mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/04/29 18:11:31
This commit is contained in:
parent
ea02c5f465
commit
3cfd9acd32
34 changed files with 176 additions and 128 deletions
|
@ -297,5 +297,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 362681987,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "cherrera0001\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "cherrera0001",
|
||||
"id": 19656010,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19656010?v=4",
|
||||
"html_url": "https:\/\/github.com\/cherrera0001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cherrera0001\/CVE-2007-2447",
|
||||
"description": " Samba usermap script.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T03:48:01Z",
|
||||
"updated_at": "2021-04-29T03:48:23Z",
|
||||
"pushed_at": "2021-04-29T03:48:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-28T23:24:07Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1011,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-28T23:24:07Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1011,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2021-04-26T06:20:30Z",
|
||||
"updated_at": "2021-04-29T05:58:50Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"forks_count": 104,
|
||||
"forks": 104,
|
||||
"watchers": 219,
|
||||
"watchers": 220,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -358,13 +358,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-04-26T15:13:31Z",
|
||||
"updated_at": "2021-04-29T07:14:58Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 273,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,8 +128,8 @@
|
|||
"description": "Anaysis cve-2017-11176 \/ mq_notify issue",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T05:01:34Z",
|
||||
"updated_at": "2021-04-03T05:38:28Z",
|
||||
"pushed_at": "2021-04-03T05:38:26Z",
|
||||
"updated_at": "2021-04-29T07:14:37Z",
|
||||
"pushed_at": "2021-04-29T07:14:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-28T23:24:07Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1011,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-28T23:24:07Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1011,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2021-04-20T21:02:37Z",
|
||||
"updated_at": "2021-04-29T05:11:41Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"stargazers_count": 581,
|
||||
"watchers_count": 581,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 580,
|
||||
"watchers": 581,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-09T21:46:57Z",
|
||||
"updated_at": "2021-04-12T21:03:19Z",
|
||||
"updated_at": "2021-04-29T04:30:19Z",
|
||||
"pushed_at": "2021-02-07T19:51:24Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-29T02:48:46Z",
|
||||
"updated_at": "2021-04-29T08:22:51Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2542,
|
||||
"watchers_count": 2542,
|
||||
"forks_count": 740,
|
||||
"forks": 740,
|
||||
"watchers": 2542,
|
||||
"stargazers_count": 2544,
|
||||
"watchers_count": 2544,
|
||||
"forks_count": 741,
|
||||
"forks": 741,
|
||||
"watchers": 2544,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-28T23:24:07Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1011,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-04-26T15:13:31Z",
|
||||
"updated_at": "2021-04-29T07:14:58Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 273,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-04-26T06:59:04Z",
|
||||
"updated_at": "2021-04-29T03:35:49Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 556,
|
||||
"watchers_count": 556,
|
||||
"stargazers_count": 557,
|
||||
"watchers_count": 557,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"watchers": 556,
|
||||
"watchers": 557,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2021-04-27T19:04:52Z",
|
||||
"updated_at": "2021-04-29T06:02:10Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T15:40:03Z",
|
||||
"updated_at": "2021-04-24T12:07:53Z",
|
||||
"updated_at": "2021-04-29T03:36:40Z",
|
||||
"pushed_at": "2021-04-23T19:21:16Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2021-04-25T15:59:04Z",
|
||||
"updated_at": "2021-04-29T08:42:50Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 202,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-29T02:48:46Z",
|
||||
"updated_at": "2021-04-29T08:22:51Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2542,
|
||||
"watchers_count": 2542,
|
||||
"forks_count": 740,
|
||||
"forks": 740,
|
||||
"watchers": 2542,
|
||||
"stargazers_count": 2544,
|
||||
"watchers_count": 2544,
|
||||
"forks_count": 741,
|
||||
"forks": 741,
|
||||
"watchers": 2544,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-29T03:10:25Z",
|
||||
"updated_at": "2021-04-29T07:44:27Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 712,
|
||||
"watchers_count": 712,
|
||||
"forks_count": 215,
|
||||
"forks": 215,
|
||||
"watchers": 712,
|
||||
"stargazers_count": 713,
|
||||
"watchers_count": 713,
|
||||
"forks_count": 219,
|
||||
"forks": 219,
|
||||
"watchers": 713,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-17T11:29:58Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-28T21:15:35Z",
|
||||
"updated_at": "2020-08-13T10:30:19Z",
|
||||
"updated_at": "2021-04-29T06:22:18Z",
|
||||
"pushed_at": "2020-05-09T09:35:18Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-28T23:24:07Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1011,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-20T08:35:26Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-9547:FasterXML\/jackson-databind 远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T13:37:21Z",
|
||||
"updated_at": "2021-03-19T10:15:32Z",
|
||||
"updated_at": "2021-04-29T03:36:36Z",
|
||||
"pushed_at": "2020-03-02T14:18:24Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T05:07:15Z",
|
||||
"updated_at": "2021-03-18T01:20:53Z",
|
||||
"updated_at": "2021-04-29T06:01:20Z",
|
||||
"pushed_at": "2021-03-08T11:41:19Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-20T08:35:26Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-29T03:10:25Z",
|
||||
"updated_at": "2021-04-29T07:44:27Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 712,
|
||||
"watchers_count": 712,
|
||||
"forks_count": 215,
|
||||
"forks": 215,
|
||||
"watchers": 712,
|
||||
"stargazers_count": 713,
|
||||
"watchers_count": 713,
|
||||
"forks_count": 219,
|
||||
"forks": 219,
|
||||
"watchers": 713,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-22T07:25:31Z",
|
||||
"updated_at": "2021-04-27T18:40:24Z",
|
||||
"updated_at": "2021-04-29T04:21:07Z",
|
||||
"pushed_at": "2021-04-23T13:11:17Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,8 +36,8 @@
|
|||
"description": " Indicator of Compromise Scanner for CVE-2021-31221 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-28T12:54:41Z",
|
||||
"updated_at": "2021-04-28T13:14:46Z",
|
||||
"pushed_at": "2021-04-28T13:14:43Z",
|
||||
"updated_at": "2021-04-29T08:02:44Z",
|
||||
"pushed_at": "2021-04-29T08:03:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-04-29T00:37:50Z",
|
||||
"updated_at": "2021-04-29T06:58:24Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 702,
|
||||
"watchers_count": 702,
|
||||
"stargazers_count": 703,
|
||||
"watchers_count": 703,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 702,
|
||||
"watchers": 703,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1010,5 +1010,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 362713324,
|
||||
"name": "pwnedit",
|
||||
"full_name": "LiveOverflow\/pwnedit",
|
||||
"owner": {
|
||||
"login": "LiveOverflow",
|
||||
"id": 12161158,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4",
|
||||
"html_url": "https:\/\/github.com\/LiveOverflow"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LiveOverflow\/pwnedit",
|
||||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-04-29T08:58:59Z",
|
||||
"pushed_at": "2021-04-29T06:29:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploiting a Cross-site request forgery (CSRF) attack to creat a new privileged user through the Webmin's add users feature ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T20:13:06Z",
|
||||
"updated_at": "2021-04-29T02:53:23Z",
|
||||
"updated_at": "2021-04-29T07:11:09Z",
|
||||
"pushed_at": "2021-04-24T22:05:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2021-04-27T03:31:23Z",
|
||||
"updated_at": "2021-04-29T09:13:57Z",
|
||||
"pushed_at": "2021-04-26T18:21:42Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-04-29T02:32:30Z",
|
||||
"updated_at": "2021-04-29T08:19:34Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 151,
|
||||
"watchers": 153,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -184,6 +184,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [Nokialinux/CVE-2021-3156](https://github.com/Nokialinux/CVE-2021-3156)
|
||||
- [password520/CVE-2021-3156](https://github.com/password520/CVE-2021-3156)
|
||||
- [AlexSeniorProject/CVE-2021-3156](https://github.com/AlexSeniorProject/CVE-2021-3156)
|
||||
- [LiveOverflow/pwnedit](https://github.com/LiveOverflow/pwnedit)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [y3rb1t4/CVE-2021-3157](https://github.com/y3rb1t4/CVE-2021-3157)
|
||||
|
@ -18248,6 +18249,7 @@ The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote
|
|||
- [ozuma/CVE-2007-2447](https://github.com/ozuma/CVE-2007-2447)
|
||||
- [Un4gi/CVE-2007-2447](https://github.com/Un4gi/CVE-2007-2447)
|
||||
- [Ki11i0n4ir3/Sambaster](https://github.com/Ki11i0n4ir3/Sambaster)
|
||||
- [cherrera0001/CVE-2007-2447](https://github.com/cherrera0001/CVE-2007-2447)
|
||||
|
||||
### CVE-2007-3830 (2007-07-17)
|
||||
|
||||
|
|
Loading…
Reference in a new issue