mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/02/29 18:07:31
This commit is contained in:
parent
45a070968d
commit
474b27de83
36 changed files with 137 additions and 1520 deletions
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 29914821,
|
||||
"name": "jboss-autopwn",
|
||||
"full_name": "ChristianPapathanasiou\/jboss-autopwn",
|
||||
"owner": {
|
||||
"login": "ChristianPapathanasiou",
|
||||
"id": 5354349,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5354349?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou\/jboss-autopwn",
|
||||
"description": "JBoss Autopwn as featured at BlackHat Europe 2010 - this version incorporates CVE-2010-0738 the JBoss authentication bypass VERB manipulation vulnerability as discovered by Minded Security",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T13:16:45Z",
|
||||
"updated_at": "2020-01-13T09:44:30Z",
|
||||
"pushed_at": "2015-01-27T13:23:18Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 62456741,
|
||||
"name": "jboss-autopwn",
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2015-09-10T23:01:09Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "An exploit for CVE-2016-7255 on Windows 7\/8\/8.1\/10(pre-anniversary) 64 bit",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-02T23:32:08Z",
|
||||
"updated_at": "2019-11-27T02:56:28Z",
|
||||
"updated_at": "2020-02-29T05:29:31Z",
|
||||
"pushed_at": "2017-03-09T23:00:08Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-02-29T02:02:47Z",
|
||||
"updated_at": "2020-02-29T04:20:17Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 189,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-07T08:30:07Z",
|
||||
"updated_at": "2020-02-27T23:41:34Z",
|
||||
"updated_at": "2020-02-29T06:57:49Z",
|
||||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"forks_count": 110,
|
||||
"forks": 110,
|
||||
"watchers": 260,
|
||||
"watchers": 261,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 174814901,
|
||||
"name": "CVE-2019-0192",
|
||||
"full_name": "mpgn\/CVE-2019-0192",
|
||||
"owner": {
|
||||
"login": "mpgn",
|
||||
"id": 5891788,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
|
||||
"html_url": "https:\/\/github.com\/mpgn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-0192",
|
||||
"description": "RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-10T11:35:26Z",
|
||||
"updated_at": "2020-01-06T06:30:06Z",
|
||||
"pushed_at": "2019-03-10T18:33:43Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 218993619,
|
||||
"name": "Solr-RCE-CVE-2019-0192",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 176290079,
|
||||
"name": "CVE-2019-0193",
|
||||
"full_name": "xConsoIe\/CVE-2019-0193",
|
||||
"owner": {
|
||||
"login": "xConsoIe",
|
||||
"id": 48456709,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48456709?v=4",
|
||||
"html_url": "https:\/\/github.com\/xConsoIe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-03-18T13:18:01Z",
|
||||
"updated_at": "2019-09-04T03:22:35Z",
|
||||
"pushed_at": "2019-03-18T13:22:48Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 201405406,
|
||||
"name": "CVE-2019-0193",
|
||||
|
|
|
@ -22,29 +22,6 @@
|
|||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 181706868,
|
||||
"name": "CVE-2019-0232",
|
||||
"full_name": "jas502n\/CVE-2019-0232",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0232",
|
||||
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-16T14:32:03Z",
|
||||
"updated_at": "2020-01-08T09:48:20Z",
|
||||
"pushed_at": "2019-04-17T02:42:03Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188168912,
|
||||
"name": "CVE-2019-0232-EXP",
|
||||
|
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 177246255,
|
||||
"name": "CVE-2019-0604",
|
||||
"full_name": "linhlhq\/CVE-2019-0604",
|
||||
"owner": {
|
||||
"login": "linhlhq",
|
||||
"id": 28854132,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28854132?v=4",
|
||||
"html_url": "https:\/\/github.com\/linhlhq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
|
||||
"description": "CVE-2019-0604",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-23T05:01:54Z",
|
||||
"updated_at": "2020-01-07T03:13:13Z",
|
||||
"pushed_at": "2019-03-22T05:45:44Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 179413290,
|
||||
"name": "CVE-2019-0604_sharepoint_CVE",
|
||||
"full_name": "denmilu\/CVE-2019-0604_sharepoint_CVE",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-0604_sharepoint_CVE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-04T03:17:30Z",
|
||||
"updated_at": "2019-04-04T03:17:59Z",
|
||||
"pushed_at": "2019-04-04T03:17:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 193926769,
|
||||
"name": "CVE-2019-0604",
|
||||
|
@ -59,13 +13,13 @@
|
|||
"description": "cve-2019-0604 SharePoint RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-26T15:00:29Z",
|
||||
"updated_at": "2020-02-20T02:55:52Z",
|
||||
"updated_at": "2020-02-29T05:57:53Z",
|
||||
"pushed_at": "2019-10-18T14:49:10Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +59,13 @@
|
|||
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-10T02:39:57Z",
|
||||
"updated_at": "2019-12-15T21:46:24Z",
|
||||
"updated_at": "2020-02-29T05:57:47Z",
|
||||
"pushed_at": "2019-12-11T09:33:31Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 177576776,
|
||||
"name": "cve-2019-0808-poc",
|
||||
"full_name": "ze0r\/cve-2019-0808-poc",
|
||||
"owner": {
|
||||
"login": "ze0r",
|
||||
"id": 43227253,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43227253?v=4",
|
||||
"html_url": "https:\/\/github.com\/ze0r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ze0r\/cve-2019-0808-poc",
|
||||
"description": "cve-2019-0808-poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-25T11:53:35Z",
|
||||
"updated_at": "2019-12-19T08:10:56Z",
|
||||
"pushed_at": "2019-03-25T12:10:40Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 182577297,
|
||||
"name": "CVE-2019-0808",
|
||||
"full_name": "rakesh143\/CVE-2019-0808",
|
||||
"owner": {
|
||||
"login": "rakesh143",
|
||||
"id": 12870599,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12870599?v=4",
|
||||
"html_url": "https:\/\/github.com\/rakesh143"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rakesh143\/CVE-2019-0808",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-21T20:04:34Z",
|
||||
"updated_at": "2019-04-21T20:07:45Z",
|
||||
"pushed_at": "2019-04-21T20:07:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 187227372,
|
||||
"name": "CVE-2019-0808",
|
||||
|
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 179680988,
|
||||
"name": "CVE-2019-0841",
|
||||
"full_name": "rogue-kdc\/CVE-2019-0841",
|
||||
"owner": {
|
||||
"login": "rogue-kdc",
|
||||
"id": 49311295,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49311295?v=4",
|
||||
"html_url": "https:\/\/github.com\/rogue-kdc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2019-0841",
|
||||
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-05T12:53:52Z",
|
||||
"updated_at": "2020-02-13T14:34:01Z",
|
||||
"pushed_at": "2019-04-09T16:49:19Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180605162,
|
||||
"name": "CVE-2019-0841",
|
||||
"full_name": "denmilu\/CVE-2019-0841",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-0841",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T14:58:22Z",
|
||||
"updated_at": "2019-05-26T06:57:44Z",
|
||||
"pushed_at": "2019-04-10T14:58:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 191441504,
|
||||
"name": "CVE-2019-0841-BYPASS",
|
||||
|
|
|
@ -21,74 +21,5 @@
|
|||
"forks": 24,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170809838,
|
||||
"name": "cve-2019-1003000-jenkins-rce-poc",
|
||||
"full_name": "adamyordan\/cve-2019-1003000-jenkins-rce-poc",
|
||||
"owner": {
|
||||
"login": "adamyordan",
|
||||
"id": 9531164,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9531164?v=4",
|
||||
"html_url": "https:\/\/github.com\/adamyordan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adamyordan\/cve-2019-1003000-jenkins-rce-poc",
|
||||
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T05:59:24Z",
|
||||
"updated_at": "2020-02-11T10:39:03Z",
|
||||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172198653,
|
||||
"name": "CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"full_name": "0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"owner": {
|
||||
"login": "0xtavian",
|
||||
"id": 21030907,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21030907?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xtavian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T10:00:03Z",
|
||||
"updated_at": "2019-03-07T07:18:09Z",
|
||||
"pushed_at": "2019-02-23T10:01:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 183322760,
|
||||
"name": "CVE-2019-1003000_RCE-DETECTION",
|
||||
"full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
|
||||
"owner": {
|
||||
"login": "1NTheKut",
|
||||
"id": 26243759,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/26243759?v=4",
|
||||
"html_url": "https:\/\/github.com\/1NTheKut"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
|
||||
"description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-24T23:52:42Z",
|
||||
"updated_at": "2019-05-13T06:00:34Z",
|
||||
"pushed_at": "2019-05-01T07:11:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 181875107,
|
||||
"name": "CVE-2019-2618",
|
||||
"full_name": "pyn3rd\/CVE-2019-2618",
|
||||
"owner": {
|
||||
"login": "pyn3rd",
|
||||
"id": 41412951,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41412951?v=4",
|
||||
"html_url": "https:\/\/github.com\/pyn3rd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2019-2618",
|
||||
"description": "Weblogic Unrestricted File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-17T11:12:32Z",
|
||||
"updated_at": "2020-01-30T15:19:28Z",
|
||||
"pushed_at": "2019-04-17T11:13:29Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 181885950,
|
||||
"name": "cve-2019-2618",
|
||||
"full_name": "jas502n\/cve-2019-2618",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/cve-2019-2618",
|
||||
"description": "Weblogic Upload Vuln(Need username password)-CVE-2019-2618",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-17T12:23:24Z",
|
||||
"updated_at": "2020-02-21T14:16:31Z",
|
||||
"pushed_at": "2019-04-17T15:05:09Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185175648,
|
||||
"name": "CVE-2019-2618-",
|
||||
|
|
|
@ -22,29 +22,6 @@
|
|||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 183346706,
|
||||
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
|
||||
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
|
||||
"owner": {
|
||||
"login": "SkyBlueEternal",
|
||||
"id": 46418185,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46418185?v=4",
|
||||
"html_url": "https:\/\/github.com\/SkyBlueEternal"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
|
||||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-25T03:07:53Z",
|
||||
"updated_at": "2020-02-20T10:21:26Z",
|
||||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 183843413,
|
||||
"name": "CNTA-2019-0014xCVE-2019-2725",
|
||||
|
@ -68,75 +45,6 @@
|
|||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 184489534,
|
||||
"name": "cve-2019-2725",
|
||||
"full_name": "lasensio\/cve-2019-2725",
|
||||
"owner": {
|
||||
"login": "lasensio",
|
||||
"id": 17970238,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17970238?v=4",
|
||||
"html_url": "https:\/\/github.com\/lasensio"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lasensio\/cve-2019-2725",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-01T22:25:14Z",
|
||||
"updated_at": "2020-01-27T15:30:18Z",
|
||||
"pushed_at": "2019-05-01T23:00:39Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 184651903,
|
||||
"name": "CVE-2019-2725",
|
||||
"full_name": "davidmthomsen\/CVE-2019-2725",
|
||||
"owner": {
|
||||
"login": "davidmthomsen",
|
||||
"id": 22969004,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22969004?v=4",
|
||||
"html_url": "https:\/\/github.com\/davidmthomsen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/davidmthomsen\/CVE-2019-2725",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-02T21:09:36Z",
|
||||
"updated_at": "2019-05-02T21:12:00Z",
|
||||
"pushed_at": "2019-05-02T21:11:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185003239,
|
||||
"name": "CVE-2019-2725",
|
||||
"full_name": "leerina\/CVE-2019-2725",
|
||||
"owner": {
|
||||
"login": "leerina",
|
||||
"id": 12816285,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12816285?v=4",
|
||||
"html_url": "https:\/\/github.com\/leerina"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/leerina\/CVE-2019-2725",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-05T08:34:20Z",
|
||||
"updated_at": "2019-05-24T03:17:10Z",
|
||||
"pushed_at": "2019-05-05T08:39:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185956531,
|
||||
"name": "cve-2019-2725",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 180277406,
|
||||
"name": "CVE-2019-3396",
|
||||
"full_name": "dothanthitiendiettiende\/CVE-2019-3396",
|
||||
"owner": {
|
||||
"login": "dothanthitiendiettiende",
|
||||
"id": 29480786,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29480786?v=4",
|
||||
"html_url": "https:\/\/github.com\/dothanthitiendiettiende"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dothanthitiendiettiende\/CVE-2019-3396",
|
||||
"description": "Confluence Widget Connector RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-09T03:26:06Z",
|
||||
"updated_at": "2019-04-09T11:34:37Z",
|
||||
"pushed_at": "2019-04-09T03:25:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180298650,
|
||||
"name": "CVE-2019-3396",
|
||||
|
@ -45,52 +22,6 @@
|
|||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180306648,
|
||||
"name": "CVE-2019-3396",
|
||||
"full_name": "shadowsock5\/CVE-2019-3396",
|
||||
"owner": {
|
||||
"login": "shadowsock5",
|
||||
"id": 30398606,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/30398606?v=4",
|
||||
"html_url": "https:\/\/github.com\/shadowsock5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shadowsock5\/CVE-2019-3396",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-09T07:09:32Z",
|
||||
"updated_at": "2019-09-02T09:24:29Z",
|
||||
"pushed_at": "2019-04-09T11:06:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180483984,
|
||||
"name": "CVE-2019-3396_EXP",
|
||||
"full_name": "Yt1g3r\/CVE-2019-3396_EXP",
|
||||
"owner": {
|
||||
"login": "Yt1g3r",
|
||||
"id": 12625147,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12625147?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yt1g3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2019-3396_EXP",
|
||||
"description": "CVE-2019-3396 confluence SSTI RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T02:15:47Z",
|
||||
"updated_at": "2020-02-28T11:11:56Z",
|
||||
"pushed_at": "2019-04-12T01:46:33Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 141,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180484942,
|
||||
"name": "CVE-2019-3396",
|
||||
|
@ -114,29 +45,6 @@
|
|||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180485239,
|
||||
"name": "CVE-2019-3396",
|
||||
"full_name": "pyn3rd\/CVE-2019-3396",
|
||||
"owner": {
|
||||
"login": "pyn3rd",
|
||||
"id": 41412951,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41412951?v=4",
|
||||
"html_url": "https:\/\/github.com\/pyn3rd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2019-3396",
|
||||
"description": "Confluence Widget Connector RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T02:24:29Z",
|
||||
"updated_at": "2019-11-29T06:43:00Z",
|
||||
"pushed_at": "2019-04-10T02:26:45Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180528467,
|
||||
"name": "CVE-2019-3396",
|
||||
|
@ -160,52 +68,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180627265,
|
||||
"name": "CVE-2019-3396",
|
||||
"full_name": "quanpt103\/CVE-2019-3396",
|
||||
"owner": {
|
||||
"login": "quanpt103",
|
||||
"id": 45188297,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/45188297?v=4",
|
||||
"html_url": "https:\/\/github.com\/quanpt103"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/quanpt103\/CVE-2019-3396",
|
||||
"description": "Confluence Widget Connector RCE - ptquan",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T17:05:10Z",
|
||||
"updated_at": "2019-04-10T17:06:24Z",
|
||||
"pushed_at": "2019-04-10T17:06:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 183862751,
|
||||
"name": "confluence_CVE-2019-3396",
|
||||
"full_name": "vntest11\/confluence_CVE-2019-3396",
|
||||
"owner": {
|
||||
"login": "vntest11",
|
||||
"id": 46453327,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46453327?v=4",
|
||||
"html_url": "https:\/\/github.com\/vntest11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vntest11\/confluence_CVE-2019-3396",
|
||||
"description": " Confluence Widget Connector path traversal (CVE-2019-3396)",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-28T05:59:21Z",
|
||||
"updated_at": "2019-04-28T06:40:38Z",
|
||||
"pushed_at": "2019-04-28T06:40:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 194643451,
|
||||
"name": "test1",
|
||||
|
|
|
@ -1,73 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 175966226,
|
||||
"name": "CVE-2019-5418",
|
||||
"full_name": "mpgn\/CVE-2019-5418",
|
||||
"owner": {
|
||||
"login": "mpgn",
|
||||
"id": 5891788,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
|
||||
"html_url": "https:\/\/github.com\/mpgn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-5418",
|
||||
"description": "CVE-2019-5418 - File Content Disclosure on Ruby on Rails",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-16T11:58:18Z",
|
||||
"updated_at": "2020-01-30T08:52:35Z",
|
||||
"pushed_at": "2019-03-25T07:19:58Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 176323109,
|
||||
"name": "CVE-2019-5418",
|
||||
"full_name": "omarkurt\/CVE-2019-5418",
|
||||
"owner": {
|
||||
"login": "omarkurt",
|
||||
"id": 1712468,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1712468?v=4",
|
||||
"html_url": "https:\/\/github.com\/omarkurt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/omarkurt\/CVE-2019-5418",
|
||||
"description": "File Content Disclosure on Rails Test Case - CVE-2019-5418",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-18T16:09:13Z",
|
||||
"updated_at": "2019-08-26T16:40:57Z",
|
||||
"pushed_at": "2019-03-18T16:15:25Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 176545257,
|
||||
"name": "CVE-2019-5418-Scanner",
|
||||
"full_name": "brompwnie\/CVE-2019-5418-Scanner",
|
||||
"owner": {
|
||||
"login": "brompwnie",
|
||||
"id": 8638589,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8638589?v=4",
|
||||
"html_url": "https:\/\/github.com\/brompwnie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brompwnie\/CVE-2019-5418-Scanner",
|
||||
"description": "A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-19T15:38:01Z",
|
||||
"updated_at": "2020-01-11T19:10:23Z",
|
||||
"pushed_at": "2019-03-21T17:26:06Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 177236589,
|
||||
"name": "Rails-doubletap-RCE",
|
||||
|
@ -91,52 +22,6 @@
|
|||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 178527770,
|
||||
"name": "CVE-2019-5418",
|
||||
"full_name": "takeokunn\/CVE-2019-5418",
|
||||
"owner": {
|
||||
"login": "takeokunn",
|
||||
"id": 11222510,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11222510?v=4",
|
||||
"html_url": "https:\/\/github.com\/takeokunn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/takeokunn\/CVE-2019-5418",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-03-30T07:40:11Z",
|
||||
"updated_at": "2019-10-24T19:07:56Z",
|
||||
"pushed_at": "2019-03-30T07:54:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 178909066,
|
||||
"name": "RailroadBandit",
|
||||
"full_name": "Bad3r\/RailroadBandit",
|
||||
"owner": {
|
||||
"login": "Bad3r",
|
||||
"id": 25513724,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25513724?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bad3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bad3r\/RailroadBandit",
|
||||
"description": "a demo for Ruby on Rails CVE-2019-5418",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-01T17:02:57Z",
|
||||
"updated_at": "2019-04-11T22:45:53Z",
|
||||
"pushed_at": "2019-04-11T22:45:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 212888337,
|
||||
"name": "CVE-2019-5418-Rails3",
|
||||
|
|
|
@ -1,188 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 170398859,
|
||||
"name": "cve-2019-5736-poc",
|
||||
"full_name": "q3k\/cve-2019-5736-poc",
|
||||
"owner": {
|
||||
"login": "q3k",
|
||||
"id": 315234,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/315234?v=4",
|
||||
"html_url": "https:\/\/github.com\/q3k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/q3k\/cve-2019-5736-poc",
|
||||
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T22:07:47Z",
|
||||
"updated_at": "2020-02-26T07:57:38Z",
|
||||
"pushed_at": "2019-02-20T15:35:34Z",
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170445833,
|
||||
"name": "CVE-2019-5736-PoC",
|
||||
"full_name": "Frichetten\/CVE-2019-5736-PoC",
|
||||
"owner": {
|
||||
"login": "Frichetten",
|
||||
"id": 10386884,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10386884?v=4",
|
||||
"html_url": "https:\/\/github.com\/Frichetten"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC",
|
||||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2020-02-26T07:57:41Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 378,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170613828,
|
||||
"name": "CVE-2019-5736",
|
||||
"full_name": "jas502n\/CVE-2019-5736",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-5736",
|
||||
"description": "runc容器逃逸漏洞预警",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-14T02:30:12Z",
|
||||
"updated_at": "2020-02-03T01:45:33Z",
|
||||
"pushed_at": "2019-02-14T02:40:55Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170656576,
|
||||
"name": "CVE-2019-5736",
|
||||
"full_name": "denmilu\/CVE-2019-5736",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-14T08:37:25Z",
|
||||
"updated_at": "2019-02-14T08:37:36Z",
|
||||
"pushed_at": "2019-02-14T08:37:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170656601,
|
||||
"name": "cve-2019-5736-poc",
|
||||
"full_name": "denmilu\/cve-2019-5736-poc",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/cve-2019-5736-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-14T08:37:39Z",
|
||||
"updated_at": "2019-02-14T08:37:49Z",
|
||||
"pushed_at": "2019-02-14T08:37:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170836971,
|
||||
"name": "cve-2019-5736-poc",
|
||||
"full_name": "agppp\/cve-2019-5736-poc",
|
||||
"owner": {
|
||||
"login": "agppp",
|
||||
"id": 10527860,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10527860?v=4",
|
||||
"html_url": "https:\/\/github.com\/agppp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/agppp\/cve-2019-5736-poc",
|
||||
"description": "getshell test",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T09:22:27Z",
|
||||
"updated_at": "2019-02-15T09:49:47Z",
|
||||
"pushed_at": "2019-02-15T09:49:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 171378829,
|
||||
"name": "cve-2019-5736",
|
||||
"full_name": "Matthew-Stacks\/cve-2019-5736",
|
||||
"owner": {
|
||||
"login": "Matthew-Stacks",
|
||||
"id": 36444487,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/36444487?v=4",
|
||||
"html_url": "https:\/\/github.com\/Matthew-Stacks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Matthew-Stacks\/cve-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-19T00:48:35Z",
|
||||
"updated_at": "2020-01-24T04:09:35Z",
|
||||
"pushed_at": "2019-02-24T21:35:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 171499608,
|
||||
"name": "poc-cve-2019-5736",
|
||||
"full_name": "ebdecastro\/poc-cve-2019-5736",
|
||||
"owner": {
|
||||
"login": "ebdecastro",
|
||||
"id": 46558799,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46558799?v=4",
|
||||
"html_url": "https:\/\/github.com\/ebdecastro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ebdecastro\/poc-cve-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-19T15:34:18Z",
|
||||
"updated_at": "2019-06-04T10:53:26Z",
|
||||
"pushed_at": "2019-02-19T15:37:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 171668415,
|
||||
"name": "RunC-CVE-2019-5736",
|
||||
|
@ -206,121 +22,6 @@
|
|||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172158413,
|
||||
"name": "CVE-2019-5736-PoC",
|
||||
"full_name": "k-onishi\/CVE-2019-5736-PoC",
|
||||
"owner": {
|
||||
"login": "k-onishi",
|
||||
"id": 41312202,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41312202?v=4",
|
||||
"html_url": "https:\/\/github.com\/k-onishi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k-onishi\/CVE-2019-5736-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T01:45:26Z",
|
||||
"updated_at": "2019-09-25T11:24:16Z",
|
||||
"pushed_at": "2019-02-23T13:20:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172198595,
|
||||
"name": "CVE-2019-5736-PoC-0",
|
||||
"full_name": "k-onishi\/CVE-2019-5736-PoC-0",
|
||||
"owner": {
|
||||
"login": "k-onishi",
|
||||
"id": 41312202,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41312202?v=4",
|
||||
"html_url": "https:\/\/github.com\/k-onishi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k-onishi\/CVE-2019-5736-PoC-0",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T09:59:21Z",
|
||||
"updated_at": "2019-02-23T09:59:53Z",
|
||||
"pushed_at": "2019-02-23T09:59:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 174545720,
|
||||
"name": "CVE-2019-5736-PoC",
|
||||
"full_name": "zyriuse75\/CVE-2019-5736-PoC",
|
||||
"owner": {
|
||||
"login": "zyriuse75",
|
||||
"id": 225690,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/225690?v=4",
|
||||
"html_url": "https:\/\/github.com\/zyriuse75"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zyriuse75\/CVE-2019-5736-PoC",
|
||||
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5736 poc of CVE-2019-5736 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-08T13:50:57Z",
|
||||
"updated_at": "2019-03-08T13:50:59Z",
|
||||
"pushed_at": "2019-03-08T13:50:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 177891884,
|
||||
"name": "CVE-2019-5736",
|
||||
"full_name": "stillan00b\/CVE-2019-5736",
|
||||
"owner": {
|
||||
"login": "stillan00b",
|
||||
"id": 48630837,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/48630837?v=4",
|
||||
"html_url": "https:\/\/github.com\/stillan00b"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stillan00b\/CVE-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-03-27T00:52:49Z",
|
||||
"updated_at": "2019-03-27T01:05:08Z",
|
||||
"pushed_at": "2019-03-27T01:05:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 181238407,
|
||||
"name": "cve-2019-5736-exp",
|
||||
"full_name": "milloni\/cve-2019-5736-exp",
|
||||
"owner": {
|
||||
"login": "milloni",
|
||||
"id": 2845035,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2845035?v=4",
|
||||
"html_url": "https:\/\/github.com\/milloni"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/milloni\/cve-2019-5736-exp",
|
||||
"description": "Exploit for CVE-2019-5736 runc vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-13T23:18:54Z",
|
||||
"updated_at": "2019-04-16T18:18:42Z",
|
||||
"pushed_at": "2019-04-14T21:39:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185733954,
|
||||
"name": "Docker-Runc-Exploit",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 168440280,
|
||||
"name": "OsirisJailbreak12",
|
||||
"full_name": "fatgrass\/OsirisJailbreak12",
|
||||
"owner": {
|
||||
"login": "fatgrass",
|
||||
"id": 19977419,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19977419?v=4",
|
||||
"html_url": "https:\/\/github.com\/fatgrass"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fatgrass\/OsirisJailbreak12",
|
||||
"description": "iOS 12.0 -> 12.1.2 Incomplete Osiris Jailbreak with CVE-2019-6225 by GeoSn0w (FCE365)",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-31T01:03:43Z",
|
||||
"updated_at": "2019-12-20T00:46:43Z",
|
||||
"pushed_at": "2019-01-31T00:53:03Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 194542840,
|
||||
"name": "CVE-2019-6225-macOS",
|
||||
|
@ -44,28 +21,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 201224192,
|
||||
"name": "jailbreak-iOS12",
|
||||
"full_name": "raystyle\/jailbreak-iOS12",
|
||||
"owner": {
|
||||
"login": "raystyle",
|
||||
"id": 3284570,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3284570?v=4",
|
||||
"html_url": "https:\/\/github.com\/raystyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/raystyle\/jailbreak-iOS12",
|
||||
"description": "OS 12.0 & 12.1.2 - Jailbreak with CVE-2019-6225",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-08T09:22:57Z",
|
||||
"updated_at": "2019-09-28T04:38:14Z",
|
||||
"pushed_at": "2019-02-27T12:57:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,142 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 172094613,
|
||||
"name": "Drupal-SA-CORE-2019-003",
|
||||
"full_name": "g0rx\/Drupal-SA-CORE-2019-003",
|
||||
"owner": {
|
||||
"login": "g0rx",
|
||||
"id": 10961397,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10961397?v=4",
|
||||
"html_url": "https:\/\/github.com\/g0rx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/g0rx\/Drupal-SA-CORE-2019-003",
|
||||
"description": "CVE-2019-6340-Drupal SA-CORE-2019-003",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T16:03:40Z",
|
||||
"updated_at": "2019-10-28T04:29:09Z",
|
||||
"pushed_at": "2019-02-24T18:43:05Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172217636,
|
||||
"name": "CVE-2019-6340",
|
||||
"full_name": "knqyf263\/CVE-2019-6340",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-6340",
|
||||
"description": "Environment for CVE-2019-6340 (Drupal)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T13:28:58Z",
|
||||
"updated_at": "2019-05-09T14:35:31Z",
|
||||
"pushed_at": "2019-02-23T17:34:19Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172429144,
|
||||
"name": "CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
|
||||
"full_name": "DevDungeon\/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
|
||||
"owner": {
|
||||
"login": "DevDungeon",
|
||||
"id": 16630634,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16630634?v=4",
|
||||
"html_url": "https:\/\/github.com\/DevDungeon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DevDungeon\/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass",
|
||||
"description": "CVE-2019-6340 Drupal 8.6.9 REST Auth Bypass examples",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-25T03:38:47Z",
|
||||
"updated_at": "2019-12-16T21:27:53Z",
|
||||
"pushed_at": "2019-02-25T03:47:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172458734,
|
||||
"name": "CVE-2019-6340",
|
||||
"full_name": "oways\/CVE-2019-6340",
|
||||
"owner": {
|
||||
"login": "oways",
|
||||
"id": 11142952,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11142952?v=4",
|
||||
"html_url": "https:\/\/github.com\/oways"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oways\/CVE-2019-6340",
|
||||
"description": "CVE-2019-6340 POC Drupal rce",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-25T07:47:16Z",
|
||||
"updated_at": "2019-10-14T09:41:16Z",
|
||||
"pushed_at": "2019-02-25T08:57:14Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172766416,
|
||||
"name": "cve-2019-6340",
|
||||
"full_name": "cved-sources\/cve-2019-6340",
|
||||
"owner": {
|
||||
"login": "cved-sources",
|
||||
"id": 46423677,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
||||
"html_url": "https:\/\/github.com\/cved-sources"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-6340",
|
||||
"description": "cve-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-26T18:26:50Z",
|
||||
"updated_at": "2019-02-26T18:39:01Z",
|
||||
"pushed_at": "2019-02-26T18:38:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 175109773,
|
||||
"name": "cve-2019-6340-bits",
|
||||
"full_name": "d1vious\/cve-2019-6340-bits",
|
||||
"owner": {
|
||||
"login": "d1vious",
|
||||
"id": 1476868,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1476868?v=4",
|
||||
"html_url": "https:\/\/github.com\/d1vious"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d1vious\/cve-2019-6340-bits",
|
||||
"description": "Bits generated while analyzing CVE-2019-6340 Drupal RESTful RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-12T01:13:56Z",
|
||||
"updated_at": "2019-04-15T07:13:03Z",
|
||||
"pushed_at": "2019-03-12T01:41:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188896047,
|
||||
"name": "CVE-2019-6340",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 171244957,
|
||||
"name": "cve-2019-6453-poc",
|
||||
"full_name": "proofofcalc\/cve-2019-6453-poc",
|
||||
"owner": {
|
||||
"login": "proofofcalc",
|
||||
"id": 47607270,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/47607270?v=4",
|
||||
"html_url": "https:\/\/github.com\/proofofcalc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/proofofcalc\/cve-2019-6453-poc",
|
||||
"description": "Proof of calc for CVE-2019-6453",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-18T08:35:03Z",
|
||||
"updated_at": "2019-11-26T20:08:24Z",
|
||||
"pushed_at": "2019-02-18T13:10:38Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 197653851,
|
||||
"name": "mIRC-CVE-2019-6453",
|
||||
|
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 179225702,
|
||||
"name": "CVE-2019-6690",
|
||||
"full_name": "brianwrf\/CVE-2019-6690",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2019-6690",
|
||||
"description": "It is a simple PoC of Improper Input Validation in python-gnupg 0.4.3 (CVE-2019-6690).",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-03T06:34:48Z",
|
||||
"updated_at": "2019-04-08T14:49:17Z",
|
||||
"pushed_at": "2019-04-03T07:57:14Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 172401532,
|
||||
"name": "CVE-2019-7238",
|
||||
"full_name": "mpgn\/CVE-2019-7238",
|
||||
"owner": {
|
||||
"login": "mpgn",
|
||||
"id": 5891788,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
|
||||
"html_url": "https:\/\/github.com\/mpgn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-7238",
|
||||
"description": "🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-24T23:09:43Z",
|
||||
"updated_at": "2020-02-27T19:13:57Z",
|
||||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 187840869,
|
||||
"name": "CVE-2019-7238",
|
||||
|
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 102,
|
||||
"watchers": 501,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170741210,
|
||||
"name": "CVE-2019-7304_DirtySock",
|
||||
"full_name": "SecuritySi\/CVE-2019-7304_DirtySock",
|
||||
"owner": {
|
||||
"login": "SecuritySi",
|
||||
"id": 7517443,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7517443?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecuritySi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecuritySi\/CVE-2019-7304_DirtySock",
|
||||
"description": "Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-14T18:48:56Z",
|
||||
"updated_at": "2019-03-05T06:03:09Z",
|
||||
"pushed_at": "2019-02-14T18:49:32Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-8446.json
Normal file
25
2019/CVE-2019-8446.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 243904138,
|
||||
"name": "CVE-2019-8446",
|
||||
"full_name": "CyberTrashPanda\/CVE-2019-8446",
|
||||
"owner": {
|
||||
"login": "CyberTrashPanda",
|
||||
"id": 30182616,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/30182616?v=4",
|
||||
"html_url": "https:\/\/github.com\/CyberTrashPanda"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CyberTrashPanda\/CVE-2019-8446",
|
||||
"description": "A small python script that checks for CVE-2019-8446",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-29T04:29:02Z",
|
||||
"updated_at": "2020-02-29T04:30:08Z",
|
||||
"pushed_at": "2020-02-29T04:30:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 181409411,
|
||||
"name": "cve-2019-9787_csrf_poc",
|
||||
"full_name": "rkatogit\/cve-2019-9787_csrf_poc",
|
||||
"owner": {
|
||||
"login": "rkatogit",
|
||||
"id": 40052696,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40052696?v=4",
|
||||
"html_url": "https:\/\/github.com\/rkatogit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rkatogit\/cve-2019-9787_csrf_poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-15T03:59:44Z",
|
||||
"updated_at": "2019-07-09T11:39:30Z",
|
||||
"pushed_at": "2019-04-15T04:13:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 202961104,
|
||||
"name": "CodePath_Week_7-8",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 177500802,
|
||||
"name": "CVE-2019-9810-PoC",
|
||||
"full_name": "xuechiyaobai\/CVE-2019-9810-PoC",
|
||||
"owner": {
|
||||
"login": "xuechiyaobai",
|
||||
"id": 8443947,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8443947?v=4",
|
||||
"html_url": "https:\/\/github.com\/xuechiyaobai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xuechiyaobai\/CVE-2019-9810-PoC",
|
||||
"description": "Array.prototype.slice wrong alias information.",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-25T02:33:18Z",
|
||||
"updated_at": "2020-02-16T05:56:49Z",
|
||||
"pushed_at": "2019-03-25T02:41:43Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185060837,
|
||||
"name": "CVE-2019-9810",
|
||||
|
|
|
@ -22,29 +22,6 @@
|
|||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 184705705,
|
||||
"name": "CVE-2019-9978",
|
||||
"full_name": "hash3liZer\/CVE-2019-9978",
|
||||
"owner": {
|
||||
"login": "hash3liZer",
|
||||
"id": 29171692,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29171692?v=4",
|
||||
"html_url": "https:\/\/github.com\/hash3liZer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hash3liZer\/CVE-2019-9978",
|
||||
"description": "CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-03T05:57:44Z",
|
||||
"updated_at": "2019-11-27T01:21:19Z",
|
||||
"pushed_at": "2019-05-03T06:18:03Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185125359,
|
||||
"name": "CVE-2019-9978",
|
||||
|
@ -67,28 +44,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185264593,
|
||||
"name": "cve-2019-9978",
|
||||
"full_name": "cved-sources\/cve-2019-9978",
|
||||
"owner": {
|
||||
"login": "cved-sources",
|
||||
"id": 46423677,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
||||
"html_url": "https:\/\/github.com\/cved-sources"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-9978",
|
||||
"description": "cve-2019-9978",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-06T20:11:20Z",
|
||||
"updated_at": "2019-05-06T20:11:46Z",
|
||||
"pushed_at": "2019-05-06T20:11:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -703,8 +703,8 @@
|
|||
"description": "Materials for the second Rijeka secuity meetup. We will be discussing Microsoft cryptoapi vulnerability dubbed CurveBall (CVE-2020-0601)",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-26T19:59:25Z",
|
||||
"updated_at": "2020-02-28T22:01:03Z",
|
||||
"pushed_at": "2020-02-28T22:01:01Z",
|
||||
"updated_at": "2020-02-29T08:30:08Z",
|
||||
"pushed_at": "2020-02-29T08:30:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2020-02-28T12:22:14Z",
|
||||
"updated_at": "2020-02-29T07:11:54Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-25T23:44:16Z",
|
||||
"updated_at": "2020-02-29T02:35:26Z",
|
||||
"updated_at": "2020-02-29T06:51:26Z",
|
||||
"pushed_at": "2020-02-26T00:58:39Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-0688 - Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-26T12:28:11Z",
|
||||
"updated_at": "2020-02-28T17:35:44Z",
|
||||
"updated_at": "2020-02-29T06:52:15Z",
|
||||
"pushed_at": "2020-02-27T03:50:07Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-02-29T03:07:11Z",
|
||||
"updated_at": "2020-02-29T07:10:30Z",
|
||||
"pushed_at": "2020-02-27T02:54:58Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 97,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T13:53:46Z",
|
||||
"updated_at": "2020-02-28T23:25:32Z",
|
||||
"updated_at": "2020-02-29T06:52:30Z",
|
||||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 24,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T17:03:53Z",
|
||||
"updated_at": "2020-02-29T01:21:20Z",
|
||||
"updated_at": "2020-02-29T06:53:07Z",
|
||||
"pushed_at": "2020-02-28T17:07:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-02-29T00:32:58Z",
|
||||
"updated_at": "2020-02-29T04:33:24Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T17:00:02Z",
|
||||
"updated_at": "2020-02-29T01:25:39Z",
|
||||
"updated_at": "2020-02-29T06:54:09Z",
|
||||
"pushed_at": "2020-02-20T17:01:53Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T17:57:54Z",
|
||||
"updated_at": "2020-02-29T01:25:08Z",
|
||||
"updated_at": "2020-02-29T07:15:50Z",
|
||||
"pushed_at": "2020-02-23T17:06:06Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 28,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2020-1938漏洞复现",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T02:36:37Z",
|
||||
"updated_at": "2020-02-29T00:40:14Z",
|
||||
"updated_at": "2020-02-29T08:26:42Z",
|
||||
"pushed_at": "2020-02-21T02:49:57Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read\/execute file,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2020-02-29T00:22:25Z",
|
||||
"updated_at": "2020-02-29T07:06:24Z",
|
||||
"pushed_at": "2020-02-26T02:58:10Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -33,10 +33,10 @@
|
|||
"html_url": "https:\/\/github.com\/hktalent"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hktalent\/CVE-2020-2551",
|
||||
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, 欢迎加入【劦久信安】, online check:",
|
||||
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-02-28T06:24:19Z",
|
||||
"updated_at": "2020-02-29T04:56:49Z",
|
||||
"pushed_at": "2020-02-28T03:15:41Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-24T02:36:46Z",
|
||||
"updated_at": "2020-02-25T14:48:39Z",
|
||||
"updated_at": "2020-02-29T06:06:06Z",
|
||||
"pushed_at": "2020-02-25T03:51:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-02-29T03:06:20Z",
|
||||
"updated_at": "2020-02-29T08:19:30Z",
|
||||
"pushed_at": "2020-02-28T09:34:19Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T05:35:01Z",
|
||||
"updated_at": "2020-02-28T03:03:11Z",
|
||||
"updated_at": "2020-02-29T08:26:34Z",
|
||||
"pushed_at": "2020-01-22T04:58:59Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-8840",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-24T14:32:24Z",
|
||||
"updated_at": "2020-02-28T13:11:42Z",
|
||||
"updated_at": "2020-02-29T08:21:37Z",
|
||||
"pushed_at": "2020-02-28T09:12:59Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T01:27:08Z",
|
||||
"updated_at": "2020-02-28T23:44:55Z",
|
||||
"updated_at": "2020-02-29T08:33:28Z",
|
||||
"pushed_at": "2020-02-28T02:22:03Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
67
README.md
67
README.md
|
@ -380,7 +380,6 @@ Insufficient validation of environment variables in the telnet client supplied i
|
|||
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.
|
||||
</code>
|
||||
|
||||
- [mpgn/CVE-2019-0192](https://github.com/mpgn/CVE-2019-0192)
|
||||
- [Rapidsafeguard/Solr-RCE-CVE-2019-0192](https://github.com/Rapidsafeguard/Solr-RCE-CVE-2019-0192)
|
||||
|
||||
### CVE-2019-0193
|
||||
|
@ -389,7 +388,6 @@ In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows
|
|||
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
|
||||
</code>
|
||||
|
||||
- [xConsoIe/CVE-2019-0193](https://github.com/xConsoIe/CVE-2019-0193)
|
||||
- [jas502n/CVE-2019-0193](https://github.com/jas502n/CVE-2019-0193)
|
||||
- [1135/solr_exploit](https://github.com/1135/solr_exploit)
|
||||
- [jaychouzzk/CVE-2019-0193-exp](https://github.com/jaychouzzk/CVE-2019-0193-exp)
|
||||
|
@ -417,7 +415,6 @@ When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in
|
|||
</code>
|
||||
|
||||
- [pyn3rd/CVE-2019-0232](https://github.com/pyn3rd/CVE-2019-0232)
|
||||
- [jas502n/CVE-2019-0232](https://github.com/jas502n/CVE-2019-0232)
|
||||
- [CherishHair/CVE-2019-0232-EXP](https://github.com/CherishHair/CVE-2019-0232-EXP)
|
||||
- [setrus/CVE-2019-0232](https://github.com/setrus/CVE-2019-0232)
|
||||
|
||||
|
@ -435,8 +432,6 @@ A remote code execution vulnerability exists in the way that the Chakra scriptin
|
|||
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594.
|
||||
</code>
|
||||
|
||||
- [linhlhq/CVE-2019-0604](https://github.com/linhlhq/CVE-2019-0604)
|
||||
- [denmilu/CVE-2019-0604_sharepoint_CVE](https://github.com/denmilu/CVE-2019-0604_sharepoint_CVE)
|
||||
- [k8gege/CVE-2019-0604](https://github.com/k8gege/CVE-2019-0604)
|
||||
- [m5050/CVE-2019-0604](https://github.com/m5050/CVE-2019-0604)
|
||||
- [boxhg/CVE-2019-0604](https://github.com/boxhg/CVE-2019-0604)
|
||||
|
@ -606,8 +601,6 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
|||
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797.
|
||||
</code>
|
||||
|
||||
- [ze0r/cve-2019-0808-poc](https://github.com/ze0r/cve-2019-0808-poc)
|
||||
- [rakesh143/CVE-2019-0808](https://github.com/rakesh143/CVE-2019-0808)
|
||||
- [exodusintel/CVE-2019-0808](https://github.com/exodusintel/CVE-2019-0808)
|
||||
|
||||
### CVE-2019-0841
|
||||
|
@ -616,8 +609,6 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
|||
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836.
|
||||
</code>
|
||||
|
||||
- [rogue-kdc/CVE-2019-0841](https://github.com/rogue-kdc/CVE-2019-0841)
|
||||
- [denmilu/CVE-2019-0841](https://github.com/denmilu/CVE-2019-0841)
|
||||
- [0x00-0x00/CVE-2019-0841-BYPASS](https://github.com/0x00-0x00/CVE-2019-0841-BYPASS)
|
||||
|
||||
### CVE-2019-0859
|
||||
|
@ -667,9 +658,6 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
|
|||
</code>
|
||||
|
||||
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
|
||||
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
|
||||
- [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
|
||||
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
|
||||
|
||||
### CVE-2019-10086
|
||||
|
||||
|
@ -2517,8 +2505,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N).
|
||||
</code>
|
||||
|
||||
- [pyn3rd/CVE-2019-2618](https://github.com/pyn3rd/CVE-2019-2618)
|
||||
- [jas502n/cve-2019-2618](https://github.com/jas502n/cve-2019-2618)
|
||||
- [wsfengfan/CVE-2019-2618-](https://github.com/wsfengfan/CVE-2019-2618-)
|
||||
- [dr0op/WeblogicScan](https://github.com/dr0op/WeblogicScan)
|
||||
- [he1dan/cve-2019-2618](https://github.com/he1dan/cve-2019-2618)
|
||||
|
@ -2532,11 +2518,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
</code>
|
||||
|
||||
- [shack2/javaserializetools](https://github.com/shack2/javaserializetools)
|
||||
- [SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961](https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961)
|
||||
- [iceMatcha/CNTA-2019-0014xCVE-2019-2725](https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725)
|
||||
- [lasensio/cve-2019-2725](https://github.com/lasensio/cve-2019-2725)
|
||||
- [davidmthomsen/CVE-2019-2725](https://github.com/davidmthomsen/CVE-2019-2725)
|
||||
- [leerina/CVE-2019-2725](https://github.com/leerina/CVE-2019-2725)
|
||||
- [zhusx110/cve-2019-2725](https://github.com/zhusx110/cve-2019-2725)
|
||||
- [lufeirider/CVE-2019-2725](https://github.com/lufeirider/CVE-2019-2725)
|
||||
- [CVCLabs/cve-2019-2725](https://github.com/CVCLabs/cve-2019-2725)
|
||||
|
@ -2594,15 +2576,9 @@ There was a local file disclosure vulnerability in Confluence Server and Conflue
|
|||
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
|
||||
</code>
|
||||
|
||||
- [dothanthitiendiettiende/CVE-2019-3396](https://github.com/dothanthitiendiettiende/CVE-2019-3396)
|
||||
- [x-f1v3/CVE-2019-3396](https://github.com/x-f1v3/CVE-2019-3396)
|
||||
- [shadowsock5/CVE-2019-3396](https://github.com/shadowsock5/CVE-2019-3396)
|
||||
- [Yt1g3r/CVE-2019-3396_EXP](https://github.com/Yt1g3r/CVE-2019-3396_EXP)
|
||||
- [jas502n/CVE-2019-3396](https://github.com/jas502n/CVE-2019-3396)
|
||||
- [pyn3rd/CVE-2019-3396](https://github.com/pyn3rd/CVE-2019-3396)
|
||||
- [7e1/CVE-2019-3396](https://github.com/7e1/CVE-2019-3396)
|
||||
- [quanpt103/CVE-2019-3396](https://github.com/quanpt103/CVE-2019-3396)
|
||||
- [vntest11/confluence_CVE-2019-3396](https://github.com/vntest11/confluence_CVE-2019-3396)
|
||||
- [tanw923/test1](https://github.com/tanw923/test1)
|
||||
- [skommando/CVE-2019-3396-confluence-poc](https://github.com/skommando/CVE-2019-3396-confluence-poc)
|
||||
- [JonathanZhou348/CVE-2019-3396TEST](https://github.com/JonathanZhou348/CVE-2019-3396TEST)
|
||||
|
@ -2699,12 +2675,7 @@ An exploitable code execution vulnerability exists in the processing of multi-pa
|
|||
There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
|
||||
</code>
|
||||
|
||||
- [mpgn/CVE-2019-5418](https://github.com/mpgn/CVE-2019-5418)
|
||||
- [omarkurt/CVE-2019-5418](https://github.com/omarkurt/CVE-2019-5418)
|
||||
- [brompwnie/CVE-2019-5418-Scanner](https://github.com/brompwnie/CVE-2019-5418-Scanner)
|
||||
- [mpgn/Rails-doubletap-RCE](https://github.com/mpgn/Rails-doubletap-RCE)
|
||||
- [takeokunn/CVE-2019-5418](https://github.com/takeokunn/CVE-2019-5418)
|
||||
- [Bad3r/RailroadBandit](https://github.com/Bad3r/RailroadBandit)
|
||||
- [ztgrace/CVE-2019-5418-Rails3](https://github.com/ztgrace/CVE-2019-5418-Rails3)
|
||||
- [random-robbie/CVE-2019-5418](https://github.com/random-robbie/CVE-2019-5418)
|
||||
|
||||
|
@ -2763,20 +2734,7 @@ NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vu
|
|||
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
|
||||
</code>
|
||||
|
||||
- [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc)
|
||||
- [Frichetten/CVE-2019-5736-PoC](https://github.com/Frichetten/CVE-2019-5736-PoC)
|
||||
- [jas502n/CVE-2019-5736](https://github.com/jas502n/CVE-2019-5736)
|
||||
- [denmilu/CVE-2019-5736](https://github.com/denmilu/CVE-2019-5736)
|
||||
- [denmilu/cve-2019-5736-poc](https://github.com/denmilu/cve-2019-5736-poc)
|
||||
- [agppp/cve-2019-5736-poc](https://github.com/agppp/cve-2019-5736-poc)
|
||||
- [Matthew-Stacks/cve-2019-5736](https://github.com/Matthew-Stacks/cve-2019-5736)
|
||||
- [ebdecastro/poc-cve-2019-5736](https://github.com/ebdecastro/poc-cve-2019-5736)
|
||||
- [twistlock/RunC-CVE-2019-5736](https://github.com/twistlock/RunC-CVE-2019-5736)
|
||||
- [k-onishi/CVE-2019-5736-PoC](https://github.com/k-onishi/CVE-2019-5736-PoC)
|
||||
- [k-onishi/CVE-2019-5736-PoC-0](https://github.com/k-onishi/CVE-2019-5736-PoC-0)
|
||||
- [zyriuse75/CVE-2019-5736-PoC](https://github.com/zyriuse75/CVE-2019-5736-PoC)
|
||||
- [stillan00b/CVE-2019-5736](https://github.com/stillan00b/CVE-2019-5736)
|
||||
- [milloni/cve-2019-5736-exp](https://github.com/milloni/cve-2019-5736-exp)
|
||||
- [13paulmurith/Docker-Runc-Exploit](https://github.com/13paulmurith/Docker-Runc-Exploit)
|
||||
- [RyanNgWH/CVE-2019-5736-POC](https://github.com/RyanNgWH/CVE-2019-5736-POC)
|
||||
- [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study)
|
||||
|
@ -2826,9 +2784,7 @@ An out-of-bounds read issue existed that led to the disclosure of kernel memory.
|
|||
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges.
|
||||
</code>
|
||||
|
||||
- [fatgrass/OsirisJailbreak12](https://github.com/fatgrass/OsirisJailbreak12)
|
||||
- [TrungNguyen1909/CVE-2019-6225-macOS](https://github.com/TrungNguyen1909/CVE-2019-6225-macOS)
|
||||
- [raystyle/jailbreak-iOS12](https://github.com/raystyle/jailbreak-iOS12)
|
||||
|
||||
### CVE-2019-6249
|
||||
|
||||
|
@ -2868,12 +2824,6 @@ HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege a
|
|||
Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)
|
||||
</code>
|
||||
|
||||
- [g0rx/Drupal-SA-CORE-2019-003](https://github.com/g0rx/Drupal-SA-CORE-2019-003)
|
||||
- [knqyf263/CVE-2019-6340](https://github.com/knqyf263/CVE-2019-6340)
|
||||
- [DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass](https://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass)
|
||||
- [oways/CVE-2019-6340](https://github.com/oways/CVE-2019-6340)
|
||||
- [cved-sources/cve-2019-6340](https://github.com/cved-sources/cve-2019-6340)
|
||||
- [d1vious/cve-2019-6340-bits](https://github.com/d1vious/cve-2019-6340-bits)
|
||||
- [jas502n/CVE-2019-6340](https://github.com/jas502n/CVE-2019-6340)
|
||||
|
||||
### CVE-2019-6440
|
||||
|
@ -2906,7 +2856,6 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
|
|||
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
|
||||
</code>
|
||||
|
||||
- [proofofcalc/cve-2019-6453-poc](https://github.com/proofofcalc/cve-2019-6453-poc)
|
||||
- [andripwn/mIRC-CVE-2019-6453](https://github.com/andripwn/mIRC-CVE-2019-6453)
|
||||
|
||||
### CVE-2019-6467
|
||||
|
@ -2932,7 +2881,6 @@ python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt
|
|||
</code>
|
||||
|
||||
- [stigtsp/CVE-2019-6690-python-gnupg-vulnerability](https://github.com/stigtsp/CVE-2019-6690-python-gnupg-vulnerability)
|
||||
- [brianwrf/CVE-2019-6690](https://github.com/brianwrf/CVE-2019-6690)
|
||||
|
||||
### CVE-2019-6715
|
||||
|
||||
|
@ -2964,7 +2912,6 @@ Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0
|
|||
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
|
||||
</code>
|
||||
|
||||
- [mpgn/CVE-2019-7238](https://github.com/mpgn/CVE-2019-7238)
|
||||
- [jas502n/CVE-2019-7238](https://github.com/jas502n/CVE-2019-7238)
|
||||
- [verctor/nexus_rce_CVE-2019-7238](https://github.com/verctor/nexus_rce_CVE-2019-7238)
|
||||
- [magicming200/CVE-2019-7238_Nexus_RCE_Tool](https://github.com/magicming200/CVE-2019-7238_Nexus_RCE_Tool)
|
||||
|
@ -2976,7 +2923,6 @@ Canonical snapd before version 2.37.1 incorrectly performed socket owner validat
|
|||
</code>
|
||||
|
||||
- [initstring/dirty_sock](https://github.com/initstring/dirty_sock)
|
||||
- [SecuritySi/CVE-2019-7304_DirtySock](https://github.com/SecuritySi/CVE-2019-7304_DirtySock)
|
||||
|
||||
### CVE-2019-7482
|
||||
|
||||
|
@ -3030,6 +2976,14 @@ A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicl
|
|||
|
||||
- [shawarkhanethicalhacker/CVE-2019-8389](https://github.com/shawarkhanethicalhacker/CVE-2019-8389)
|
||||
|
||||
### CVE-2019-8446
|
||||
|
||||
<code>
|
||||
The /rest/issueNav/1/issueTable resource in Jira before version 8.3.2 allows remote attackers to enumerate usernames via an incorrect authorisation check.
|
||||
</code>
|
||||
|
||||
- [CyberTrashPanda/CVE-2019-8446](https://github.com/CyberTrashPanda/CVE-2019-8446)
|
||||
|
||||
### CVE-2019-8449
|
||||
|
||||
<code>
|
||||
|
@ -3287,7 +3241,6 @@ Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, a
|
|||
WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.
|
||||
</code>
|
||||
|
||||
- [rkatogit/cve-2019-9787_csrf_poc](https://github.com/rkatogit/cve-2019-9787_csrf_poc)
|
||||
- [PalmTreeForest/CodePath_Week_7-8](https://github.com/PalmTreeForest/CodePath_Week_7-8)
|
||||
|
||||
### CVE-2019-9810
|
||||
|
@ -3296,7 +3249,6 @@ WordPress before 5.1.1 does not properly filter comment content, leading to Remo
|
|||
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
|
||||
</code>
|
||||
|
||||
- [xuechiyaobai/CVE-2019-9810-PoC](https://github.com/xuechiyaobai/CVE-2019-9810-PoC)
|
||||
- [0vercl0k/CVE-2019-9810](https://github.com/0vercl0k/CVE-2019-9810)
|
||||
|
||||
### CVE-2019-9896
|
||||
|
@ -3314,9 +3266,7 @@ The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-a
|
|||
</code>
|
||||
|
||||
- [mpgn/CVE-2019-9978](https://github.com/mpgn/CVE-2019-9978)
|
||||
- [hash3liZer/CVE-2019-9978](https://github.com/hash3liZer/CVE-2019-9978)
|
||||
- [KTN1990/CVE-2019-9978](https://github.com/KTN1990/CVE-2019-9978)
|
||||
- [cved-sources/cve-2019-9978](https://github.com/cved-sources/cve-2019-9978)
|
||||
|
||||
|
||||
## 2018
|
||||
|
@ -11766,7 +11716,6 @@ sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is en
|
|||
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
|
||||
</code>
|
||||
|
||||
- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn)
|
||||
- [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn)
|
||||
|
||||
### CVE-2010-1205
|
||||
|
|
Loading…
Reference in a new issue