mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/11/14 00:09:22
This commit is contained in:
parent
44e99cef54
commit
47018cb949
25 changed files with 162 additions and 86 deletions
|
@ -13,8 +13,8 @@
|
|||
"description": "A very simple buffer overflow using CVE-2013-4730 against PCman's FTP server",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T08:20:35Z",
|
||||
"updated_at": "2020-11-12T08:25:59Z",
|
||||
"pushed_at": "2020-11-12T08:25:56Z",
|
||||
"updated_at": "2020-11-13T09:59:25Z",
|
||||
"pushed_at": "2020-11-13T09:59:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-09-06T18:03:10Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2020-11-05T16:38:03Z",
|
||||
"updated_at": "2020-11-13T11:07:52Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 350,
|
||||
"watchers": 351,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -251,5 +251,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 312564506,
|
||||
"name": "apache-struts-cve-2017-9805",
|
||||
"full_name": "rvermeulen\/apache-struts-cve-2017-9805",
|
||||
"owner": {
|
||||
"login": "rvermeulen",
|
||||
"id": 636626,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/636626?v=4",
|
||||
"html_url": "https:\/\/github.com\/rvermeulen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rvermeulen\/apache-struts-cve-2017-9805",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T12:04:32Z",
|
||||
"updated_at": "2020-11-13T12:12:37Z",
|
||||
"pushed_at": "2020-11-13T12:07:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-14T12:23:52Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2019-11-21T15:03:15Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-06-10T22:10:10Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2020-10-18T20:58:15Z",
|
||||
"updated_at": "2020-11-13T14:27:22Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-26T03:19:49Z",
|
||||
"updated_at": "2020-07-21T05:45:26Z",
|
||||
"updated_at": "2020-11-13T14:30:30Z",
|
||||
"pushed_at": "2020-07-01T23:13:17Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-17558 Solr模板注入漏洞图形化一键检测工具。CVE-2019-17558 Solr Velocity Template Vul POC Tool.",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-25T10:54:20Z",
|
||||
"updated_at": "2020-09-15T06:07:55Z",
|
||||
"updated_at": "2020-11-13T10:23:15Z",
|
||||
"pushed_at": "2020-01-10T10:58:44Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-13T05:05:13Z",
|
||||
"updated_at": "2020-11-13T10:01:52Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2048,
|
||||
"watchers_count": 2048,
|
||||
"forks_count": 547,
|
||||
"forks": 547,
|
||||
"watchers": 2048,
|
||||
"stargazers_count": 2049,
|
||||
"watchers_count": 2049,
|
||||
"forks_count": 548,
|
||||
"forks": 548,
|
||||
"watchers": 2049,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T02:41:44Z",
|
||||
"updated_at": "2020-11-12T18:44:44Z",
|
||||
"updated_at": "2020-11-13T09:15:25Z",
|
||||
"pushed_at": "2020-02-19T03:47:33Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-11-09T13:34:24Z",
|
||||
"updated_at": "2020-11-13T12:33:36Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 664,
|
||||
"watchers_count": 664,
|
||||
"stargazers_count": 665,
|
||||
"watchers_count": 665,
|
||||
"forks_count": 137,
|
||||
"forks": 137,
|
||||
"watchers": 664,
|
||||
"watchers": 665,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-11T16:21:01Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-09-14T16:53:07Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-13T05:05:13Z",
|
||||
"updated_at": "2020-11-13T10:01:52Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2048,
|
||||
"watchers_count": 2048,
|
||||
"forks_count": 547,
|
||||
"forks": 547,
|
||||
"watchers": 2048,
|
||||
"stargazers_count": 2049,
|
||||
"watchers_count": 2049,
|
||||
"forks_count": 548,
|
||||
"forks": 548,
|
||||
"watchers": 2049,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2020-11-13T07:43:33Z",
|
||||
"updated_at": "2020-11-13T10:08:32Z",
|
||||
"pushed_at": "2020-11-10T02:58:25Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 333,
|
||||
"watchers": 335,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-11-13T06:40:00Z",
|
||||
"updated_at": "2020-11-13T14:07:33Z",
|
||||
"pushed_at": "2020-11-04T02:26:59Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 174,
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 176,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -293,8 +293,8 @@
|
|||
"pushed_at": "2020-11-05T03:29:09Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2020/CVE-2020-15349.json
Normal file
25
2020/CVE-2020-15349.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 312567868,
|
||||
"name": "Forklift_LPE",
|
||||
"full_name": "Traxes\/Forklift_LPE",
|
||||
"owner": {
|
||||
"login": "Traxes",
|
||||
"id": 6783032,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6783032?v=4",
|
||||
"html_url": "https:\/\/github.com\/Traxes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Traxes\/Forklift_LPE",
|
||||
"description": "Vulnerability Description of CVE-2020-15349",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T12:20:07Z",
|
||||
"updated_at": "2020-11-13T13:41:44Z",
|
||||
"pushed_at": "2020-11-13T13:41:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 6,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 312566882,
|
||||
"name": "WPKiller",
|
||||
"full_name": "Dark-Grizzly\/WPKiller",
|
||||
"owner": {
|
||||
"login": "Dark-Grizzly",
|
||||
"id": 53230336,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53230336?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dark-Grizzly"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dark-Grizzly\/WPKiller",
|
||||
"description": "CVE-2020-25213 Wordpress File Manager 6.7 Plugin 0day exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T12:15:26Z",
|
||||
"updated_at": "2020-11-13T14:58:52Z",
|
||||
"pushed_at": "2020-11-13T14:58:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-2555 Python POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:02:59Z",
|
||||
"updated_at": "2020-10-25T12:53:18Z",
|
||||
"updated_at": "2020-11-13T15:09:03Z",
|
||||
"pushed_at": "2020-04-16T12:04:18Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-04T12:02:34Z",
|
||||
"updated_at": "2020-11-08T12:28:57Z",
|
||||
"updated_at": "2020-11-13T12:46:18Z",
|
||||
"pushed_at": "2020-11-04T13:10:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "my exp for CVE-2020-27194, tested on linux kernel 5.8.14.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-09T11:58:34Z",
|
||||
"updated_at": "2020-11-10T14:50:08Z",
|
||||
"updated_at": "2020-11-13T12:46:12Z",
|
||||
"pushed_at": "2020-11-09T12:11:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 187,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 135,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T09:01:12Z",
|
||||
"updated_at": "2020-11-13T09:07:07Z",
|
||||
"pushed_at": "2020-11-13T09:07:05Z",
|
||||
"updated_at": "2020-11-13T09:52:13Z",
|
||||
"pushed_at": "2020-11-13T09:50:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-07-23T12:55:28Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -2379,6 +2379,9 @@ In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVari
|
|||
|
||||
- [guettli/fix-CVE-2020-15228](https://github.com/guettli/fix-CVE-2020-15228)
|
||||
|
||||
### CVE-2020-15349
|
||||
- [Traxes/Forklift_LPE](https://github.com/Traxes/Forklift_LPE)
|
||||
|
||||
### CVE-2020-15367 (2020-07-07)
|
||||
|
||||
<code>
|
||||
|
@ -2647,6 +2650,7 @@ The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote
|
|||
</code>
|
||||
|
||||
- [mansoorr123/wp-file-manager-CVE-2020-25213](https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213)
|
||||
- [Dark-Grizzly/WPKiller](https://github.com/Dark-Grizzly/WPKiller)
|
||||
|
||||
### CVE-2020-25270 (2020-10-08)
|
||||
|
||||
|
@ -10965,6 +10969,7 @@ The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x bef
|
|||
- [UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit](https://github.com/UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit)
|
||||
- [0xd3vil/CVE-2017-9805-Exploit](https://github.com/0xd3vil/CVE-2017-9805-Exploit)
|
||||
- [AvishkaSenadheera20/CVE-2017-9805---Documentation---IT19143378](https://github.com/AvishkaSenadheera20/CVE-2017-9805---Documentation---IT19143378)
|
||||
- [rvermeulen/apache-struts-cve-2017-9805](https://github.com/rvermeulen/apache-struts-cve-2017-9805)
|
||||
|
||||
### CVE-2017-9822 (2017-07-20)
|
||||
|
||||
|
|
Loading…
Reference in a new issue