mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2020/01/20 11:07:05
This commit is contained in:
parent
6cb0814fce
commit
119442a129
53 changed files with 413 additions and 294 deletions
2013
2014
2015
2016
2017
2018
CVE-2018-10933.jsonCVE-2018-13379.jsonCVE-2018-20250.jsonCVE-2018-2894.jsonCVE-2018-4233.jsonCVE-2018-8639.jsonCVE-2018-9546.jsonCVE-2018-9995.json
2019
CVE-2019-0708.jsonCVE-2019-1040.jsonCVE-2019-10758.jsonCVE-2019-11043.jsonCVE-2019-11510.jsonCVE-2019-11581.jsonCVE-2019-11708.jsonCVE-2019-12586.jsonCVE-2019-13272.jsonCVE-2019-1388.jsonCVE-2019-14615.jsonCVE-2019-1579.jsonCVE-2019-16724.jsonCVE-2019-17570.jsonCVE-2019-17571.jsonCVE-2019-18371.jsonCVE-2019-19781.jsonCVE-2019-19844.jsonCVE-2019-20197.jsonCVE-2019-20224.jsonCVE-2019-2198.jsonCVE-2019-2618.jsonCVE-2019-2725.jsonCVE-2019-2729.jsonCVE-2019-2890.jsonCVE-2019-5475.jsonCVE-2019-9810.json
2020
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2016-03-23T12:05:38Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-03T20:28:27Z",
|
||||
"updated_at": "2020-01-15T20:43:37Z",
|
||||
"updated_at": "2020-01-19T21:32:47Z",
|
||||
"pushed_at": "2019-01-31T22:56:17Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 172,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -910,13 +910,13 @@
|
|||
"description": "Shellshock exploit + vulnerable environment",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-07T23:38:50Z",
|
||||
"updated_at": "2020-01-11T23:15:28Z",
|
||||
"updated_at": "2020-01-19T20:23:34Z",
|
||||
"pushed_at": "2017-10-30T22:46:11Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 229318943,
|
||||
"name": "WordPress-Long-Password-Denial-of-Service",
|
||||
"full_name": "Primus27\/WordPress-Long-Password-Denial-of-Service",
|
||||
"owner": {
|
||||
"login": "Primus27",
|
||||
"id": 47760587,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/47760587?v=4",
|
||||
"html_url": "https:\/\/github.com\/Primus27"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Primus27\/WordPress-Long-Password-Denial-of-Service",
|
||||
"description": "Takedown WordPress sites using long passwords (CVE-2014-9016)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-20T18:47:36Z",
|
||||
"updated_at": "2020-01-08T17:02:16Z",
|
||||
"pushed_at": "2020-01-08T17:02:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-12-18T14:11:29Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"forks_count": 176,
|
||||
"forks": 176,
|
||||
"forks_count": 177,
|
||||
"forks": 177,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2015-1805 root tool",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-01T12:10:14Z",
|
||||
"updated_at": "2020-01-10T10:44:28Z",
|
||||
"updated_at": "2020-01-19T11:54:29Z",
|
||||
"pushed_at": "2017-11-23T20:55:03Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"forks_count": 147,
|
||||
"forks": 147,
|
||||
"watchers": 250,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 148,
|
||||
"forks": 148,
|
||||
"watchers": 251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2020-01-11T20:01:04Z",
|
||||
"updated_at": "2020-01-19T02:55:42Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-16T00:23:30Z",
|
||||
"updated_at": "2019-07-22T20:31:15Z",
|
||||
"updated_at": "2020-01-19T14:07:02Z",
|
||||
"pushed_at": "2017-12-16T00:39:19Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2020-01-01T15:46:44Z",
|
||||
"updated_at": "2020-01-19T12:40:51Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 271,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2020-01-01T15:46:44Z",
|
||||
"updated_at": "2020-01-19T12:40:51Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 271,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Android Blueborne RCE CVE-2017-0781",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-17T21:07:24Z",
|
||||
"updated_at": "2020-01-15T18:09:28Z",
|
||||
"updated_at": "2020-01-18T23:03:41Z",
|
||||
"pushed_at": "2018-04-04T12:59:18Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2019-12-23T08:30:20Z",
|
||||
"updated_at": "2020-01-19T13:29:05Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 334,
|
||||
"watchers": 333,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2017/CVE-2017-2751.json
Normal file
25
2017/CVE-2017-2751.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 234817787,
|
||||
"name": "CVE-2017-2751",
|
||||
"full_name": "BaderSZ\/CVE-2017-2751",
|
||||
"owner": {
|
||||
"login": "BaderSZ",
|
||||
"id": 2165320,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2165320?v=4",
|
||||
"html_url": "https:\/\/github.com\/BaderSZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BaderSZ\/CVE-2017-2751",
|
||||
"description": "Mini-paper on CVE-2017-2751, HP EFI password extraction.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T00:41:23Z",
|
||||
"updated_at": "2020-01-19T00:48:09Z",
|
||||
"pushed_at": "2020-01-19T00:48:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T15:24:10Z",
|
||||
"updated_at": "2019-10-30T07:16:41Z",
|
||||
"updated_at": "2020-01-19T10:53:01Z",
|
||||
"pushed_at": "2017-09-19T18:06:41Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -335,13 +335,13 @@
|
|||
"description": "LibSSH Authentication Bypass Exploit using RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T15:34:26Z",
|
||||
"updated_at": "2019-09-02T17:01:18Z",
|
||||
"updated_at": "2020-01-19T09:02:55Z",
|
||||
"pushed_at": "2018-10-25T18:23:52Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-13379",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-11T09:44:37Z",
|
||||
"updated_at": "2020-01-15T06:13:07Z",
|
||||
"updated_at": "2020-01-19T17:22:33Z",
|
||||
"pushed_at": "2019-08-14T08:40:25Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 192,
|
||||
"watchers": 193,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -289,13 +289,13 @@
|
|||
"description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-25T04:22:14Z",
|
||||
"updated_at": "2019-04-09T07:37:30Z",
|
||||
"updated_at": "2020-01-18T19:58:21Z",
|
||||
"pushed_at": "2019-03-26T04:54:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-20T03:59:18Z",
|
||||
"updated_at": "2020-01-16T09:19:02Z",
|
||||
"updated_at": "2020-01-19T02:03:58Z",
|
||||
"pushed_at": "2018-07-20T12:46:50Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-03-05T14:18:07Z",
|
||||
"updated_at": "2019-12-23T08:11:18Z",
|
||||
"updated_at": "2020-01-19T08:54:38Z",
|
||||
"pushed_at": "2019-04-08T08:26:26Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 119,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-02T18:32:17Z",
|
||||
"updated_at": "2020-01-15T12:33:48Z",
|
||||
"updated_at": "2020-01-18T18:34:54Z",
|
||||
"pushed_at": "2020-01-15T12:33:46Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-01-23T14:27:21Z",
|
||||
"stargazers_count": 407,
|
||||
"watchers_count": 407,
|
||||
"forks_count": 165,
|
||||
"forks": 165,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 407,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1163,13 +1163,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-01-17T09:01:50Z",
|
||||
"updated_at": "2020-01-19T22:41:38Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1075,
|
||||
"watchers_count": 1075,
|
||||
"stargazers_count": 1077,
|
||||
"watchers_count": 1077,
|
||||
"forks_count": 361,
|
||||
"forks": 361,
|
||||
"watchers": 1075,
|
||||
"watchers": 1077,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1209,7 +1209,7 @@
|
|||
"description": "cve-2019-0708 vulnerablility scanner",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T05:18:18Z",
|
||||
"updated_at": "2019-05-22T06:09:10Z",
|
||||
"updated_at": "2020-01-19T23:34:36Z",
|
||||
"pushed_at": "2019-05-22T06:06:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -1370,13 +1370,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-01-16T18:23:13Z",
|
||||
"updated_at": "2020-01-19T22:39:08Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 685,
|
||||
"watchers_count": 685,
|
||||
"stargazers_count": 686,
|
||||
"watchers_count": 686,
|
||||
"forks_count": 156,
|
||||
"forks": 156,
|
||||
"watchers": 685,
|
||||
"watchers": 686,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1577,13 +1577,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2020-01-15T00:01:20Z",
|
||||
"updated_at": "2020-01-19T19:24:42Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 994,
|
||||
"watchers_count": 994,
|
||||
"forks_count": 344,
|
||||
"forks": 344,
|
||||
"watchers": 994,
|
||||
"stargazers_count": 996,
|
||||
"watchers_count": 996,
|
||||
"forks_count": 343,
|
||||
"forks": 343,
|
||||
"watchers": 996,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-19T08:32:31Z",
|
||||
"updated_at": "2020-01-13T04:16:26Z",
|
||||
"updated_at": "2020-01-20T01:59:12Z",
|
||||
"pushed_at": "2019-06-19T09:15:16Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T15:33:50Z",
|
||||
"updated_at": "2020-01-16T05:43:30Z",
|
||||
"updated_at": "2020-01-19T04:01:33Z",
|
||||
"pushed_at": "2019-06-28T03:57:26Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 186,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-26T06:58:56Z",
|
||||
"updated_at": "2020-01-18T09:36:30Z",
|
||||
"updated_at": "2020-01-20T01:50:05Z",
|
||||
"pushed_at": "2019-12-26T08:44:54Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-28T11:09:06Z",
|
||||
"updated_at": "2020-01-17T18:47:01Z",
|
||||
"updated_at": "2020-01-19T23:32:18Z",
|
||||
"pushed_at": "2019-10-29T15:47:02Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 110,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-21T08:40:26Z",
|
||||
"updated_at": "2020-01-16T04:49:27Z",
|
||||
"updated_at": "2020-01-19T16:23:20Z",
|
||||
"pushed_at": "2020-01-11T13:55:33Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 277,
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2020-01-16T08:27:52Z",
|
||||
"updated_at": "2020-01-18T22:56:45Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Atlassian JIRA Template injection vulnerability RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-16T02:27:00Z",
|
||||
"updated_at": "2019-12-18T09:06:26Z",
|
||||
"updated_at": "2020-01-18T20:07:35Z",
|
||||
"pushed_at": "2019-07-22T06:47:52Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2020-01-15T22:02:07Z",
|
||||
"updated_at": "2020-01-18T20:50:59Z",
|
||||
"pushed_at": "2019-12-28T18:23:58Z",
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 545,
|
||||
"watchers": 546,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-01-15T21:21:20Z",
|
||||
"updated_at": "2020-01-19T13:43:53Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 627,
|
||||
"watchers_count": 627,
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 627,
|
||||
"watchers": 629,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2020-01-11T19:52:16Z",
|
||||
"updated_at": "2020-01-19T12:56:54Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 206,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T08:23:46Z",
|
||||
"updated_at": "2020-01-18T15:39:03Z",
|
||||
"pushed_at": "2020-01-18T15:39:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"updated_at": "2020-01-19T15:25:48Z",
|
||||
"pushed_at": "2020-01-19T15:25:46Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-10T02:53:03Z",
|
||||
"updated_at": "2019-12-14T16:45:09Z",
|
||||
"updated_at": "2020-01-19T16:08:41Z",
|
||||
"pushed_at": "2019-09-10T15:57:23Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-31T20:28:12Z",
|
||||
"updated_at": "2020-01-15T23:23:03Z",
|
||||
"updated_at": "2020-01-19T04:45:29Z",
|
||||
"pushed_at": "2019-10-30T18:18:43Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-17570.json
Normal file
25
2019/CVE-2019-17570.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 234831125,
|
||||
"name": "CVE-2019-17570",
|
||||
"full_name": "r00t4dm\/CVE-2019-17570",
|
||||
"owner": {
|
||||
"login": "r00t4dm",
|
||||
"id": 36941976,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/36941976?v=4",
|
||||
"html_url": "https:\/\/github.com\/r00t4dm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r00t4dm\/CVE-2019-17570",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T02:57:26Z",
|
||||
"updated_at": "2020-01-19T03:07:41Z",
|
||||
"pushed_at": "2020-01-19T03:07:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-25T16:46:11Z",
|
||||
"updated_at": "2020-01-15T15:42:29Z",
|
||||
"updated_at": "2020-01-20T01:50:13Z",
|
||||
"pushed_at": "2019-12-25T16:48:41Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2020-01-18T12:08:50Z",
|
||||
"updated_at": "2020-01-20T01:59:18Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 100,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2020-01-18T13:59:06Z",
|
||||
"updated_at": "2020-01-19T16:23:14Z",
|
||||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 276,
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 281,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2020-01-18T11:04:02Z",
|
||||
"updated_at": "2020-01-19T11:04:47Z",
|
||||
"pushed_at": "2020-01-16T16:23:50Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 428,
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 431,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,7 +105,7 @@
|
|||
"description": "Citrix ADC Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T03:10:12Z",
|
||||
"updated_at": "2020-01-17T07:51:53Z",
|
||||
"updated_at": "2020-01-18T22:53:59Z",
|
||||
"pushed_at": "2020-01-11T14:03:52Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-01-18T13:37:18Z",
|
||||
"updated_at": "2020-01-19T03:58:30Z",
|
||||
"pushed_at": "2020-01-13T18:54:57Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,13 +266,13 @@
|
|||
"description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-12T15:16:54Z",
|
||||
"updated_at": "2020-01-18T17:07:48Z",
|
||||
"updated_at": "2020-01-19T17:11:27Z",
|
||||
"pushed_at": "2020-01-17T22:01:20Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -298,6 +298,29 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 233473212,
|
||||
"name": "CVE-2019-19781",
|
||||
"full_name": "x1sec\/CVE-2019-19781",
|
||||
"owner": {
|
||||
"login": "x1sec",
|
||||
"id": 11153104,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11153104?v=4",
|
||||
"html_url": "https:\/\/github.com\/x1sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/x1sec\/CVE-2019-19781",
|
||||
"description": "DFIR notes for Citrix Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-12T23:13:56Z",
|
||||
"updated_at": "2020-01-19T14:06:14Z",
|
||||
"pushed_at": "2020-01-19T14:06:12Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 233493025,
|
||||
"name": "CVE-2019-19781",
|
||||
|
@ -358,13 +381,13 @@
|
|||
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-13T10:09:31Z",
|
||||
"updated_at": "2020-01-18T10:25:47Z",
|
||||
"updated_at": "2020-01-19T01:55:53Z",
|
||||
"pushed_at": "2020-01-15T13:58:22Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -542,8 +565,8 @@
|
|||
"description": "Check ADC for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T12:33:00Z",
|
||||
"updated_at": "2020-01-18T17:49:45Z",
|
||||
"pushed_at": "2020-01-18T17:49:43Z",
|
||||
"updated_at": "2020-01-19T21:56:01Z",
|
||||
"pushed_at": "2020-01-19T21:55:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T04:30:34Z",
|
||||
"updated_at": "2020-01-18T17:12:32Z",
|
||||
"updated_at": "2020-01-19T01:20:11Z",
|
||||
"pushed_at": "2019-12-24T12:31:47Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Nagios XI远程命令执行漏洞 <v5.6.9",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-08T08:16:30Z",
|
||||
"updated_at": "2020-01-17T01:04:33Z",
|
||||
"updated_at": "2020-01-19T03:27:12Z",
|
||||
"pushed_at": "2020-01-08T08:30:03Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T13:41:28Z",
|
||||
"updated_at": "2020-01-15T03:14:03Z",
|
||||
"updated_at": "2020-01-20T01:59:08Z",
|
||||
"pushed_at": "2020-01-10T13:42:12Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-14T12:20:18Z",
|
||||
"updated_at": "2020-01-17T23:32:50Z",
|
||||
"updated_at": "2020-01-19T14:39:08Z",
|
||||
"pushed_at": "2020-01-17T10:10:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-04-17T15:05:09Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-01-16T06:01:25Z",
|
||||
"updated_at": "2020-01-19T07:30:06Z",
|
||||
"pushed_at": "2019-06-24T06:06:48Z",
|
||||
"stargazers_count": 482,
|
||||
"watchers_count": 482,
|
||||
"forks_count": 103,
|
||||
"forks": 103,
|
||||
"watchers": 482,
|
||||
"stargazers_count": 483,
|
||||
"watchers_count": 483,
|
||||
"forks_count": 104,
|
||||
"forks": 104,
|
||||
"watchers": 483,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"forks_count": 126,
|
||||
"forks": 126,
|
||||
"watchers": 291,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -339,8 +339,8 @@
|
|||
"pushed_at": "2019-09-26T05:46:14Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-13T17:16:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-10-17T01:25:41Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-06T08:46:31Z",
|
||||
"updated_at": "2020-01-08T15:05:44Z",
|
||||
"updated_at": "2020-01-19T02:45:17Z",
|
||||
"pushed_at": "2019-12-06T09:18:56Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-25T16:22:56Z",
|
||||
"updated_at": "2019-11-14T11:22:45Z",
|
||||
"updated_at": "2020-01-19T08:02:50Z",
|
||||
"pushed_at": "2019-09-25T16:33:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-05T17:19:02Z",
|
||||
"updated_at": "2020-01-13T18:52:10Z",
|
||||
"updated_at": "2020-01-18T20:50:49Z",
|
||||
"pushed_at": "2019-12-28T18:25:10Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 189,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-01-18T18:34:35Z",
|
||||
"updated_at": "2020-01-20T02:05:08Z",
|
||||
"pushed_at": "2020-01-17T10:09:11Z",
|
||||
"stargazers_count": 602,
|
||||
"watchers_count": 602,
|
||||
"forks_count": 153,
|
||||
"forks": 153,
|
||||
"watchers": 602,
|
||||
"stargazers_count": 645,
|
||||
"watchers_count": 645,
|
||||
"forks_count": 164,
|
||||
"forks": 164,
|
||||
"watchers": 645,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "A PoC for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:15:32Z",
|
||||
"updated_at": "2020-01-18T18:06:06Z",
|
||||
"updated_at": "2020-01-20T01:03:31Z",
|
||||
"pushed_at": "2020-01-17T13:29:44Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 239,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 257,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +243,13 @@
|
|||
"description": "Proof of Concept for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T23:44:37Z",
|
||||
"updated_at": "2020-01-18T16:30:38Z",
|
||||
"updated_at": "2020-01-19T23:26:50Z",
|
||||
"pushed_at": "2020-01-17T16:32:39Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 30,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,8 +289,8 @@
|
|||
"description": "Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T15:13:37Z",
|
||||
"updated_at": "2020-01-18T19:22:44Z",
|
||||
"pushed_at": "2020-01-18T19:22:42Z",
|
||||
"updated_at": "2020-01-18T22:08:12Z",
|
||||
"pushed_at": "2020-01-18T22:08:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
@ -335,8 +335,8 @@
|
|||
"description": "CurveBall CVE exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T17:17:55Z",
|
||||
"updated_at": "2020-01-17T23:38:54Z",
|
||||
"pushed_at": "2020-01-17T23:38:52Z",
|
||||
"updated_at": "2020-01-19T00:58:30Z",
|
||||
"pushed_at": "2020-01-19T00:58:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -366,5 +366,74 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234920281,
|
||||
"name": "curveball_lua",
|
||||
"full_name": "dlee35\/curveball_lua",
|
||||
"owner": {
|
||||
"login": "dlee35",
|
||||
"id": 7849311,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7849311?v=4",
|
||||
"html_url": "https:\/\/github.com\/dlee35"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dlee35\/curveball_lua",
|
||||
"description": "Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffic",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T15:20:19Z",
|
||||
"updated_at": "2020-01-19T21:25:55Z",
|
||||
"pushed_at": "2020-01-19T21:25:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234944443,
|
||||
"name": "-CVE-2020-0601-ECC---EXPLOIT",
|
||||
"full_name": "IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
|
||||
"owner": {
|
||||
"login": "IIICTECH",
|
||||
"id": 5104528,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5104528?v=4",
|
||||
"html_url": "https:\/\/github.com\/IIICTECH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
|
||||
"description": "CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T18:20:26Z",
|
||||
"updated_at": "2020-01-19T18:29:55Z",
|
||||
"pushed_at": "2020-01-19T18:26:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235000073,
|
||||
"name": "CVE-2020-0601",
|
||||
"full_name": "cosmicifint\/CVE-2020-0601",
|
||||
"owner": {
|
||||
"login": "cosmicifint",
|
||||
"id": 50549802,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50549802?v=4",
|
||||
"html_url": "https:\/\/github.com\/cosmicifint"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cosmicifint\/CVE-2020-0601",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T02:04:05Z",
|
||||
"updated_at": "2020-01-20T02:05:22Z",
|
||||
"pushed_at": "2020-01-20T02:05:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T07:08:06Z",
|
||||
"updated_at": "2020-01-18T17:07:06Z",
|
||||
"updated_at": "2020-01-19T14:00:20Z",
|
||||
"pushed_at": "2020-01-18T07:14:34Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234700793,
|
||||
"id": 234901198,
|
||||
"name": "CVE-2020-2551",
|
||||
"full_name": "hktalent\/CVE-2020-2551",
|
||||
"owner": {
|
||||
|
@ -33,11 +33,11 @@
|
|||
"html_url": "https:\/\/github.com\/hktalent"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hktalent\/CVE-2020-2551",
|
||||
"description": "CVE-2020-2551 ,CVE-2020-2546 poc,exploit,python3",
|
||||
"description": "CVE-2020-2551 poc exploit python example",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T07:55:16Z",
|
||||
"updated_at": "2020-01-18T13:07:00Z",
|
||||
"pushed_at": "2020-01-18T07:56:18Z",
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-01-20T01:57:51Z",
|
||||
"pushed_at": "2020-01-20T01:57:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T05:35:01Z",
|
||||
"updated_at": "2020-01-18T14:38:57Z",
|
||||
"updated_at": "2020-01-20T02:06:06Z",
|
||||
"pushed_at": "2020-01-17T05:42:53Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept exploit for CVE-2020-5509 | RCE in the Car Rental Project v.1.0 webapplication",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-05T22:13:24Z",
|
||||
"updated_at": "2020-01-09T16:47:12Z",
|
||||
"updated_at": "2020-01-19T04:45:14Z",
|
||||
"pushed_at": "2020-01-05T22:23:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue