mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/05/20 12:07:47
This commit is contained in:
parent
cce01e3422
commit
10b41eb204
19 changed files with 82 additions and 58 deletions
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2013-07-05T12:09:00Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 277,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 277,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2017-09-22T22:23:52Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2020-05-19T07:02:50Z",
|
||||
"updated_at": "2020-05-20T00:26:31Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 372,
|
||||
"watchers": 371,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exp of CVE-2018-15982",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-10T04:53:31Z",
|
||||
"updated_at": "2020-04-17T08:09:23Z",
|
||||
"updated_at": "2020-05-20T02:43:32Z",
|
||||
"pushed_at": "2019-01-04T09:29:01Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 171,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2382,13 +2382,13 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2020-05-10T15:54:05Z",
|
||||
"updated_at": "2020-05-20T01:35:58Z",
|
||||
"pushed_at": "2019-10-16T01:04:12Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 152,
|
||||
"watchers": 153,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-19T16:19:49Z",
|
||||
"pushed_at": "2020-05-19T09:58:07Z",
|
||||
"updated_at": "2020-05-20T02:48:55Z",
|
||||
"pushed_at": "2020-05-20T02:48:53Z",
|
||||
"stargazers_count": 730,
|
||||
"watchers_count": 730,
|
||||
"forks_count": 158,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-05-19T11:17:25Z",
|
||||
"updated_at": "2020-05-20T02:08:53Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 557,
|
||||
"watchers_count": 557,
|
||||
"stargazers_count": 558,
|
||||
"watchers_count": 558,
|
||||
"forks_count": 125,
|
||||
"forks": 125,
|
||||
"watchers": 557,
|
||||
"watchers": 558,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2020-05-18T10:43:06Z",
|
||||
"updated_at": "2020-05-20T02:10:12Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-15T04:13:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -67,5 +67,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 265379352,
|
||||
"name": "Wordpress_CVE-2019-9787",
|
||||
"full_name": "matinciel\/Wordpress_CVE-2019-9787",
|
||||
"owner": {
|
||||
"login": "matinciel",
|
||||
"id": 39257302,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/39257302?v=4",
|
||||
"html_url": "https:\/\/github.com\/matinciel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/matinciel\/Wordpress_CVE-2019-9787",
|
||||
"description": "Try to reproduce this issue with Docker",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T22:09:43Z",
|
||||
"updated_at": "2020-05-19T22:30:08Z",
|
||||
"pushed_at": "2020-05-19T22:30:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2020-05-19T00:25:07Z",
|
||||
"updated_at": "2020-05-20T01:00:46Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-19T16:19:49Z",
|
||||
"pushed_at": "2020-05-19T09:58:07Z",
|
||||
"updated_at": "2020-05-20T02:48:55Z",
|
||||
"pushed_at": "2020-05-20T02:48:53Z",
|
||||
"stargazers_count": 730,
|
||||
"watchers_count": 730,
|
||||
"forks_count": 158,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Check CVE-2020-11932 (ubuntu server) and test host relating to this vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-14T11:47:52Z",
|
||||
"updated_at": "2020-05-16T06:21:31Z",
|
||||
"updated_at": "2020-05-20T01:43:13Z",
|
||||
"pushed_at": "2020-05-16T06:21:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 162,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-05-18T10:43:42Z",
|
||||
"updated_at": "2020-05-20T03:02:14Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic coherence.jar RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T09:04:43Z",
|
||||
"updated_at": "2020-05-19T09:26:25Z",
|
||||
"updated_at": "2020-05-20T03:02:23Z",
|
||||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T18:59:26Z",
|
||||
"updated_at": "2020-05-19T21:05:06Z",
|
||||
"updated_at": "2020-05-20T03:00:31Z",
|
||||
"pushed_at": "2020-05-19T20:34:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -4243,6 +4243,7 @@ WordPress before 5.1.1 does not properly filter comment content, leading to Remo
|
|||
- [rkatogit/cve-2019-9787_csrf_poc](https://github.com/rkatogit/cve-2019-9787_csrf_poc)
|
||||
- [PalmTreeForest/CodePath_Week_7-8](https://github.com/PalmTreeForest/CodePath_Week_7-8)
|
||||
- [sijiahi/Wordpress_cve-2019-9787_defense](https://github.com/sijiahi/Wordpress_cve-2019-9787_defense)
|
||||
- [matinciel/Wordpress_CVE-2019-9787](https://github.com/matinciel/Wordpress_CVE-2019-9787)
|
||||
|
||||
### CVE-2019-9810
|
||||
|
||||
|
|
Loading…
Reference in a new issue