mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2020/06/28 12:07:58
This commit is contained in:
parent
530c4d381a
commit
1bf2b3f592
31 changed files with 179 additions and 113 deletions
25
2001/CVE-2001-0758.json
Normal file
25
2001/CVE-2001-0758.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 132980512,
|
||||
"name": "CVE-2001-0758",
|
||||
"full_name": "alt3kx\/CVE-2001-0758",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0758",
|
||||
"description": "Directory traversal vulnerability in Shambala 4.5 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-11T02:47:18Z",
|
||||
"updated_at": "2018-05-11T09:16:42Z",
|
||||
"pushed_at": "2018-05-11T09:16:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-27T16:33:24Z",
|
||||
"updated_at": "2020-06-28T00:51:55Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Concurrent network scanner for CVE-2015-1635",
|
||||
"fork": false,
|
||||
"created_at": "2015-05-04T09:40:29Z",
|
||||
"updated_at": "2019-03-26T05:17:59Z",
|
||||
"updated_at": "2020-06-27T22:53:11Z",
|
||||
"pushed_at": "2017-12-07T04:29:26Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-27T16:33:24Z",
|
||||
"updated_at": "2020-06-28T00:51:55Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -611,13 +611,13 @@
|
|||
"description": "编译好的脏牛漏洞(CVE-2016-5195)EXP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-27T08:06:50Z",
|
||||
"updated_at": "2020-05-31T08:19:09Z",
|
||||
"updated_at": "2020-06-28T01:14:51Z",
|
||||
"pushed_at": "2018-05-27T08:24:17Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-27T16:33:24Z",
|
||||
"updated_at": "2020-06-28T00:51:55Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC CVE-2017-5123 - LPE - Bypassing SMEP\/SMAP. No KASLR",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-08T15:10:38Z",
|
||||
"updated_at": "2020-06-27T16:08:23Z",
|
||||
"updated_at": "2020-06-28T01:29:48Z",
|
||||
"pushed_at": "2020-06-26T13:39:16Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-12T21:06:26Z",
|
||||
"updated_at": "2020-05-01T13:33:32Z",
|
||||
"updated_at": "2020-06-27T23:28:35Z",
|
||||
"pushed_at": "2020-04-13T22:09:50Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-27T16:33:24Z",
|
||||
"updated_at": "2020-06-28T00:51:55Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-06-27T16:44:15Z",
|
||||
"updated_at": "2020-06-28T02:19:16Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 271,
|
||||
"watchers": 273,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1531,13 +1531,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2020-06-27T20:51:10Z",
|
||||
"updated_at": "2020-06-28T02:52:47Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1031,
|
||||
"watchers_count": 1031,
|
||||
"stargazers_count": 1030,
|
||||
"watchers_count": 1030,
|
||||
"forks_count": 347,
|
||||
"forks": 347,
|
||||
"watchers": 1031,
|
||||
"watchers": 1030,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-27T19:32:52Z",
|
||||
"pushed_at": "2020-06-24T09:50:06Z",
|
||||
"stargazers_count": 994,
|
||||
"watchers_count": 994,
|
||||
"updated_at": "2020-06-28T02:38:12Z",
|
||||
"pushed_at": "2020-06-28T01:31:46Z",
|
||||
"stargazers_count": 1000,
|
||||
"watchers_count": 1000,
|
||||
"forks_count": 249,
|
||||
"forks": 249,
|
||||
"watchers": 994,
|
||||
"watchers": 1000,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-21T14:52:36Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2020-06-27T14:48:13Z",
|
||||
"updated_at": "2020-06-28T02:45:21Z",
|
||||
"pushed_at": "2020-06-04T13:17:10Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2019-19033 description and scripts to check the vulnerability in Jalios JCMS 10 (Authentication Bypass)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-17T19:32:10Z",
|
||||
"updated_at": "2020-02-21T16:47:13Z",
|
||||
"updated_at": "2020-06-27T22:04:00Z",
|
||||
"pushed_at": "2019-12-03T19:22:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-02-17T13:28:02Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-06-27T16:05:23Z",
|
||||
"updated_at": "2020-06-28T02:47:34Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 599,
|
||||
"watchers_count": 599,
|
||||
"stargazers_count": 600,
|
||||
"watchers_count": 600,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 599,
|
||||
"watchers": 600,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-27T16:33:24Z",
|
||||
"updated_at": "2020-06-28T00:51:55Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2020-06-27T16:05:50Z",
|
||||
"updated_at": "2020-06-28T01:39:15Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 152,
|
||||
"forks": 152,
|
||||
"watchers": 345,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T15:44:29Z",
|
||||
"updated_at": "2020-06-25T23:48:38Z",
|
||||
"updated_at": "2020-06-28T03:02:59Z",
|
||||
"pushed_at": "2020-05-24T16:28:46Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Automated Root Script for MTK ARM64 based chipsets based on diplomatic's CVE-2020-0069 (mtk-su) exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2020-06-26T02:29:51Z",
|
||||
"updated_at": "2020-06-28T02:57:58Z",
|
||||
"pushed_at": "2020-05-21T19:36:33Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 36,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-0121.json
Normal file
25
2020/CVE-2020-0121.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 275476383,
|
||||
"name": "CVE-2020-0121",
|
||||
"full_name": "mooneee\/CVE-2020-0121",
|
||||
"owner": {
|
||||
"login": "mooneee",
|
||||
"id": 58715815,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/58715815?v=4",
|
||||
"html_url": "https:\/\/github.com\/mooneee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mooneee\/CVE-2020-0121",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-06-28T00:26:58Z",
|
||||
"updated_at": "2020-06-28T00:30:31Z",
|
||||
"pushed_at": "2020-06-28T00:30:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -933,13 +933,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-06-27T07:02:08Z",
|
||||
"updated_at": "2020-06-28T01:08:35Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 967,
|
||||
"watchers_count": 967,
|
||||
"stargazers_count": 968,
|
||||
"watchers_count": 968,
|
||||
"forks_count": 316,
|
||||
"forks": 316,
|
||||
"watchers": 967,
|
||||
"watchers": 968,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T09:40:15Z",
|
||||
"updated_at": "2020-06-16T14:42:10Z",
|
||||
"updated_at": "2020-06-28T02:35:41Z",
|
||||
"pushed_at": "2020-05-26T10:23:34Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-25T07:35:29Z",
|
||||
"updated_at": "2020-06-27T16:58:49Z",
|
||||
"updated_at": "2020-06-28T02:37:45Z",
|
||||
"pushed_at": "2020-06-25T07:49:34Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 29,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-27T19:32:52Z",
|
||||
"pushed_at": "2020-06-24T09:50:06Z",
|
||||
"stargazers_count": 994,
|
||||
"watchers_count": 994,
|
||||
"updated_at": "2020-06-28T02:38:12Z",
|
||||
"pushed_at": "2020-06-28T01:31:46Z",
|
||||
"stargazers_count": 1000,
|
||||
"watchers_count": 1000,
|
||||
"forks_count": 249,
|
||||
"forks": 249,
|
||||
"watchers": 994,
|
||||
"watchers": 1000,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T15:25:59Z",
|
||||
"updated_at": "2020-06-25T05:05:02Z",
|
||||
"updated_at": "2020-06-27T23:28:14Z",
|
||||
"pushed_at": "2020-05-10T15:32:54Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2020-06-26T07:32:46Z",
|
||||
"updated_at": "2020-06-27T21:21:04Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 303,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-06-27T10:47:22Z",
|
||||
"updated_at": "2020-06-27T10:48:23Z",
|
||||
"updated_at": "2020-06-27T23:42:39Z",
|
||||
"pushed_at": "2020-06-27T10:48:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-27T16:33:24Z",
|
||||
"updated_at": "2020-06-28T00:51:55Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "来源于jackson-CVE-2020-8840,需要开autotype",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-23T03:51:40Z",
|
||||
"updated_at": "2020-06-22T04:53:37Z",
|
||||
"updated_at": "2020-06-28T01:54:48Z",
|
||||
"pushed_at": "2020-06-15T22:01:49Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
16
README.md
16
README.md
|
@ -38,6 +38,14 @@ In startActivities of ActivityStartController.java, there is a possible escalati
|
|||
- [wyu0hop/CVE-2020-0096](https://github.com/wyu0hop/CVE-2020-0096)
|
||||
- [wrlu/StrandHogg2](https://github.com/wrlu/StrandHogg2)
|
||||
|
||||
### CVE-2020-0121
|
||||
|
||||
<code>
|
||||
In updateUidProcState of AppOpsService.java, there is a possible permission bypass due to a logic error. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-148180766
|
||||
</code>
|
||||
|
||||
- [mooneee/CVE-2020-0121](https://github.com/mooneee/CVE-2020-0121)
|
||||
|
||||
### CVE-2020-0551
|
||||
|
||||
<code>
|
||||
|
@ -14125,6 +14133,14 @@ Directory traversal vulnerability in ftpd in QPC QVT/Net 4.0 and AVT/Term 5.0 al
|
|||
|
||||
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
|
||||
|
||||
### CVE-2001-0758
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in Shambala 4.5 allows remote attackers to escape the FTP root directory via "CWD ..." command.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2001-0758](https://github.com/alt3kx/CVE-2001-0758)
|
||||
|
||||
### CVE-2001-0931
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue