mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/12/02 18:09:30
This commit is contained in:
parent
56cba42b04
commit
2d45293849
29 changed files with 145 additions and 117 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-01T22:04:28Z",
|
||||
"updated_at": "2020-12-02T03:36:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 802,
|
||||
"watchers_count": 802,
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 802,
|
||||
"watchers": 803,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-01T22:04:28Z",
|
||||
"updated_at": "2020-12-02T03:36:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 802,
|
||||
"watchers_count": 802,
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 802,
|
||||
"watchers": 803,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2016-5195 exploit written in Crystal",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T15:54:10Z",
|
||||
"updated_at": "2019-07-15T23:20:10Z",
|
||||
"updated_at": "2020-12-02T04:09:33Z",
|
||||
"pushed_at": "2016-10-25T18:44:59Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-11-16T08:05:44Z",
|
||||
"updated_at": "2020-12-02T03:37:15Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-01T22:04:28Z",
|
||||
"updated_at": "2020-12-02T03:36:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 802,
|
||||
"watchers_count": 802,
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 802,
|
||||
"watchers": 803,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-12-01T14:36:03Z",
|
||||
"updated_at": "2020-12-02T06:30:32Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 542,
|
||||
"watchers_count": 542,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 542,
|
||||
"stargazers_count": 543,
|
||||
"watchers_count": 543,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 543,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T23:51:12Z",
|
||||
"updated_at": "2020-11-03T17:58:33Z",
|
||||
"updated_at": "2020-12-02T06:29:12Z",
|
||||
"pushed_at": "2018-02-27T05:22:38Z",
|
||||
"stargazers_count": 548,
|
||||
"watchers_count": 548,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 548,
|
||||
"stargazers_count": 549,
|
||||
"watchers_count": 549,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 549,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "glibc getcwd() local privilege escalation compiled binaries",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T17:34:24Z",
|
||||
"updated_at": "2020-11-23T13:41:14Z",
|
||||
"updated_at": "2020-12-02T07:21:01Z",
|
||||
"pushed_at": "2018-02-09T22:35:06Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-01T22:04:28Z",
|
||||
"updated_at": "2020-12-02T03:36:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 802,
|
||||
"watchers_count": 802,
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 802,
|
||||
"watchers": 803,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-12-01T14:36:03Z",
|
||||
"updated_at": "2020-12-02T06:30:32Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 542,
|
||||
"watchers_count": 542,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 542,
|
||||
"stargazers_count": 543,
|
||||
"watchers_count": 543,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 543,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2474,13 +2474,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2020-12-02T02:30:19Z",
|
||||
"updated_at": "2020-12-02T03:44:26Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 146,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-12-02T03:08:14Z",
|
||||
"updated_at": "2020-12-02T07:21:34Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1621,
|
||||
"watchers_count": 1621,
|
||||
"stargazers_count": 1620,
|
||||
"watchers_count": 1620,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"watchers": 1621,
|
||||
"watchers": 1620,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2020-10-13T02:25:06Z",
|
||||
"updated_at": "2020-12-02T04:24:33Z",
|
||||
"pushed_at": "2019-10-03T09:43:55Z",
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 241,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-12T20:43:46Z",
|
||||
"updated_at": "2020-10-17T15:57:16Z",
|
||||
"updated_at": "2020-12-02T04:33:45Z",
|
||||
"pushed_at": "2019-11-28T20:16:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-02T00:29:22Z",
|
||||
"updated_at": "2020-12-02T08:34:16Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2110,
|
||||
"watchers_count": 2110,
|
||||
"stargazers_count": 2111,
|
||||
"watchers_count": 2111,
|
||||
"forks_count": 590,
|
||||
"forks": 590,
|
||||
"watchers": 2110,
|
||||
"watchers": 2111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-11-16T08:05:44Z",
|
||||
"updated_at": "2020-12-02T03:37:15Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2020-11-15T14:11:57Z",
|
||||
"updated_at": "2020-12-02T06:47:31Z",
|
||||
"pushed_at": "2020-08-28T14:09:20Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-11-28T07:45:09Z",
|
||||
"updated_at": "2020-12-02T08:29:08Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 677,
|
||||
"watchers_count": 677,
|
||||
"forks_count": 141,
|
||||
"forks": 141,
|
||||
"watchers": 677,
|
||||
"stargazers_count": 678,
|
||||
"watchers_count": 678,
|
||||
"forks_count": 142,
|
||||
"forks": 142,
|
||||
"watchers": 678,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-01T22:04:28Z",
|
||||
"updated_at": "2020-12-02T03:36:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 802,
|
||||
"watchers_count": 802,
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 802,
|
||||
"watchers": 803,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-06-10T18:03:24Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-12-02T02:19:03Z",
|
||||
"updated_at": "2020-12-02T03:41:10Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 472,
|
||||
"watchers": 473,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-23T10:24:07Z",
|
||||
"updated_at": "2020-12-01T09:22:00Z",
|
||||
"updated_at": "2020-12-02T06:22:27Z",
|
||||
"pushed_at": "2020-11-23T11:20:28Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-01T20:53:49Z",
|
||||
"updated_at": "2020-11-16T16:52:54Z",
|
||||
"updated_at": "2020-12-02T08:10:41Z",
|
||||
"pushed_at": "2020-05-18T17:36:18Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2020-11-29T14:41:09Z",
|
||||
"updated_at": "2020-12-02T08:18:27Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 343,
|
||||
"watchers": 344,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -82,7 +82,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-21T08:48:46Z",
|
||||
"updated_at": "2020-11-23T13:50:07Z",
|
||||
"updated_at": "2020-12-02T07:05:01Z",
|
||||
"pushed_at": "2020-11-21T08:54:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-02T00:29:22Z",
|
||||
"updated_at": "2020-12-02T08:34:16Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2110,
|
||||
"watchers_count": 2110,
|
||||
"stargazers_count": 2111,
|
||||
"watchers_count": 2111,
|
||||
"forks_count": 590,
|
||||
"forks": 590,
|
||||
"watchers": 2110,
|
||||
"watchers": 2111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-10T02:58:25Z",
|
||||
"stargazers_count": 384,
|
||||
"watchers_count": 384,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"watchers": 384,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2020/CVE-2020-25265.json
Normal file
25
2020/CVE-2020-25265.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 296434593,
|
||||
"name": "CVE-2020-25265-25266",
|
||||
"full_name": "refi64\/CVE-2020-25265-25266",
|
||||
"owner": {
|
||||
"login": "refi64",
|
||||
"id": 1690697,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1690697?v=4",
|
||||
"html_url": "https:\/\/github.com\/refi64"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/refi64\/CVE-2020-25265-25266",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T20:25:02Z",
|
||||
"updated_at": "2020-12-02T05:49:27Z",
|
||||
"pushed_at": "2020-12-02T05:49:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-12-01T22:04:28Z",
|
||||
"updated_at": "2020-12-02T03:36:13Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 802,
|
||||
"watchers_count": 802,
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 802,
|
||||
"watchers": 803,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-27950 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-01T15:49:07Z",
|
||||
"updated_at": "2020-12-01T18:35:33Z",
|
||||
"updated_at": "2020-12-02T07:50:01Z",
|
||||
"pushed_at": "2020-12-01T15:50:45Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2774,6 +2774,9 @@ The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote
|
|||
|
||||
- [mansoorr123/wp-file-manager-CVE-2020-25213](https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213)
|
||||
|
||||
### CVE-2020-25265
|
||||
- [refi64/CVE-2020-25265-25266](https://github.com/refi64/CVE-2020-25265-25266)
|
||||
|
||||
### CVE-2020-25270 (2020-10-08)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue