mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/05/28 00:08:16
This commit is contained in:
parent
ab1c8cf302
commit
2e5ffb60a9
35 changed files with 161 additions and 161 deletions
|
@ -82,13 +82,13 @@
|
|||
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-03T20:28:27Z",
|
||||
"updated_at": "2020-05-07T18:09:29Z",
|
||||
"updated_at": "2020-05-27T09:42:10Z",
|
||||
"pushed_at": "2019-01-31T22:56:17Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 182,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-27T07:40:50Z",
|
||||
"updated_at": "2020-05-27T11:44:03Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 433,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-29T09:01:52Z",
|
||||
"updated_at": "2020-04-11T06:11:09Z",
|
||||
"updated_at": "2020-05-27T12:37:46Z",
|
||||
"pushed_at": "2016-04-07T10:37:02Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-27T07:40:50Z",
|
||||
"updated_at": "2020-05-27T11:44:03Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 433,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 187,
|
||||
"forks": 187,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-05-25T08:28:43Z",
|
||||
"updated_at": "2020-05-27T09:59:10Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -569,8 +569,8 @@
|
|||
"pushed_at": "2019-04-25T12:44:02Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-27T07:40:50Z",
|
||||
"updated_at": "2020-05-27T11:44:03Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 433,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-05-20T03:31:41Z",
|
||||
"updated_at": "2020-05-27T11:33:28Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 539,
|
||||
"watchers": 538,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -209,14 +209,14 @@
|
|||
{
|
||||
"id": 253274048,
|
||||
"name": "CVE-2017-9805-Exploit",
|
||||
"full_name": "thevivekkryadav\/CVE-2017-9805-Exploit",
|
||||
"full_name": "0xd3vil\/CVE-2017-9805-Exploit",
|
||||
"owner": {
|
||||
"login": "thevivekkryadav",
|
||||
"login": "0xd3vil",
|
||||
"id": 32324065,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/32324065?v=4",
|
||||
"html_url": "https:\/\/github.com\/thevivekkryadav"
|
||||
"html_url": "https:\/\/github.com\/0xd3vil"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thevivekkryadav\/CVE-2017-9805-Exploit",
|
||||
"html_url": "https:\/\/github.com\/0xd3vil\/CVE-2017-9805-Exploit",
|
||||
"description": "Struts 2.5 - 2.5.12 REST Plugin XStream RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T16:00:48Z",
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-06-02T10:33:41Z",
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 241,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-11686 - FlexPaper PHP Publish Service RCE <= 2.3.6",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-20T19:36:10Z",
|
||||
"updated_at": "2020-04-05T17:18:48Z",
|
||||
"updated_at": "2020-05-27T12:15:17Z",
|
||||
"pushed_at": "2019-03-20T20:56:02Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-03-06T10:52:19Z",
|
||||
"stargazers_count": 400,
|
||||
"watchers_count": 400,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"forks_count": 124,
|
||||
"forks": 124,
|
||||
"watchers": 400,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-27T07:40:50Z",
|
||||
"updated_at": "2020-05-27T11:44:03Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 433,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-05-20T03:31:41Z",
|
||||
"updated_at": "2020-05-27T11:33:28Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 539,
|
||||
"watchers": 538,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-05-26T07:04:44Z",
|
||||
"updated_at": "2020-05-27T10:00:08Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 254,
|
||||
"watchers": 255,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 434,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"watchers": 271,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1144,8 +1144,8 @@
|
|||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1103,
|
||||
"watchers_count": 1103,
|
||||
"forks_count": 373,
|
||||
"forks": 373,
|
||||
"forks_count": 374,
|
||||
"forks": 374,
|
||||
"watchers": 1103,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1351,8 +1351,8 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 733,
|
||||
"watchers_count": 733,
|
||||
"forks_count": 172,
|
||||
"forks": 172,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 733,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1554,13 +1554,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2020-05-22T16:46:45Z",
|
||||
"updated_at": "2020-05-27T10:30:15Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1023,
|
||||
"watchers_count": 1023,
|
||||
"stargazers_count": 1024,
|
||||
"watchers_count": 1024,
|
||||
"forks_count": 350,
|
||||
"forks": 350,
|
||||
"watchers": 1023,
|
||||
"watchers": 1024,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2524,8 +2524,8 @@
|
|||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Poc for CVE-2019-1253",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T20:40:15Z",
|
||||
"updated_at": "2020-05-18T10:43:18Z",
|
||||
"updated_at": "2020-05-27T13:09:37Z",
|
||||
"pushed_at": "2019-09-12T14:43:47Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-27T08:25:13Z",
|
||||
"pushed_at": "2020-05-27T07:41:34Z",
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"forks_count": 176,
|
||||
"forks": 176,
|
||||
"watchers": 777,
|
||||
"updated_at": "2020-05-27T13:46:44Z",
|
||||
"pushed_at": "2020-05-27T10:27:11Z",
|
||||
"stargazers_count": 782,
|
||||
"watchers_count": 782,
|
||||
"forks_count": 177,
|
||||
"forks": 177,
|
||||
"watchers": 782,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T06:32:08Z",
|
||||
"updated_at": "2020-05-17T11:40:31Z",
|
||||
"updated_at": "2020-05-27T11:18:56Z",
|
||||
"pushed_at": "2019-11-12T03:58:00Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-14T17:27:37Z",
|
||||
"updated_at": "2020-05-27T08:04:26Z",
|
||||
"updated_at": "2020-05-27T11:29:29Z",
|
||||
"pushed_at": "2019-10-15T01:04:08Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-27T07:40:50Z",
|
||||
"updated_at": "2020-05-27T11:44:03Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 433,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-05-25T08:28:43Z",
|
||||
"updated_at": "2020-05-27T09:59:10Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T15:44:29Z",
|
||||
"updated_at": "2020-05-26T09:31:45Z",
|
||||
"updated_at": "2020-05-27T11:16:55Z",
|
||||
"pushed_at": "2020-05-24T16:28:46Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploiting a patched vulnerability in JavaScriptCore",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-02T00:12:22Z",
|
||||
"updated_at": "2020-05-10T10:37:39Z",
|
||||
"updated_at": "2020-05-27T09:32:18Z",
|
||||
"pushed_at": "2020-01-02T00:13:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-05T11:43:13Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Zimbra RCE PoC - CVE-2019-9670 XXE\/SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-16T04:37:11Z",
|
||||
"updated_at": "2020-04-13T11:45:51Z",
|
||||
"updated_at": "2020-05-27T14:22:51Z",
|
||||
"pushed_at": "2019-08-16T05:54:16Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -956,13 +956,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-05-27T08:59:59Z",
|
||||
"updated_at": "2020-05-27T12:54:05Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 898,
|
||||
"watchers_count": 898,
|
||||
"forks_count": 267,
|
||||
"forks": 267,
|
||||
"watchers": 898,
|
||||
"stargazers_count": 900,
|
||||
"watchers_count": 900,
|
||||
"forks_count": 271,
|
||||
"forks": 271,
|
||||
"watchers": 900,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1140,13 +1140,13 @@
|
|||
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T15:16:10Z",
|
||||
"updated_at": "2020-05-27T07:13:51Z",
|
||||
"updated_at": "2020-05-27T11:48:07Z",
|
||||
"pushed_at": "2020-04-06T15:22:01Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-05-26T10:23:34Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-27T08:25:13Z",
|
||||
"pushed_at": "2020-05-27T07:41:34Z",
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"forks_count": 176,
|
||||
"forks": 176,
|
||||
"watchers": 777,
|
||||
"updated_at": "2020-05-27T13:46:44Z",
|
||||
"pushed_at": "2020-05-27T10:27:11Z",
|
||||
"stargazers_count": 782,
|
||||
"watchers_count": 782,
|
||||
"forks_count": 177,
|
||||
"forks": 177,
|
||||
"watchers": 782,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Nexus 3 越权漏洞利用脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-27T07:03:59Z",
|
||||
"updated_at": "2020-05-27T07:54:10Z",
|
||||
"updated_at": "2020-05-27T15:00:57Z",
|
||||
"pushed_at": "2020-05-27T07:09:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-05-26T10:06:29Z",
|
||||
"updated_at": "2020-05-27T14:53:36Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-27T07:40:50Z",
|
||||
"updated_at": "2020-05-27T11:44:03Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 433,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 113,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2020-05-27T05:17:55Z",
|
||||
"updated_at": "2020-05-27T13:22:06Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 176,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-05-21T02:30:47Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T14:30:46Z",
|
||||
"updated_at": "2020-05-27T06:16:32Z",
|
||||
"updated_at": "2020-05-27T11:54:15Z",
|
||||
"pushed_at": "2020-05-21T15:13:22Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -9612,7 +9612,7 @@ The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x bef
|
|||
- [chrisjd20/cve-2017-9805.py](https://github.com/chrisjd20/cve-2017-9805.py)
|
||||
- [UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-](https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-)
|
||||
- [UbuntuStrike/CVE-2017-9805_Struts_Fuzz_N_Sploit](https://github.com/UbuntuStrike/CVE-2017-9805_Struts_Fuzz_N_Sploit)
|
||||
- [thevivekkryadav/CVE-2017-9805-Exploit](https://github.com/thevivekkryadav/CVE-2017-9805-Exploit)
|
||||
- [0xd3vil/CVE-2017-9805-Exploit](https://github.com/0xd3vil/CVE-2017-9805-Exploit)
|
||||
- [AvishkaSenadheera20/CVE-2017-9805---Documentation---IT19143378](https://github.com/AvishkaSenadheera20/CVE-2017-9805---Documentation---IT19143378)
|
||||
|
||||
### CVE-2017-9830
|
||||
|
|
Loading…
Add table
Reference in a new issue