28Z",
|
||||
"updated_at": "2020-05-30T10:13:25Z",
|
||||
"pushed_at": "2020-05-30T10:13:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 150516602,
|
||||
"name": "CVE-2007-4607",
|
||||
"full_name": "joeyrideout\/CVE-2007-4607",
|
||||
"owner": {
|
||||
"login": "joeyrideout",
|
||||
"id": 4960269,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4960269?v=4",
|
||||
"html_url": "https:\/\/github.com\/joeyrideout"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/joeyrideout\/CVE-2007-4607",
|
||||
"description": "Make CVE-2007-4607 exploitable again!",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-27T02:22:45Z",
|
||||
"updated_at": "2018-09-27T02:24:14Z",
|
||||
"pushed_at": "2018-09-27T02:23:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 127828851,
|
||||
"name": "CVE-2007-6638",
|
||||
"full_name": "alt3kx\/CVE-2007-6638",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-6638",
|
||||
"description": "March Networks DVR 3204 - Logfile Information Disclosure",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-03T00:36:34Z",
|
||||
"updated_at": "2018-04-03T01:04:29Z",
|
||||
"pushed_at": "2018-04-03T01:04:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-18T04:24:43Z",
|
||||
"updated_at": "2020-09-25T20:32:39Z",
|
||||
"updated_at": "2020-09-27T17:24:55Z",
|
||||
"pushed_at": "2019-09-30T23:38:11Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "I'll submit the poc after blackhat",
|
||||
"fork": false,
|
||||
"created_at": "2015-07-17T06:09:41Z",
|
||||
"updated_at": "2020-07-12T12:33:04Z",
|
||||
"updated_at": "2020-09-27T16:39:02Z",
|
||||
"pushed_at": "2015-08-30T19:24:32Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T18:17:28Z",
|
||||
"updated_at": "2020-07-21T07:16:15Z",
|
||||
"updated_at": "2020-09-27T15:26:45Z",
|
||||
"pushed_at": "2017-11-21T20:34:57Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -918,5 +918,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299110384,
|
||||
"name": "cve-2018-6574",
|
||||
"full_name": "lsnakazone\/cve-2018-6574",
|
||||
"owner": {
|
||||
"login": "lsnakazone",
|
||||
"id": 19561374,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19561374?v=4",
|
||||
"html_url": "https:\/\/github.com\/lsnakazone"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lsnakazone\/cve-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-27T20:08:49Z",
|
||||
"updated_at": "2020-09-27T20:15:07Z",
|
||||
"pushed_at": "2020-09-27T20:15:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2020-09-27T04:30:34Z",
|
||||
"updated_at": "2020-09-27T17:01:04Z",
|
||||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 438,
|
||||
"watchers": 437,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2020-09-25T09:13:37Z",
|
||||
"updated_at": "2020-09-27T21:04:12Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"forks_count": 189,
|
||||
"forks": 189,
|
||||
"watchers": 336,
|
||||
"watchers": 335,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1301,13 +1301,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-09-22T01:54:07Z",
|
||||
"updated_at": "2020-09-27T19:39:42Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 760,
|
||||
"watchers_count": 760,
|
||||
"stargazers_count": 761,
|
||||
"watchers_count": 761,
|
||||
"forks_count": 186,
|
||||
"forks": 186,
|
||||
"watchers": 760,
|
||||
"watchers": 761,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-11T13:55:33Z",
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -201,8 +201,8 @@
|
|||
"pushed_at": "2020-04-25T05:06:45Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 578,
|
||||
"watchers_count": 578,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 578,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-18T16:25:28Z",
|
||||
"updated_at": "2020-09-10T20:41:21Z",
|
||||
"updated_at": "2020-09-27T17:52:29Z",
|
||||
"pushed_at": "2020-08-19T15:34:30Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-27T11:15:00Z",
|
||||
"updated_at": "2020-09-27T15:36:44Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1893,
|
||||
"watchers_count": 1893,
|
||||
"stargazers_count": 1894,
|
||||
"watchers_count": 1894,
|
||||
"forks_count": 492,
|
||||
"forks": 492,
|
||||
"watchers": 1893,
|
||||
"watchers": 1894,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -362,8 +362,8 @@
|
|||
"pushed_at": "2020-01-14T15:53:14Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-09-25T01:30:24Z",
|
||||
"updated_at": "2020-09-27T16:00:34Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 417,
|
||||
"watchers_count": 417,
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 417,
|
||||
"watchers": 418,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-07-17T07:54:26Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-27T05:36:32Z",
|
||||
"updated_at": "2020-09-27T18:28:36Z",
|
||||
"pushed_at": "2020-09-23T07:04:58Z",
|
||||
"stargazers_count": 1064,
|
||||
"watchers_count": 1064,
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-09-27T09:42:43Z",
|
||||
"updated_at": "2020-09-27T16:36:28Z",
|
||||
"pushed_at": "2020-09-25T15:32:01Z",
|
||||
"stargazers_count": 615,
|
||||
"watchers_count": 615,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 615,
|
||||
"stargazers_count": 616,
|
||||
"watchers_count": 616,
|
||||
"forks_count": 175,
|
||||
"forks": 175,
|
||||
"watchers": 616,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-09-26T14:32:07Z",
|
||||
"updated_at": "2020-09-27T19:19:46Z",
|
||||
"pushed_at": "2020-09-17T18:06:57Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploits for CVE-2020-17382",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T18:26:32Z",
|
||||
"updated_at": "2020-09-27T14:16:57Z",
|
||||
"updated_at": "2020-09-27T19:59:02Z",
|
||||
"pushed_at": "2020-09-26T15:17:50Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 46,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-27T11:15:00Z",
|
||||
"updated_at": "2020-09-27T15:36:44Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1893,
|
||||
"watchers_count": 1893,
|
||||
"stargazers_count": 1894,
|
||||
"watchers_count": 1894,
|
||||
"forks_count": 492,
|
||||
"forks": 492,
|
||||
"watchers": 1893,
|
||||
"watchers": 1894,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-07-07T07:19:16Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-19T10:55:15Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
|
|
52
README.md
52
README.md
|
@ -6649,6 +6649,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [illnino/CVE-2018-6574](https://github.com/illnino/CVE-2018-6574)
|
||||
- [TakuCoder/CVE-2018-6574](https://github.com/TakuCoder/CVE-2018-6574)
|
||||
- [kawkab101/cve-2018-6574](https://github.com/kawkab101/cve-2018-6574)
|
||||
- [lsnakazone/cve-2018-6574](https://github.com/lsnakazone/cve-2018-6574)
|
||||
|
||||
### CVE-2018-6622
|
||||
|
||||
|
@ -15063,30 +15064,6 @@ Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before
|
|||
|
||||
|
||||
## 2007
|
||||
### CVE-2007-0038
|
||||
|
||||
<code>
|
||||
Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.
|
||||
</code>
|
||||
|
||||
- [Axua/CVE-2007-0038](https://github.com/Axua/CVE-2007-0038)
|
||||
|
||||
### CVE-2007-0843
|
||||
|
||||
<code>
|
||||
The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
|
||||
</code>
|
||||
|
||||
- [z3APA3A/spydir](https://github.com/z3APA3A/spydir)
|
||||
|
||||
### CVE-2007-1567
|
||||
|
||||
<code>
|
||||
Stack-based buffer overflow in War FTP Daemon 1.65, and possibly earlier, allows remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors, as demonstrated by warftp_165.tar by Immunity. NOTE: this might be the same issue as CVE-1999-0256, CVE-2000-0131, or CVE-2006-2171, but due to Immunity's lack of details, this cannot be certain.
|
||||
</code>
|
||||
|
||||
- [war4uthor/CVE-2007-1567](https://github.com/war4uthor/CVE-2007-1567)
|
||||
|
||||
### CVE-2007-2447
|
||||
|
||||
<code>
|
||||
|
@ -15094,12 +15071,9 @@ The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote
|
|||
</code>
|
||||
|
||||
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
|
||||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
|
||||
- [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script)
|
||||
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
|
||||
- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447)
|
||||
- [nickvourd/smb-usermap-destroyer](https://github.com/nickvourd/smb-usermap-destroyer)
|
||||
|
||||
### CVE-2007-3830
|
||||
|
||||
|
@ -15117,14 +15091,6 @@ PHP remote file inclusion in main.php in ISS Proventia Network IPS GX5108 1.3 an
|
|||
|
||||
- [alt3kx/CVE-2007-3831](https://github.com/alt3kx/CVE-2007-3831)
|
||||
|
||||
### CVE-2007-4607
|
||||
|
||||
<code>
|
||||
Buffer overflow in the EasyMailSMTPObj ActiveX control in emsmtp.dll 6.0.1 in the Quiksoft EasyMail SMTP Object, as used in Postcast Server Pro 3.0.61 and other products, allows remote attackers to execute arbitrary code via a long argument to the SubmitToExpress method, a different vulnerability than CVE-2007-1029. NOTE: this may have been fixed in version 6.0.3.15.
|
||||
</code>
|
||||
|
||||
- [joeyrideout/CVE-2007-4607](https://github.com/joeyrideout/CVE-2007-4607)
|
||||
|
||||
### CVE-2007-5036
|
||||
|
||||
<code>
|
||||
|
@ -15133,14 +15099,6 @@ Multiple buffer overflows in the AirDefense Airsensor M520 with firmware 4.3.1.1
|
|||
|
||||
- [alt3kx/CVE-2007-5036](https://github.com/alt3kx/CVE-2007-5036)
|
||||
|
||||
### CVE-2007-6638
|
||||
|
||||
<code>
|
||||
March Networks DVR 3204 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain usernames, passwords, device names, and IP addresses via a direct request for scripts/logfiles.tar.gz.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2007-6638](https://github.com/alt3kx/CVE-2007-6638)
|
||||
|
||||
|
||||
## 2006
|
||||
### CVE-2006-0450
|
||||
|
@ -15211,14 +15169,6 @@ Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.
|
|||
|
||||
|
||||
## 2005
|
||||
### CVE-2005-0603
|
||||
|
||||
<code>
|
||||
viewtopic.php in phpBB 2.0.12 and earlier allows remote attackers to obtain sensitive information via a highlight parameter containing invalid regular expression syntax, which reveals the path in a PHP error message.
|
||||
</code>
|
||||
|
||||
- [Parcer0/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure](https://github.com/Parcer0/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure)
|
||||
|
||||
### CVE-2005-1125
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue