mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2020/06/19 18:08:07
This commit is contained in:
parent
397146e1ff
commit
2b0f82fe2f
43 changed files with 258 additions and 168 deletions
25
2006/CVE-2006-1236.json
Normal file
25
2006/CVE-2006-1236.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 168247796,
|
||||
"name": "CVE-2006-1236",
|
||||
"full_name": "Axua\/CVE-2006-1236",
|
||||
"owner": {
|
||||
"login": "Axua",
|
||||
"id": 28788087,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
|
||||
"html_url": "https:\/\/github.com\/Axua"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236",
|
||||
"description": "Exploit script for Crossfire 1.9.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-29T23:46:59Z",
|
||||
"updated_at": "2019-01-29T23:50:30Z",
|
||||
"pushed_at": "2019-01-29T23:50:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2006/CVE-2006-3592.json
Normal file
25
2006/CVE-2006-3592.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 186166548,
|
||||
"name": "CVE-2006-3592",
|
||||
"full_name": "adenkiewicz\/CVE-2006-3592",
|
||||
"owner": {
|
||||
"login": "adenkiewicz",
|
||||
"id": 1060275,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4",
|
||||
"html_url": "https:\/\/github.com\/adenkiewicz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2006-3592",
|
||||
"description": "Exploit for Easy File Sharing FTP Server 3.5 on Win7 32",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-11T18:11:34Z",
|
||||
"updated_at": "2019-05-11T18:12:45Z",
|
||||
"pushed_at": "2019-05-11T18:12:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 63907042,
|
||||
"name": "cve-2006-6184",
|
||||
"full_name": "shauntdergrigorian\/cve-2006-6184",
|
||||
"owner": {
|
||||
"login": "shauntdergrigorian",
|
||||
"id": 7718028,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7718028?v=4",
|
||||
"html_url": "https:\/\/github.com\/shauntdergrigorian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
|
||||
"description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-21T22:43:43Z",
|
||||
"updated_at": "2020-04-07T14:22:36Z",
|
||||
"pushed_at": "2016-07-22T15:12:43Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 205628184,
|
||||
"name": "CVE-2006-6184",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-19T02:19:36Z",
|
||||
"updated_at": "2020-06-19T07:28:25Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 473,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-09T21:30:34Z",
|
||||
"updated_at": "2020-05-24T14:58:40Z",
|
||||
"updated_at": "2020-06-19T06:49:20Z",
|
||||
"pushed_at": "2016-05-09T17:53:48Z",
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"forks_count": 151,
|
||||
"forks": 151,
|
||||
"watchers": 326,
|
||||
"watchers": 327,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-19T02:19:36Z",
|
||||
"updated_at": "2020-06-19T07:28:25Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 473,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for CVE-2016-4622",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-09T15:22:06Z",
|
||||
"updated_at": "2020-04-28T11:07:19Z",
|
||||
"updated_at": "2020-06-19T07:48:26Z",
|
||||
"pushed_at": "2016-10-27T20:23:15Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -519,13 +519,13 @@
|
|||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-25T03:07:53Z",
|
||||
"updated_at": "2020-04-24T18:17:55Z",
|
||||
"updated_at": "2020-06-19T03:42:53Z",
|
||||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2017-11882 exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-22T01:11:39Z",
|
||||
"updated_at": "2020-02-25T03:32:02Z",
|
||||
"updated_at": "2020-06-19T07:56:14Z",
|
||||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-19T02:19:36Z",
|
||||
"updated_at": "2020-06-19T07:28:25Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 473,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-07-21T06:29:35Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T04:36:23Z",
|
||||
"updated_at": "2020-06-03T17:48:42Z",
|
||||
"updated_at": "2020-06-19T07:55:23Z",
|
||||
"pushed_at": "2018-08-14T07:47:02Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T15:26:35Z",
|
||||
"updated_at": "2020-04-06T11:34:14Z",
|
||||
"updated_at": "2020-06-19T06:54:55Z",
|
||||
"pushed_at": "2018-08-23T12:55:23Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exp of CVE-2018-15982",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-10T04:53:31Z",
|
||||
"updated_at": "2020-05-29T16:47:23Z",
|
||||
"updated_at": "2020-06-19T03:39:17Z",
|
||||
"pushed_at": "2019-01-04T09:29:01Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 174,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-19T02:19:36Z",
|
||||
"updated_at": "2020-06-19T07:28:25Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 473,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-20T03:59:18Z",
|
||||
"updated_at": "2020-06-09T16:01:57Z",
|
||||
"updated_at": "2020-06-19T04:46:51Z",
|
||||
"pushed_at": "2018-07-20T12:46:50Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T14:41:20Z",
|
||||
"updated_at": "2020-05-20T07:50:17Z",
|
||||
"updated_at": "2020-06-19T08:26:31Z",
|
||||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 152,
|
||||
"watchers": 153,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Node.js PoC exploit code for CVE-2018-4407",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-02T22:00:17Z",
|
||||
"updated_at": "2020-05-22T11:42:54Z",
|
||||
"updated_at": "2020-06-19T07:48:32Z",
|
||||
"pushed_at": "2018-11-02T22:13:40Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T08:51:39Z",
|
||||
"updated_at": "2020-05-29T16:58:12Z",
|
||||
"updated_at": "2020-06-19T09:04:57Z",
|
||||
"pushed_at": "2018-05-18T07:49:45Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 166,
|
||||
"watchers": 167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-12-13T19:07:53Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-19T02:37:59Z",
|
||||
"updated_at": "2020-06-19T07:13:42Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 951,
|
||||
"watchers_count": 951,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 951,
|
||||
"stargazers_count": 954,
|
||||
"watchers_count": 954,
|
||||
"forks_count": 236,
|
||||
"forks": 236,
|
||||
"watchers": 954,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-05-25T08:15:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -83,7 +83,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2020-06-18T21:27:05Z",
|
||||
"pushed_at": "2020-06-16T16:28:25Z",
|
||||
"pushed_at": "2020-06-19T03:16:40Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 26,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-19T02:19:36Z",
|
||||
"updated_at": "2020-06-19T07:28:25Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 473,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-25T03:07:53Z",
|
||||
"updated_at": "2020-04-24T18:17:55Z",
|
||||
"updated_at": "2020-06-19T03:42:53Z",
|
||||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A Test and Debug Tool for ASPEED BMC AHB Interfaces",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-21T22:49:53Z",
|
||||
"updated_at": "2020-06-18T03:06:11Z",
|
||||
"updated_at": "2020-06-19T04:21:07Z",
|
||||
"pushed_at": "2020-06-18T03:41:07Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T15:31:13Z",
|
||||
"updated_at": "2020-06-18T21:01:05Z",
|
||||
"updated_at": "2020-06-19T04:46:58Z",
|
||||
"pushed_at": "2019-10-23T07:10:35Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-05T17:19:02Z",
|
||||
"updated_at": "2020-05-20T04:10:31Z",
|
||||
"updated_at": "2020-06-19T08:26:27Z",
|
||||
"pushed_at": "2019-12-28T18:25:10Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 193,
|
||||
"watchers": 194,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-06-19T03:01:58Z",
|
||||
"updated_at": "2020-06-19T08:28:19Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 141,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -937,8 +937,8 @@
|
|||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"forks_count": 311,
|
||||
"forks": 311,
|
||||
"forks_count": 312,
|
||||
"forks": 312,
|
||||
"watchers": 958,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1186,13 +1186,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-06-18T15:05:58Z",
|
||||
"updated_at": "2020-06-19T04:46:43Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 266,
|
||||
"watchers": 267,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1439,13 +1439,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2020-06-19T01:21:02Z",
|
||||
"updated_at": "2020-06-19T05:07:35Z",
|
||||
"pushed_at": "2020-06-19T01:20:59Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2020-10199 回显版本",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-15T06:12:51Z",
|
||||
"updated_at": "2020-06-18T17:20:23Z",
|
||||
"updated_at": "2020-06-19T08:55:04Z",
|
||||
"pushed_at": "2020-05-15T06:18:18Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T23:22:15Z",
|
||||
"updated_at": "2020-06-19T03:02:24Z",
|
||||
"updated_at": "2020-06-19T06:00:40Z",
|
||||
"pushed_at": "2020-06-17T18:10:30Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 33,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-19T02:37:59Z",
|
||||
"updated_at": "2020-06-19T07:13:42Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 951,
|
||||
"watchers_count": 951,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 951,
|
||||
"stargazers_count": 954,
|
||||
"watchers_count": 954,
|
||||
"forks_count": 236,
|
||||
"forks": 236,
|
||||
"watchers": 954,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2020-06-18T20:39:03Z",
|
||||
"updated_at": "2020-06-19T09:05:27Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 292,
|
||||
"watchers": 295,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A bluetooth-related vulnerability in some contact tracing apps",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-15T00:18:03Z",
|
||||
"updated_at": "2020-06-18T14:46:23Z",
|
||||
"pushed_at": "2020-05-25T07:55:01Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"updated_at": "2020-06-19T08:18:30Z",
|
||||
"pushed_at": "2020-06-19T05:40:14Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T21:00:15Z",
|
||||
"updated_at": "2020-06-10T05:32:19Z",
|
||||
"updated_at": "2020-06-19T06:55:10Z",
|
||||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 169,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-19T02:19:36Z",
|
||||
"updated_at": "2020-06-19T07:28:25Z",
|
||||
"pushed_at": "2020-06-17T01:51:30Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 473,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-16T03:01:32Z",
|
||||
"updated_at": "2020-06-13T15:59:53Z",
|
||||
"updated_at": "2020-06-19T09:02:38Z",
|
||||
"pushed_at": "2020-05-17T12:07:01Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 31,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "CVE-2020-2551 POC to use in Internet",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T02:56:12Z",
|
||||
"updated_at": "2020-06-15T10:11:54Z",
|
||||
"updated_at": "2020-06-19T03:59:37Z",
|
||||
"pushed_at": "2020-05-26T06:58:10Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-2555 Python POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:02:59Z",
|
||||
"updated_at": "2020-06-02T09:44:34Z",
|
||||
"updated_at": "2020-06-19T07:24:08Z",
|
||||
"pushed_at": "2020-04-16T12:04:18Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T18:26:32Z",
|
||||
"updated_at": "2020-06-10T03:35:29Z",
|
||||
"updated_at": "2020-06-19T06:47:20Z",
|
||||
"pushed_at": "2020-06-02T08:30:22Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-5410 Spring Cloud Config directory traversal vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T20:15:58Z",
|
||||
"updated_at": "2020-06-19T02:19:52Z",
|
||||
"updated_at": "2020-06-19T06:21:02Z",
|
||||
"pushed_at": "2020-06-16T20:38:41Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
17
README.md
17
README.md
|
@ -13783,6 +13783,22 @@ March Networks DVR 3204 stores sensitive information under the web root with ins
|
|||
|
||||
|
||||
## 2006
|
||||
### CVE-2006-1236
|
||||
|
||||
<code>
|
||||
Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 allows remote attackers to execute arbitrary code via a long setup sound command, a different vulnerability than CVE-2006-1010.
|
||||
</code>
|
||||
|
||||
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
|
||||
|
||||
### CVE-2006-3592
|
||||
|
||||
<code>
|
||||
Unspecified vulnerability in the command line interface (CLI) in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows local users to execute arbitrary commands with elevated privileges via unspecified vectors, involving "certain CLI commands," aka bug CSCse11005.
|
||||
</code>
|
||||
|
||||
- [adenkiewicz/CVE-2006-3592](https://github.com/adenkiewicz/CVE-2006-3592)
|
||||
|
||||
### CVE-2006-3747
|
||||
|
||||
<code>
|
||||
|
@ -13813,6 +13829,7 @@ The mincore function in the Linux kernel before 2.4.33.6 does not properly lock
|
|||
Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
|
||||
</code>
|
||||
|
||||
- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184)
|
||||
- [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184)
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue