mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/11/06 00:09:18
This commit is contained in:
parent
d4a26fe13a
commit
2a10f624ab
34 changed files with 248 additions and 125 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T15:42:42Z",
|
||||
"updated_at": "2020-11-05T09:28:18Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 745,
|
||||
"watchers_count": 745,
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 745,
|
||||
"watchers": 747,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T15:42:42Z",
|
||||
"updated_at": "2020-11-05T09:28:18Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 745,
|
||||
"watchers_count": 745,
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 745,
|
||||
"watchers": 747,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Local privilege escalation through macOS 10.12.1 via CVE-2016-1825 or CVE-2016-7617.",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-25T05:07:22Z",
|
||||
"updated_at": "2020-10-21T22:14:55Z",
|
||||
"updated_at": "2020-11-05T10:40:06Z",
|
||||
"pushed_at": "2017-01-16T18:13:15Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 59,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -404,13 +404,13 @@
|
|||
"description": "Android APK Based On Public Information Using DirtyCOW CVE-2016-5195 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-16T10:41:26Z",
|
||||
"updated_at": "2020-01-27T21:16:48Z",
|
||||
"updated_at": "2020-11-05T09:34:40Z",
|
||||
"pushed_at": "2017-01-19T09:02:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2020-11-02T16:53:59Z",
|
||||
"updated_at": "2020-11-05T14:38:46Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 244,
|
||||
"forks": 244,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T15:42:42Z",
|
||||
"updated_at": "2020-11-05T09:28:18Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 745,
|
||||
"watchers_count": 745,
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 745,
|
||||
"watchers": 747,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-07-10T18:19:59Z",
|
||||
"updated_at": "2020-01-11T17:14:19Z",
|
||||
"updated_at": "2020-11-05T10:54:13Z",
|
||||
"pushed_at": "2019-07-15T13:39:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T15:42:42Z",
|
||||
"updated_at": "2020-11-05T09:28:18Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 745,
|
||||
"watchers_count": 745,
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 745,
|
||||
"watchers": 747,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -933,13 +933,13 @@
|
|||
"description": "CVE-2019-0708 远程代码执行漏洞批量检测",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T05:38:54Z",
|
||||
"updated_at": "2020-08-18T10:01:04Z",
|
||||
"updated_at": "2020-11-05T09:47:37Z",
|
||||
"pushed_at": "2019-05-30T02:43:06Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-11-03T15:12:59Z",
|
||||
"updated_at": "2020-11-05T14:52:39Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1610,
|
||||
"watchers_count": 1610,
|
||||
"stargazers_count": 1611,
|
||||
"watchers_count": 1611,
|
||||
"forks_count": 236,
|
||||
"forks": 236,
|
||||
"watchers": 1610,
|
||||
"watchers": 1611,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "php-fpm+Nginx RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T23:26:57Z",
|
||||
"updated_at": "2020-10-25T16:42:35Z",
|
||||
"updated_at": "2020-11-05T10:08:03Z",
|
||||
"pushed_at": "2020-08-20T04:43:25Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 81,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2020-10-21T22:17:16Z",
|
||||
"updated_at": "2020-11-05T12:18:59Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 578,
|
||||
"watchers_count": 578,
|
||||
"stargazers_count": 579,
|
||||
"watchers_count": 579,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 578,
|
||||
"watchers": 579,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Interactive-Like Command-Line Console for CVE-2019-16759",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-12T18:51:16Z",
|
||||
"updated_at": "2020-04-16T18:56:32Z",
|
||||
"updated_at": "2020-11-05T14:03:56Z",
|
||||
"pushed_at": "2019-10-12T18:56:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-05T08:40:04Z",
|
||||
"updated_at": "2020-11-05T14:42:10Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 2006,
|
||||
"watchers_count": 2006,
|
||||
"stargazers_count": 2009,
|
||||
"watchers_count": 2009,
|
||||
"forks_count": 526,
|
||||
"forks": 526,
|
||||
"watchers": 2006,
|
||||
"watchers": 2009,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-10-16T17:44:13Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 162,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T15:42:42Z",
|
||||
"updated_at": "2020-11-05T09:28:18Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 745,
|
||||
"watchers_count": 745,
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 745,
|
||||
"watchers": 747,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-24T13:10:39Z",
|
||||
"updated_at": "2020-10-21T22:17:33Z",
|
||||
"updated_at": "2020-11-05T11:11:15Z",
|
||||
"pushed_at": "2020-03-24T13:19:34Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1094,13 +1094,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-11-02T20:56:31Z",
|
||||
"updated_at": "2020-11-05T13:35:12Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 331,
|
||||
"watchers": 332,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-11547.json
Normal file
25
2020/CVE-2020-11547.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 250392759,
|
||||
"name": "CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure",
|
||||
"full_name": "ch-rigu\/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure",
|
||||
"owner": {
|
||||
"login": "ch-rigu",
|
||||
"id": 40671439,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40671439?v=4",
|
||||
"html_url": "https:\/\/github.com\/ch-rigu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ch-rigu\/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-26T23:14:55Z",
|
||||
"updated_at": "2020-11-05T11:40:08Z",
|
||||
"pushed_at": "2020-10-20T21:00:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-02T14:48:55Z",
|
||||
"updated_at": "2020-11-05T08:17:40Z",
|
||||
"updated_at": "2020-11-05T13:36:19Z",
|
||||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 64,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T03:27:24Z",
|
||||
"updated_at": "2020-09-22T02:36:37Z",
|
||||
"updated_at": "2020-11-05T14:33:45Z",
|
||||
"pushed_at": "2020-07-20T03:51:06Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-11-04T09:29:58Z",
|
||||
"updated_at": "2020-11-05T13:36:56Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 687,
|
||||
"watchers_count": 687,
|
||||
"stargazers_count": 689,
|
||||
"watchers_count": 689,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 687,
|
||||
"watchers": 689,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-11-05T09:03:17Z",
|
||||
"updated_at": "2020-11-05T13:06:19Z",
|
||||
"pushed_at": "2020-11-04T02:26:59Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 126,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +243,13 @@
|
|||
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T10:49:35Z",
|
||||
"updated_at": "2020-11-05T07:01:23Z",
|
||||
"updated_at": "2020-11-05T09:44:20Z",
|
||||
"pushed_at": "2020-11-05T03:29:09Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,13 +289,36 @@
|
|||
"description": "CVE-2020-14882\/14883\/14750",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-04T03:09:13Z",
|
||||
"updated_at": "2020-11-05T05:43:01Z",
|
||||
"updated_at": "2020-11-05T15:04:12Z",
|
||||
"pushed_at": "2020-11-04T03:15:33Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 310303375,
|
||||
"name": "cve-2020-14882",
|
||||
"full_name": "mmioimm\/cve-2020-14882",
|
||||
"owner": {
|
||||
"login": "mmioimm",
|
||||
"id": 19258899,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19258899?v=4",
|
||||
"html_url": "https:\/\/github.com\/mmioimm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mmioimm\/cve-2020-14882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-05T13:12:28Z",
|
||||
"updated_at": "2020-11-05T13:14:59Z",
|
||||
"pushed_at": "2020-11-05T13:14:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-07T19:56:09Z",
|
||||
"updated_at": "2020-11-04T09:12:46Z",
|
||||
"updated_at": "2020-11-05T13:32:05Z",
|
||||
"pushed_at": "2020-10-26T10:15:32Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 197,
|
||||
"watchers": 198,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-19T03:16:34Z",
|
||||
"updated_at": "2020-10-19T03:25:00Z",
|
||||
"pushed_at": "2020-10-19T03:24:58Z",
|
||||
"updated_at": "2020-11-05T10:43:23Z",
|
||||
"pushed_at": "2020-11-05T10:43:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T17:50:01Z",
|
||||
"updated_at": "2020-11-02T01:01:35Z",
|
||||
"updated_at": "2020-11-05T13:15:55Z",
|
||||
"pushed_at": "2020-10-12T09:57:28Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
|
|
25
2020/CVE-2020-25398.json
Normal file
25
2020/CVE-2020-25398.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 279259540,
|
||||
"name": "CVE-2020-25398",
|
||||
"full_name": "h3llraiser\/CVE-2020-25398",
|
||||
"owner": {
|
||||
"login": "h3llraiser",
|
||||
"id": 52741391,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/52741391?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3llraiser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3llraiser\/CVE-2020-25398",
|
||||
"description": "CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv export functionality.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T09:37:11Z",
|
||||
"updated_at": "2020-11-05T15:00:19Z",
|
||||
"pushed_at": "2020-11-05T10:17:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25399.json
Normal file
25
2020/CVE-2020-25399.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 279259641,
|
||||
"name": "CVE-2020-25399",
|
||||
"full_name": "h3llraiser\/CVE-2020-25399",
|
||||
"owner": {
|
||||
"login": "h3llraiser",
|
||||
"id": 52741391,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/52741391?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3llraiser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3llraiser\/CVE-2020-25399",
|
||||
"description": "Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack another user's session by sending a malicious file in the chat.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T09:37:38Z",
|
||||
"updated_at": "2020-11-05T15:00:40Z",
|
||||
"pushed_at": "2020-11-05T10:43:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T15:42:42Z",
|
||||
"updated_at": "2020-11-05T09:28:18Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 745,
|
||||
"watchers_count": 745,
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 745,
|
||||
"watchers": 747,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-23T06:02:28Z",
|
||||
"updated_at": "2020-11-04T16:31:54Z",
|
||||
"pushed_at": "2020-11-04T16:31:52Z",
|
||||
"updated_at": "2020-11-05T14:51:51Z",
|
||||
"pushed_at": "2020-11-05T14:51:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-04T16:43:04Z",
|
||||
"updated_at": "2020-11-05T07:37:31Z",
|
||||
"updated_at": "2020-11-05T14:28:44Z",
|
||||
"pushed_at": "2020-11-04T19:09:31Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-05T08:40:04Z",
|
||||
"updated_at": "2020-11-05T14:42:10Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 2006,
|
||||
"watchers_count": 2006,
|
||||
"stargazers_count": 2009,
|
||||
"watchers_count": 2009,
|
||||
"forks_count": 526,
|
||||
"forks": 526,
|
||||
"watchers": 2006,
|
||||
"watchers": 2009,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T06:19:09Z",
|
||||
"updated_at": "2020-10-13T11:11:46Z",
|
||||
"updated_at": "2020-11-05T09:46:35Z",
|
||||
"pushed_at": "2020-07-07T07:19:16Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
README.md
29
README.md
|
@ -1721,6 +1721,14 @@ An issue was discovered on Tata Sonata Smart SF Rush 1.12 devices. It has been i
|
|||
|
||||
- [the-girl-who-lived/CVE-2020-11539](https://github.com/the-girl-who-lived/CVE-2020-11539)
|
||||
|
||||
### CVE-2020-11547 (2020-04-04)
|
||||
|
||||
<code>
|
||||
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
|
||||
</code>
|
||||
|
||||
- [ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure](https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure)
|
||||
|
||||
### CVE-2020-11579 (2020-09-03)
|
||||
|
||||
<code>
|
||||
|
@ -2209,6 +2217,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [GGyao/CVE-2020-14882_ALL](https://github.com/GGyao/CVE-2020-14882_ALL)
|
||||
- [ovProphet/CVE-2020-14882-checker](https://github.com/ovProphet/CVE-2020-14882-checker)
|
||||
- [NS-Sp4ce/CVE-2020-14882](https://github.com/NS-Sp4ce/CVE-2020-14882)
|
||||
- [mmioimm/cve-2020-14882](https://github.com/mmioimm/cve-2020-14882)
|
||||
|
||||
### CVE-2020-14947 (2020-06-30)
|
||||
|
||||
|
@ -2568,6 +2577,12 @@ In SourceCodester Online Bus Booking System 1.0, there is Authentication bypass
|
|||
|
||||
- [Ko-kn3t/CVE-2020-25273](https://github.com/Ko-kn3t/CVE-2020-25273)
|
||||
|
||||
### CVE-2020-25398
|
||||
- [h3llraiser/CVE-2020-25398](https://github.com/h3llraiser/CVE-2020-25398)
|
||||
|
||||
### CVE-2020-25399
|
||||
- [h3llraiser/CVE-2020-25399](https://github.com/h3llraiser/CVE-2020-25399)
|
||||
|
||||
### CVE-2020-25487 (2020-09-22)
|
||||
|
||||
<code>
|
||||
|
@ -2698,7 +2713,12 @@ An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's
|
|||
|
||||
- [seb1055/cve-2020-27358-27359](https://github.com/seb1055/cve-2020-27358-27359)
|
||||
|
||||
### CVE-2020-27688
|
||||
### CVE-2020-27688 (-)
|
||||
|
||||
<code>
|
||||
RVToolsPasswordEncryption.exe in RVTools 4.0.6 allows users to encrypt passwords to be used in the configuration files. This encryption used a static IV and key, and thus using the Decrypt() method from VISKD.cs from the RVTools.exe executable allows for decrypting the encrypted passwords. The accounts used in the configuration files have access to vSphere instances.
|
||||
</code>
|
||||
|
||||
- [matthiasmaes/CVE-2020-27688](https://github.com/matthiasmaes/CVE-2020-27688)
|
||||
|
||||
### CVE-2020-27747 (2020-10-29)
|
||||
|
@ -2709,7 +2729,12 @@ An issue was discovered in Click Studios Passwordstate 8.9 (Build 8973).If the u
|
|||
|
||||
- [jet-pentest/CVE-2020-27747](https://github.com/jet-pentest/CVE-2020-27747)
|
||||
|
||||
### CVE-2020-27955
|
||||
### CVE-2020-27955 (-)
|
||||
|
||||
<code>
|
||||
Git LFS 2.12.0 allows Remote Code Execution.
|
||||
</code>
|
||||
|
||||
- [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955)
|
||||
- [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue