mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/05/28 12:07:49
This commit is contained in:
parent
f587f3ebc3
commit
1bfc59ea86
19 changed files with 80 additions and 80 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-27T05:21:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-08-22T01:20:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Tool to try multiple paths for PHPunit RCE CVE-2017-9841",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-18T20:55:05Z",
|
||||
"updated_at": "2020-05-25T11:09:50Z",
|
||||
"updated_at": "2020-05-27T22:20:12Z",
|
||||
"pushed_at": "2020-05-19T09:24:38Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Microsoft Windows 8.1 & 2012 R2 SMBv3 Null Pointer Dereference Denial of Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-21T03:00:37Z",
|
||||
"updated_at": "2018-08-15T06:47:53Z",
|
||||
"updated_at": "2020-05-28T02:29:47Z",
|
||||
"pushed_at": "2018-03-21T08:42:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-05T12:53:52Z",
|
||||
"updated_at": "2020-05-20T06:48:35Z",
|
||||
"updated_at": "2020-05-28T00:02:09Z",
|
||||
"pushed_at": "2019-04-09T16:49:19Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 219,
|
||||
"watchers": 220,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-05T23:33:21Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-27T18:51:46Z",
|
||||
"updated_at": "2020-05-28T02:08:17Z",
|
||||
"pushed_at": "2020-05-27T10:27:11Z",
|
||||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 784,
|
||||
"stargazers_count": 787,
|
||||
"watchers_count": 787,
|
||||
"forks_count": 180,
|
||||
"forks": 180,
|
||||
"watchers": 787,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-05-01T20:00:12Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-05-18T18:36:55Z",
|
||||
"updated_at": "2020-05-28T02:11:27Z",
|
||||
"pushed_at": "2020-02-17T13:28:02Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2020-05-18T10:42:55Z",
|
||||
"updated_at": "2020-05-27T21:42:27Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 510,
|
||||
"watchers_count": 510,
|
||||
"forks_count": 105,
|
||||
"forks": 105,
|
||||
"watchers": 510,
|
||||
"stargazers_count": 509,
|
||||
"watchers_count": 509,
|
||||
"forks_count": 106,
|
||||
"forks": 106,
|
||||
"watchers": 509,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :).",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-17T17:59:26Z",
|
||||
"updated_at": "2020-05-24T13:24:13Z",
|
||||
"updated_at": "2020-05-28T02:27:14Z",
|
||||
"pushed_at": "2019-10-15T17:05:38Z",
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 267,
|
||||
"watchers": 268,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T16:24:20Z",
|
||||
"updated_at": "2020-05-08T04:47:07Z",
|
||||
"updated_at": "2020-05-27T21:48:36Z",
|
||||
"pushed_at": "2020-01-20T23:00:14Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T19:33:18Z",
|
||||
"updated_at": "2020-05-18T14:17:46Z",
|
||||
"updated_at": "2020-05-28T02:53:31Z",
|
||||
"pushed_at": "2020-03-13T07:38:43Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1117,13 +1117,13 @@
|
|||
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T15:16:10Z",
|
||||
"updated_at": "2020-05-27T11:48:07Z",
|
||||
"updated_at": "2020-05-28T03:08:48Z",
|
||||
"pushed_at": "2020-04-06T15:22:01Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-10204 远程命令执行脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-27T06:55:54Z",
|
||||
"updated_at": "2020-05-27T07:54:14Z",
|
||||
"updated_at": "2020-05-28T01:37:19Z",
|
||||
"pushed_at": "2020-05-27T07:10:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-10T22:35:46Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-27T18:51:46Z",
|
||||
"updated_at": "2020-05-28T02:08:17Z",
|
||||
"pushed_at": "2020-05-27T10:27:11Z",
|
||||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 784,
|
||||
"stargazers_count": 787,
|
||||
"watchers_count": 787,
|
||||
"forks_count": 180,
|
||||
"forks": 180,
|
||||
"watchers": 787,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-27T18:11:18Z",
|
||||
"updated_at": "2020-05-27T20:44:38Z",
|
||||
"pushed_at": "2020-05-27T20:44:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2020-05-28T02:33:04Z",
|
||||
"pushed_at": "2020-05-27T21:22:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-05-17T12:07:01Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -201,8 +201,8 @@
|
|||
"pushed_at": "2020-05-26T06:58:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2020-05-27T13:22:06Z",
|
||||
"updated_at": "2020-05-28T02:09:52Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T14:30:46Z",
|
||||
"updated_at": "2020-05-27T15:28:48Z",
|
||||
"updated_at": "2020-05-28T01:39:07Z",
|
||||
"pushed_at": "2020-05-21T15:13:22Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Reference in a new issue