mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/01/22 18:10:38
This commit is contained in:
parent
bfab2b1064
commit
4ac38a728c
23 changed files with 230 additions and 197 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-21T15:58:16Z",
|
||||
"updated_at": "2021-01-22T03:12:11Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 887,
|
||||
"watchers_count": 887,
|
||||
"stargazers_count": 888,
|
||||
"watchers_count": 888,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 887,
|
||||
"watchers": 888,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-21T15:58:16Z",
|
||||
"updated_at": "2021-01-22T03:12:11Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 887,
|
||||
"watchers_count": 887,
|
||||
"stargazers_count": 888,
|
||||
"watchers_count": 888,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 887,
|
||||
"watchers": 888,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-21T15:58:16Z",
|
||||
"updated_at": "2021-01-22T03:12:11Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 887,
|
||||
"watchers_count": 887,
|
||||
"stargazers_count": 888,
|
||||
"watchers_count": 888,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 887,
|
||||
"watchers": 888,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 297045515,
|
||||
"name": "cve-2018-1002101",
|
||||
"full_name": "se0g1\/cve-2018-1002101",
|
||||
"owner": {
|
||||
"login": "se0g1",
|
||||
"id": 31495924,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31495924?v=4",
|
||||
"html_url": "https:\/\/github.com\/se0g1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/se0g1\/cve-2018-1002101",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-20T09:48:06Z",
|
||||
"updated_at": "2020-09-22T12:29:56Z",
|
||||
"pushed_at": "2020-09-22T12:29:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-21T15:58:16Z",
|
||||
"updated_at": "2021-01-22T03:12:11Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 887,
|
||||
"watchers_count": 887,
|
||||
"stargazers_count": 888,
|
||||
"watchers_count": 888,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 887,
|
||||
"watchers": 888,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 445,
|
||||
"watchers_count": 445,
|
||||
"forks_count": 204,
|
||||
"forks": 204,
|
||||
"forks_count": 205,
|
||||
"forks": 205,
|
||||
"watchers": 445,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1439,13 +1439,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2021-01-20T17:54:00Z",
|
||||
"updated_at": "2021-01-22T04:33:34Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1057,
|
||||
"watchers_count": 1057,
|
||||
"stargazers_count": 1056,
|
||||
"watchers_count": 1056,
|
||||
"forks_count": 354,
|
||||
"forks": 354,
|
||||
"watchers": 1057,
|
||||
"watchers": 1056,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-21T14:09:59Z",
|
||||
"updated_at": "2021-01-22T06:39:48Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2284,
|
||||
"watchers_count": 2284,
|
||||
"forks_count": 641,
|
||||
"forks": 641,
|
||||
"watchers": 2284,
|
||||
"stargazers_count": 2285,
|
||||
"watchers_count": 2285,
|
||||
"forks_count": 642,
|
||||
"forks": 642,
|
||||
"watchers": 2285,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2021-01-21T00:40:18Z",
|
||||
"updated_at": "2021-01-22T08:22:13Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 706,
|
||||
"watchers_count": 706,
|
||||
"stargazers_count": 707,
|
||||
"watchers_count": 707,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 706,
|
||||
"watchers": 707,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-21T15:58:16Z",
|
||||
"updated_at": "2021-01-22T03:12:11Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 887,
|
||||
"watchers_count": 887,
|
||||
"stargazers_count": 888,
|
||||
"watchers_count": 888,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 887,
|
||||
"watchers": 888,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -45,29 +45,6 @@
|
|||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234191063,
|
||||
"name": "CurveBall",
|
||||
"full_name": "ollypwn\/CurveBall",
|
||||
"owner": {
|
||||
"login": "ollypwn",
|
||||
"id": 53348818,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
|
||||
"html_url": "https:\/\/github.com\/ollypwn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ollypwn\/CurveBall",
|
||||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2021-01-19T17:43:43Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 851,
|
||||
"watchers_count": 851,
|
||||
"forks_count": 221,
|
||||
"forks": 221,
|
||||
"watchers": 851,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234192123,
|
||||
"name": "chainoffools",
|
||||
|
@ -160,52 +137,6 @@
|
|||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234442281,
|
||||
"name": "cve-2020-0601-utils",
|
||||
"full_name": "0xxon\/cve-2020-0601-utils",
|
||||
"owner": {
|
||||
"login": "0xxon",
|
||||
"id": 1538460,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xxon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
|
||||
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T01:02:52Z",
|
||||
"updated_at": "2020-01-21T19:49:00Z",
|
||||
"pushed_at": "2020-01-21T19:48:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235145190,
|
||||
"name": "curveball",
|
||||
"full_name": "gentilkiwi\/curveball",
|
||||
"owner": {
|
||||
"login": "gentilkiwi",
|
||||
"id": 2307945,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2307945?v=4",
|
||||
"html_url": "https:\/\/github.com\/gentilkiwi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gentilkiwi\/curveball",
|
||||
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T16:24:20Z",
|
||||
"updated_at": "2021-01-09T15:45:54Z",
|
||||
"pushed_at": "2020-01-20T23:00:14Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235858699,
|
||||
"name": "CurveBall",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-0688 - Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-26T12:28:11Z",
|
||||
"updated_at": "2020-12-15T10:41:52Z",
|
||||
"updated_at": "2021-01-22T08:39:05Z",
|
||||
"pushed_at": "2020-02-27T03:50:07Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 50,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -910,13 +910,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-01-21T15:58:25Z",
|
||||
"updated_at": "2021-01-22T03:39:41Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1062,
|
||||
"watchers_count": 1062,
|
||||
"stargazers_count": 1063,
|
||||
"watchers_count": 1063,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1062,
|
||||
"watchers": 1063,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 331862557,
|
||||
"name": "CVE-2020-13937",
|
||||
"full_name": "Al1ex\/CVE-2020-13937",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-13937",
|
||||
"description": "Apache Kylin API Unauthorized Access",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T06:53:34Z",
|
||||
"updated_at": "2021-01-22T08:18:45Z",
|
||||
"pushed_at": "2021-01-22T07:00:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -335,13 +335,13 @@
|
|||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2021-01-21T06:52:07Z",
|
||||
"updated_at": "2021-01-22T06:50:16Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-21T14:09:59Z",
|
||||
"updated_at": "2021-01-22T06:39:48Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2284,
|
||||
"watchers_count": 2284,
|
||||
"forks_count": 641,
|
||||
"forks": 641,
|
||||
"watchers": 2284,
|
||||
"stargazers_count": 2285,
|
||||
"watchers_count": 2285,
|
||||
"forks_count": 642,
|
||||
"forks": 642,
|
||||
"watchers": 2285,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2021-01-22T02:52:28Z",
|
||||
"updated_at": "2021-01-22T08:56:13Z",
|
||||
"pushed_at": "2021-01-13T10:38:48Z",
|
||||
"stargazers_count": 788,
|
||||
"watchers_count": 788,
|
||||
"stargazers_count": 792,
|
||||
"watchers_count": 792,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"watchers": 788,
|
||||
"watchers": 792,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-12-07T21:03:39Z",
|
||||
"updated_at": "2021-01-22T06:53:25Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 214,
|
||||
"watchers": 215,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2021-01-19T15:05:58Z",
|
||||
"updated_at": "2021-01-22T07:34:31Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 166,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-26258.json
Normal file
25
2020/CVE-2020-26258.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 331887269,
|
||||
"name": "CVE-2020-26258",
|
||||
"full_name": "Al1ex\/CVE-2020-26258",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-26258",
|
||||
"description": "CVE-2020-26258 && XStream SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T08:44:24Z",
|
||||
"updated_at": "2021-01-22T08:45:00Z",
|
||||
"pushed_at": "2021-01-22T08:44:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2021-01-22T02:25:46Z",
|
||||
"updated_at": "2021-01-22T07:29:01Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 211,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T10:49:40Z",
|
||||
"updated_at": "2021-01-21T23:32:08Z",
|
||||
"updated_at": "2021-01-22T08:42:55Z",
|
||||
"pushed_at": "2021-01-15T16:25:19Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 26,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Detect vulns liferay CVE-2020-7961 by Nattroc (EOG Team)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-17T08:32:51Z",
|
||||
"updated_at": "2020-10-17T08:34:51Z",
|
||||
"updated_at": "2021-01-22T03:15:56Z",
|
||||
"pushed_at": "2020-10-17T08:34:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "POC-CVE-2020-7961-Token-iterate",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-08T08:22:18Z",
|
||||
"updated_at": "2020-12-24T16:52:06Z",
|
||||
"updated_at": "2021-01-22T03:15:54Z",
|
||||
"pushed_at": "2020-12-08T08:35:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
48
2021/CVE-2021-2109.json
Normal file
48
2021/CVE-2021-2109.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 331847444,
|
||||
"name": "CVE-2021-2109",
|
||||
"full_name": "Al1ex\/CVE-2021-2109",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-2109",
|
||||
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:37:11Z",
|
||||
"updated_at": "2021-01-22T08:52:53Z",
|
||||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 331873303,
|
||||
"name": "CVE-2021-2109",
|
||||
"full_name": "rabbitsafe\/CVE-2021-2109",
|
||||
"owner": {
|
||||
"login": "rabbitsafe",
|
||||
"id": 33046073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-2109",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T07:43:46Z",
|
||||
"updated_at": "2021-01-22T08:34:13Z",
|
||||
"pushed_at": "2021-01-22T08:34:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,36 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-01-22T00:14:39Z",
|
||||
"updated_at": "2021-01-22T03:18:07Z",
|
||||
"pushed_at": "2021-01-13T13:25:10Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 331843308,
|
||||
"name": "CVE-2021-3129",
|
||||
"full_name": "SNCKER\/CVE-2021-3129",
|
||||
"owner": {
|
||||
"login": "SNCKER",
|
||||
"id": 49559334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4",
|
||||
"html_url": "https:\/\/github.com\/SNCKER"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SNCKER\/CVE-2021-3129",
|
||||
"description": "laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-01-22T08:49:12Z",
|
||||
"pushed_at": "2021-01-22T05:43:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
README.md
30
README.md
|
@ -17,6 +17,15 @@ Microsoft Defender Remote Code Execution Vulnerability
|
|||
|
||||
- [dmlgzs/cve-2021-1647](https://github.com/dmlgzs/cve-2021-1647)
|
||||
|
||||
### CVE-2021-2109 (2021-01-20)
|
||||
|
||||
<code>
|
||||
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109)
|
||||
- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109)
|
||||
|
||||
### CVE-2021-3019 (2021-01-04)
|
||||
|
||||
<code>
|
||||
|
@ -34,6 +43,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
|||
</code>
|
||||
|
||||
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
|
||||
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
|
||||
|
||||
### CVE-2021-3130 (2021-01-20)
|
||||
|
||||
|
@ -179,13 +189,10 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
|
|||
|
||||
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
|
||||
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
|
||||
- [ollypwn/CurveBall](https://github.com/ollypwn/CurveBall)
|
||||
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
|
||||
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
|
||||
- [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601)
|
||||
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
|
||||
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
|
||||
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
|
||||
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
|
||||
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
|
||||
- [ioncodes/Curveball](https://github.com/ioncodes/Curveball)
|
||||
|
@ -2449,6 +2456,7 @@ Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.
|
|||
</code>
|
||||
|
||||
- [yaunsky/CVE-2020-13937](https://github.com/yaunsky/CVE-2020-13937)
|
||||
- [Al1ex/CVE-2020-13937](https://github.com/Al1ex/CVE-2020-13937)
|
||||
|
||||
### CVE-2020-13942 (2020-11-24)
|
||||
|
||||
|
@ -3384,6 +3392,14 @@ XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnera
|
|||
|
||||
- [novysodope/CVE-2020-26217-XStream-RCE-POC](https://github.com/novysodope/CVE-2020-26217-XStream-RCE-POC)
|
||||
|
||||
### CVE-2020-26258 (2020-12-15)
|
||||
|
||||
<code>
|
||||
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2020-26258](https://github.com/Al1ex/CVE-2020-26258)
|
||||
|
||||
### CVE-2020-26259 (2020-12-15)
|
||||
|
||||
<code>
|
||||
|
@ -10735,14 +10751,6 @@ A code execution vulnerability exists in the Stapler web framework used by Jenki
|
|||
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
|
||||
- [xDro1d/CVE-2018-1000861](https://github.com/xDro1d/CVE-2018-1000861)
|
||||
|
||||
### CVE-2018-1002101 (2018-12-05)
|
||||
|
||||
<code>
|
||||
In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.
|
||||
</code>
|
||||
|
||||
- [se0g1/cve-2018-1002101](https://github.com/se0g1/cve-2018-1002101)
|
||||
|
||||
### CVE-2018-1002105 (2018-12-05)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue