mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/04/28 12:11:13
This commit is contained in:
parent
03ab8d72b1
commit
4891010b93
23 changed files with 90 additions and 90 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"updated_at": "2021-04-28T03:09:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1009,
|
||||
"watchers_count": 1009,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1009,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-31T07:39:37Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-22T05:31:13Z",
|
||||
"updated_at": "2021-02-06T02:19:41Z",
|
||||
"updated_at": "2021-04-27T22:35:44Z",
|
||||
"pushed_at": "2018-02-25T08:49:07Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 86,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"updated_at": "2021-04-28T03:09:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1009,
|
||||
"watchers_count": 1009,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1009,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"updated_at": "2021-04-28T03:09:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1009,
|
||||
"watchers_count": 1009,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1009,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -473,8 +473,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-04-27T18:12:51Z",
|
||||
"pushed_at": "2021-04-27T18:12:49Z",
|
||||
"updated_at": "2021-04-28T02:13:45Z",
|
||||
"pushed_at": "2021-04-28T01:13:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2019-11-21T15:03:15Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2021-04-22T19:27:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2021-04-20T02:43:58Z",
|
||||
"updated_at": "2021-04-28T01:26:16Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2019-12836",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-16T04:41:29Z",
|
||||
"updated_at": "2021-04-26T01:07:42Z",
|
||||
"pushed_at": "2021-04-26T01:07:40Z",
|
||||
"updated_at": "2021-04-28T02:27:48Z",
|
||||
"pushed_at": "2021-04-28T02:27:46Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"updated_at": "2021-04-28T03:09:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1009,
|
||||
"watchers_count": 1009,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1009,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T15:31:13Z",
|
||||
"updated_at": "2021-04-25T15:27:50Z",
|
||||
"updated_at": "2021-04-28T02:18:01Z",
|
||||
"pushed_at": "2019-10-23T07:10:35Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-04-25T09:59:02Z",
|
||||
"updated_at": "2021-04-28T01:25:54Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1111,
|
||||
"watchers_count": 1111,
|
||||
"stargazers_count": 1112,
|
||||
"watchers_count": 1112,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1111,
|
||||
"watchers": 1112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-26T01:28:53Z",
|
||||
"updated_at": "2021-04-21T21:18:41Z",
|
||||
"updated_at": "2021-04-27T22:43:59Z",
|
||||
"pushed_at": "2020-07-26T01:36:14Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-27T08:07:39Z",
|
||||
"updated_at": "2021-04-28T02:08:22Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 682,
|
||||
"stargazers_count": 686,
|
||||
"watchers_count": 686,
|
||||
"forks_count": 197,
|
||||
"forks": 197,
|
||||
"watchers": 686,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"updated_at": "2021-04-28T03:09:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1009,
|
||||
"watchers_count": 1009,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1008,
|
||||
"watchers": 1009,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-23T19:07:18Z",
|
||||
"updated_at": "2021-03-22T09:25:59Z",
|
||||
"updated_at": "2021-04-28T02:29:00Z",
|
||||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2020-27199",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T03:10:34Z",
|
||||
"updated_at": "2021-04-26T01:02:54Z",
|
||||
"pushed_at": "2021-04-26T01:02:52Z",
|
||||
"updated_at": "2021-04-28T02:29:30Z",
|
||||
"pushed_at": "2021-04-28T02:29:28Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-04-27T11:08:00Z",
|
||||
"updated_at": "2021-04-28T02:28:32Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 283,
|
||||
"watchers": 284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-27T08:07:39Z",
|
||||
"updated_at": "2021-04-28T02:08:22Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 682,
|
||||
"stargazers_count": 686,
|
||||
"watchers_count": 686,
|
||||
"forks_count": 197,
|
||||
"forks": 197,
|
||||
"watchers": 686,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:22:07Z",
|
||||
"updated_at": "2021-04-13T18:22:51Z",
|
||||
"updated_at": "2021-04-28T01:21:21Z",
|
||||
"pushed_at": "2021-03-16T08:34:14Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Solr SSRF(CVE-2021-27905)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:27:21Z",
|
||||
"updated_at": "2021-04-27T13:38:30Z",
|
||||
"updated_at": "2021-04-28T02:18:37Z",
|
||||
"pushed_at": "2021-04-21T10:00:59Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-04-27T13:28:10Z",
|
||||
"updated_at": "2021-04-28T02:04:13Z",
|
||||
"pushed_at": "2021-03-30T14:44:38Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 285,
|
||||
"watchers": 286,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-04-27T20:24:11Z",
|
||||
"updated_at": "2021-04-28T01:23:14Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
Loading…
Reference in a new issue