mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/09/12 00:09:22
This commit is contained in:
parent
15605b8041
commit
1d1a2525ad
50 changed files with 176 additions and 152 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2012-08-06T09:52:05Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-10T14:56:19Z",
|
||||
"updated_at": "2020-09-11T11:24:47Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 676,
|
||||
"stargazers_count": 677,
|
||||
"watchers_count": 677,
|
||||
"forks_count": 167,
|
||||
"forks": 167,
|
||||
"watchers": 677,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2014-09-17T18:16:10Z",
|
||||
"updated_at": "2020-09-03T00:33:55Z",
|
||||
"updated_at": "2020-09-11T14:51:09Z",
|
||||
"pushed_at": "2014-10-15T16:02:51Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2015-03-20T15:57:00Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Win32k LPE vulnerability used in APT attack",
|
||||
"fork": false,
|
||||
"created_at": "2015-05-12T18:04:48Z",
|
||||
"updated_at": "2020-08-15T14:54:35Z",
|
||||
"updated_at": "2020-09-11T10:00:21Z",
|
||||
"pushed_at": "2017-12-18T14:11:29Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"forks_count": 180,
|
||||
"forks": 180,
|
||||
"watchers": 269,
|
||||
"watchers": 270,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,7 +59,7 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2020-09-03T00:34:04Z",
|
||||
"updated_at": "2020-09-11T14:53:12Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-03-15T17:24:59Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-10T14:56:19Z",
|
||||
"updated_at": "2020-09-11T11:24:47Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 676,
|
||||
"stargazers_count": 677,
|
||||
"watchers_count": 677,
|
||||
"forks_count": 167,
|
||||
"forks": 167,
|
||||
"watchers": 677,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-10-04T16:36:18Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"forks_count": 200,
|
||||
"forks": 200,
|
||||
"watchers": 472,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -59,7 +59,7 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2020-09-03T00:33:20Z",
|
||||
"updated_at": "2020-09-11T14:54:28Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
|
@ -105,7 +105,7 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2020-09-03T00:33:20Z",
|
||||
"updated_at": "2020-09-11T14:54:28Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2020-09-03T00:39:44Z",
|
||||
"updated_at": "2020-09-11T14:54:19Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-02-25T08:49:07Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-10T14:56:19Z",
|
||||
"updated_at": "2020-09-11T11:24:47Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 676,
|
||||
"stargazers_count": 677,
|
||||
"watchers_count": 677,
|
||||
"forks_count": 167,
|
||||
"forks": 167,
|
||||
"watchers": 677,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Broadpwn bug (CVE-2017-9417)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-29T22:23:34Z",
|
||||
"updated_at": "2020-09-03T00:00:26Z",
|
||||
"updated_at": "2020-09-11T14:53:55Z",
|
||||
"pushed_at": "2017-09-22T12:14:25Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Hidden AP with Deterministic Credentials",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-10T11:25:36Z",
|
||||
"updated_at": "2020-05-19T12:37:22Z",
|
||||
"updated_at": "2020-09-11T12:03:08Z",
|
||||
"pushed_at": "2017-10-10T11:26:40Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Test utility for cve-2018-1002105",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-05T02:51:43Z",
|
||||
"updated_at": "2020-09-03T00:01:41Z",
|
||||
"updated_at": "2020-09-11T14:55:28Z",
|
||||
"pushed_at": "2018-12-13T16:56:28Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
|
@ -36,7 +36,7 @@
|
|||
"description": "PoC for CVE-2018-1002105.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-06T11:28:02Z",
|
||||
"updated_at": "2020-09-03T00:01:41Z",
|
||||
"updated_at": "2020-09-11T14:55:28Z",
|
||||
"pushed_at": "2018-12-21T14:34:04Z",
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
|
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,7 +59,7 @@
|
|||
"description": "exp of CVE-2018-15982",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-10T04:53:31Z",
|
||||
"updated_at": "2020-09-03T00:01:27Z",
|
||||
"updated_at": "2020-09-11T14:55:29Z",
|
||||
"pushed_at": "2019-01-04T09:29:01Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-10T14:56:19Z",
|
||||
"updated_at": "2020-09-11T11:24:47Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 676,
|
||||
"stargazers_count": 677,
|
||||
"watchers_count": 677,
|
||||
"forks_count": 167,
|
||||
"forks": 167,
|
||||
"watchers": 677,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-28T14:45:06Z",
|
||||
"updated_at": "2020-09-03T00:33:29Z",
|
||||
"updated_at": "2020-09-11T14:54:52Z",
|
||||
"pushed_at": "2018-05-08T10:59:23Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T14:41:20Z",
|
||||
"updated_at": "2020-09-03T00:01:11Z",
|
||||
"updated_at": "2020-09-11T14:55:16Z",
|
||||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-22T06:22:59Z",
|
||||
"updated_at": "2020-09-03T09:27:54Z",
|
||||
"updated_at": "2020-09-11T14:54:40Z",
|
||||
"pushed_at": "2018-10-28T20:23:30Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-08T18:06:10Z",
|
||||
"updated_at": "2020-09-02T23:57:33Z",
|
||||
"updated_at": "2020-09-11T14:55:42Z",
|
||||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-09-08T14:40:48Z",
|
||||
"updated_at": "2020-09-11T09:24:38Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 302,
|
||||
"watchers": 303,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-03-01T19:06:50Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2020-09-04T16:44:29Z",
|
||||
"updated_at": "2020-09-11T09:30:07Z",
|
||||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 437,
|
||||
"watchers": 438,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-05-18T07:49:45Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 167,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-27T06:30:32Z",
|
||||
"updated_at": "2020-09-03T00:00:49Z",
|
||||
"updated_at": "2020-09-11T14:55:31Z",
|
||||
"pushed_at": "2018-12-30T11:53:08Z",
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-05-10T20:47:59Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"forks_count": 103,
|
||||
"forks": 103,
|
||||
"watchers": 369,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-08-12T02:23:38Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1305,8 +1305,8 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 759,
|
||||
"watchers_count": 759,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"forks_count": 185,
|
||||
"forks": 185,
|
||||
"watchers": 759,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1512,8 +1512,8 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1042,
|
||||
"watchers_count": 1042,
|
||||
"forks_count": 349,
|
||||
"forks": 349,
|
||||
"forks_count": 350,
|
||||
"forks": 350,
|
||||
"watchers": 1042,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CuteNews 2.1.2 - CVE-2019-11447 Proof-Of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-07T06:21:10Z",
|
||||
"updated_at": "2020-09-07T19:44:10Z",
|
||||
"updated_at": "2020-09-11T09:22:55Z",
|
||||
"pushed_at": "2020-09-07T19:44:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-21T08:40:26Z",
|
||||
"updated_at": "2020-09-07T07:31:26Z",
|
||||
"updated_at": "2020-09-11T13:45:31Z",
|
||||
"pushed_at": "2020-01-11T13:55:33Z",
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"watchers": 328,
|
||||
"watchers": 329,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2020-09-02T23:28:52Z",
|
||||
"updated_at": "2020-09-11T14:56:11Z",
|
||||
"pushed_at": "2019-10-03T09:43:55Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-09-09T13:43:30Z",
|
||||
"updated_at": "2020-09-11T14:56:09Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 673,
|
||||
"watchers_count": 673,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-11T03:08:59Z",
|
||||
"updated_at": "2020-09-11T11:22:28Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1598,
|
||||
"watchers_count": 1598,
|
||||
"forks_count": 426,
|
||||
"forks": 426,
|
||||
"watchers": 1598,
|
||||
"stargazers_count": 1599,
|
||||
"watchers_count": 1599,
|
||||
"forks_count": 427,
|
||||
"forks": 427,
|
||||
"watchers": 1599,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2020-09-08T22:49:02Z",
|
||||
"updated_at": "2020-09-11T09:55:25Z",
|
||||
"pushed_at": "2020-06-04T13:17:10Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T06:32:08Z",
|
||||
"updated_at": "2020-09-09T02:32:40Z",
|
||||
"updated_at": "2020-09-11T14:56:11Z",
|
||||
"pushed_at": "2019-11-12T03:58:00Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-10T14:56:19Z",
|
||||
"updated_at": "2020-09-11T11:24:47Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 676,
|
||||
"stargazers_count": 677,
|
||||
"watchers_count": 677,
|
||||
"forks_count": 167,
|
||||
"forks": 167,
|
||||
"watchers": 677,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Array.prototype.slice wrong alias information.",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-25T02:33:18Z",
|
||||
"updated_at": "2020-09-02T23:30:42Z",
|
||||
"updated_at": "2020-09-11T14:55:44Z",
|
||||
"pushed_at": "2019-03-25T02:41:43Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
|
@ -36,7 +36,7 @@
|
|||
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-05T17:19:02Z",
|
||||
"updated_at": "2020-09-02T23:30:42Z",
|
||||
"updated_at": "2020-09-11T14:55:53Z",
|
||||
"pushed_at": "2019-12-28T18:25:10Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-10T21:34:16Z",
|
||||
"updated_at": "2020-09-09T08:57:34Z",
|
||||
"updated_at": "2020-09-11T12:28:49Z",
|
||||
"pushed_at": "2020-08-11T21:48:12Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 826,
|
||||
"watchers_count": 826,
|
||||
"forks_count": 212,
|
||||
"forks": 212,
|
||||
"forks_count": 213,
|
||||
"forks": 213,
|
||||
"watchers": 826,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -681,7 +681,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-02-26T19:59:25Z",
|
||||
"updated_at": "2020-03-05T07:54:18Z",
|
||||
"pushed_at": "2020-03-05T07:54:16Z",
|
||||
"pushed_at": "2020-09-11T10:29:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -868,8 +868,8 @@
|
|||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 996,
|
||||
"watchers_count": 996,
|
||||
"forks_count": 326,
|
||||
"forks": 326,
|
||||
"forks_count": 327,
|
||||
"forks": 327,
|
||||
"watchers": 996,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T11:52:28Z",
|
||||
"updated_at": "2020-09-09T06:46:02Z",
|
||||
"updated_at": "2020-09-11T12:54:22Z",
|
||||
"pushed_at": "2020-07-10T09:30:47Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "writeup of CVE-2020-1362",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-17T07:35:05Z",
|
||||
"updated_at": "2020-09-09T15:19:10Z",
|
||||
"updated_at": "2020-09-11T13:38:46Z",
|
||||
"pushed_at": "2020-07-17T07:54:26Z",
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 204,
|
||||
"watchers": 205,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 293756101,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "SecuraBV\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "SecuraBV",
|
||||
"id": 46344423,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46344423?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecuraBV"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecuraBV\/CVE-2020-1472",
|
||||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-11T14:48:02Z",
|
||||
"pushed_at": "2020-09-11T13:59:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-09-10T02:40:21Z",
|
||||
"updated_at": "2020-09-11T11:52:09Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-10T14:56:19Z",
|
||||
"updated_at": "2020-09-11T11:24:47Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 676,
|
||||
"stargazers_count": 677,
|
||||
"watchers_count": 677,
|
||||
"forks_count": 167,
|
||||
"forks": 167,
|
||||
"watchers": 677,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-08-31T20:01:13Z",
|
||||
"updated_at": "2020-09-11T12:19:59Z",
|
||||
"pushed_at": "2020-05-22T08:46:20Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 138,
|
||||
"watchers": 139,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-11T03:08:59Z",
|
||||
"updated_at": "2020-09-11T11:22:28Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1598,
|
||||
"watchers_count": 1598,
|
||||
"forks_count": 426,
|
||||
"forks": 426,
|
||||
"watchers": 1598,
|
||||
"stargazers_count": 1599,
|
||||
"watchers_count": 1599,
|
||||
"forks_count": 427,
|
||||
"forks": 427,
|
||||
"watchers": 1599,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -489,6 +489,7 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu
|
|||
</code>
|
||||
|
||||
- [mingchen-script/CVE-2020-1472-visualizer](https://github.com/mingchen-script/CVE-2020-1472-visualizer)
|
||||
- [SecuraBV/CVE-2020-1472](https://github.com/SecuraBV/CVE-2020-1472)
|
||||
|
||||
### CVE-2020-1493
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue