mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-03-31 12:25:43 +02:00
Auto Update 2019/12/19 15:30:01
This commit is contained in:
parent
bb82ce05b4
commit
42f4825e1c
33 changed files with 170 additions and 147 deletions
2016
2017
2018
CVE-2018-0824.jsonCVE-2018-13379.jsonCVE-2018-4150.jsonCVE-2018-4243.jsonCVE-2018-4280.jsonCVE-2018-7600.jsonCVE-2018-8581.jsonCVE-2018-9995.json
2019
CVE-2019-0604.jsonCVE-2019-0708.jsonCVE-2019-0808.jsonCVE-2019-1069.jsonCVE-2019-11043.jsonCVE-2019-11510.jsonCVE-2019-11581.jsonCVE-2019-11708.jsonCVE-2019-11932.jsonCVE-2019-12476.jsonCVE-2019-1253.jsonCVE-2019-1388.jsonCVE-2019-18935.jsonCVE-2019-2107.jsonCVE-2019-2215.jsonCVE-2019-2618.jsonCVE-2019-2725.jsonCVE-2019-3396.jsonCVE-2019-7238.jsonCVE-2019-9621.json
|
@ -197,13 +197,13 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2019-12-13T02:56:59Z",
|
||||
"updated_at": "2019-12-19T11:20:41Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -335,13 +335,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2019-12-10T06:48:44Z",
|
||||
"updated_at": "2019-12-19T09:00:51Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -427,13 +427,13 @@
|
|||
"description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-20T15:26:55Z",
|
||||
"updated_at": "2019-07-19T03:05:08Z",
|
||||
"updated_at": "2019-12-19T13:44:39Z",
|
||||
"pushed_at": "2019-03-27T17:47:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "A collection of tools for the Janus exploit [CVE-2017-13156].",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-25T16:31:16Z",
|
||||
"updated_at": "2019-11-03T09:37:52Z",
|
||||
"updated_at": "2019-12-19T03:48:44Z",
|
||||
"pushed_at": "2019-10-22T20:04:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 229002257,
|
||||
"name": "jackson-RCE",
|
||||
"full_name": "BassinD\/jackson-RCE",
|
||||
"owner": {
|
||||
"login": "BassinD",
|
||||
"id": 29598797,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29598797?v=4",
|
||||
"html_url": "https:\/\/github.com\/BassinD"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BassinD\/jackson-RCE",
|
||||
"description": "Demo for CVE-2017-7525",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-19T07:45:21Z",
|
||||
"updated_at": "2019-12-19T08:09:43Z",
|
||||
"pushed_at": "2019-12-19T08:09:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-06-16T09:53:10Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for CVE-2018-0824",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-15T08:59:37Z",
|
||||
"updated_at": "2019-11-13T23:37:34Z",
|
||||
"updated_at": "2019-12-19T13:33:11Z",
|
||||
"pushed_at": "2018-06-25T07:13:36Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-13379",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-11T09:44:37Z",
|
||||
"updated_at": "2019-11-20T14:32:04Z",
|
||||
"updated_at": "2019-12-19T09:29:03Z",
|
||||
"pushed_at": "2019-08-14T08:40:25Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 188,
|
||||
"watchers": 189,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2018-13379 Script for Nmap NSE.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-14T04:09:44Z",
|
||||
"updated_at": "2019-12-09T05:54:44Z",
|
||||
"updated_at": "2019-12-19T09:29:05Z",
|
||||
"pushed_at": "2019-11-21T22:10:33Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-05-08T16:14:50Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-06-13T15:40:15Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-11-13T00:26:18Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 398,
|
||||
"watchers_count": 398,
|
||||
"forks_count": 126,
|
||||
"forks": 126,
|
||||
"forks_count": 125,
|
||||
"forks": 125,
|
||||
"watchers": 398,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2018-8581",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T06:08:23Z",
|
||||
"updated_at": "2019-12-17T11:47:57Z",
|
||||
"updated_at": "2019-12-19T07:03:42Z",
|
||||
"pushed_at": "2019-06-21T11:29:41Z",
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 281,
|
||||
"watchers": 282,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-01-23T14:27:21Z",
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"forks_count": 160,
|
||||
"forks": 160,
|
||||
"forks_count": 161,
|
||||
"forks": 161,
|
||||
"watchers": 399,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2019-0604 SharePoint RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-26T15:00:29Z",
|
||||
"updated_at": "2019-12-18T08:50:15Z",
|
||||
"updated_at": "2019-12-19T05:15:30Z",
|
||||
"pushed_at": "2019-10-18T14:49:10Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1048,13 +1048,13 @@
|
|||
"description": "dump",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T06:57:19Z",
|
||||
"updated_at": "2019-12-16T06:51:02Z",
|
||||
"updated_at": "2019-12-19T07:09:15Z",
|
||||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 451,
|
||||
"watchers_count": 451,
|
||||
"stargazers_count": 450,
|
||||
"watchers_count": 450,
|
||||
"forks_count": 185,
|
||||
"forks": 185,
|
||||
"watchers": 451,
|
||||
"watchers": 450,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1117,13 +1117,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2019-12-18T17:38:59Z",
|
||||
"updated_at": "2019-12-19T08:26:29Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1067,
|
||||
"watchers_count": 1067,
|
||||
"stargazers_count": 1066,
|
||||
"watchers_count": 1066,
|
||||
"forks_count": 354,
|
||||
"forks": 354,
|
||||
"watchers": 1067,
|
||||
"watchers": 1066,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1301,13 +1301,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2019-12-17T01:38:16Z",
|
||||
"updated_at": "2019-12-19T12:45:39Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 666,
|
||||
"watchers_count": 666,
|
||||
"forks_count": 155,
|
||||
"forks": 155,
|
||||
"watchers": 666,
|
||||
"stargazers_count": 668,
|
||||
"watchers_count": 668,
|
||||
"forks_count": 156,
|
||||
"forks": 156,
|
||||
"watchers": 668,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1485,13 +1485,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2019-12-18T02:35:40Z",
|
||||
"updated_at": "2019-12-19T08:26:50Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 990,
|
||||
"watchers_count": 990,
|
||||
"stargazers_count": 988,
|
||||
"watchers_count": 988,
|
||||
"forks_count": 346,
|
||||
"forks": 346,
|
||||
"watchers": 990,
|
||||
"watchers": 988,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1554,13 +1554,13 @@
|
|||
"description": "Porting BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2019-12-10T06:41:21Z",
|
||||
"updated_at": "2019-12-19T07:09:14Z",
|
||||
"pushed_at": "2019-07-20T04:48:43Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"forks_count": 110,
|
||||
"forks": 110,
|
||||
"watchers": 308,
|
||||
"watchers": 307,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1669,13 +1669,13 @@
|
|||
"description": "Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS\/SSL and x509 support",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-03T07:49:26Z",
|
||||
"updated_at": "2019-12-18T22:54:44Z",
|
||||
"updated_at": "2019-12-19T08:25:16Z",
|
||||
"pushed_at": "2019-06-12T08:48:17Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Win32k Exploit by Grant Willcox",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-17T14:08:01Z",
|
||||
"updated_at": "2019-11-21T07:50:41Z",
|
||||
"updated_at": "2019-12-19T13:41:19Z",
|
||||
"pushed_at": "2019-05-17T14:17:00Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 67,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-03T08:07:32Z",
|
||||
"updated_at": "2019-10-13T12:57:36Z",
|
||||
"updated_at": "2019-12-19T14:48:26Z",
|
||||
"pushed_at": "2019-06-26T11:53:08Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-28T11:09:06Z",
|
||||
"updated_at": "2019-12-16T13:57:34Z",
|
||||
"updated_at": "2019-12-19T07:27:33Z",
|
||||
"pushed_at": "2019-10-29T15:47:02Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-21T08:40:26Z",
|
||||
"updated_at": "2019-12-09T07:19:20Z",
|
||||
"updated_at": "2019-12-19T12:38:14Z",
|
||||
"pushed_at": "2019-09-02T16:36:31Z",
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 254,
|
||||
"watchers": 255,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-07-22T06:47:52Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2019-12-18T14:41:09Z",
|
||||
"updated_at": "2019-12-19T15:17:57Z",
|
||||
"pushed_at": "2019-12-10T11:26:28Z",
|
||||
"stargazers_count": 525,
|
||||
"watchers_count": 525,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2019-12-13T13:00:32Z",
|
||||
"updated_at": "2019-12-19T06:34:30Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T18:14:34Z",
|
||||
"updated_at": "2019-11-07T23:54:28Z",
|
||||
"updated_at": "2019-12-19T13:38:37Z",
|
||||
"pushed_at": "2019-06-24T18:30:30Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Poc for CVE-2019-1253",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T20:40:15Z",
|
||||
"updated_at": "2019-12-18T01:53:37Z",
|
||||
"updated_at": "2019-12-19T12:11:12Z",
|
||||
"pushed_at": "2019-09-12T14:43:47Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2019-12-16T01:58:04Z",
|
||||
"updated_at": "2019-12-19T10:59:19Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 41,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2019-12-18T16:33:56Z",
|
||||
"updated_at": "2019-12-19T12:35:12Z",
|
||||
"pushed_at": "2019-12-18T15:32:15Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 85,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-2107",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T14:18:33Z",
|
||||
"updated_at": "2019-12-17T19:04:15Z",
|
||||
"updated_at": "2019-12-19T10:59:55Z",
|
||||
"pushed_at": "2019-07-25T08:01:07Z",
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 299,
|
||||
"watchers": 300,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-09T06:31:41Z",
|
||||
"updated_at": "2019-10-24T00:27:08Z",
|
||||
"updated_at": "2019-12-19T14:17:46Z",
|
||||
"pushed_at": "2019-10-09T06:32:59Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic Unrestricted File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-17T11:12:32Z",
|
||||
"updated_at": "2019-11-30T23:35:41Z",
|
||||
"updated_at": "2019-12-19T13:41:07Z",
|
||||
"pushed_at": "2019-04-17T11:13:29Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2019-12-17T09:54:02Z",
|
||||
"updated_at": "2019-12-19T11:35:25Z",
|
||||
"pushed_at": "2019-06-24T06:06:48Z",
|
||||
"stargazers_count": 464,
|
||||
"watchers_count": 464,
|
||||
"stargazers_count": 465,
|
||||
"watchers_count": 465,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 464,
|
||||
"watchers": 465,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2019-12-10T06:48:44Z",
|
||||
"updated_at": "2019-12-19T09:00:51Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-04-09T11:06:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-24T23:09:43Z",
|
||||
"updated_at": "2019-12-12T08:07:44Z",
|
||||
"updated_at": "2019-12-19T12:15:59Z",
|
||||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-06T15:47:20Z",
|
||||
"updated_at": "2019-11-14T14:46:23Z",
|
||||
"updated_at": "2019-12-19T03:36:32Z",
|
||||
"pushed_at": "2019-05-08T16:22:58Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue