mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/09/23 18:08:54
This commit is contained in:
parent
e71a6b606e
commit
565affb1f9
30 changed files with 246 additions and 134 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-20T12:09:23Z",
|
||||
"updated_at": "2020-09-23T07:12:20Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 698,
|
||||
"watchers_count": 698,
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 698,
|
||||
"watchers": 699,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-20T12:09:23Z",
|
||||
"updated_at": "2020-09-23T07:12:20Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 698,
|
||||
"watchers_count": 698,
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 698,
|
||||
"watchers": 699,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2017-06-12T08:31:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-09-19T07:36:03Z",
|
||||
"updated_at": "2020-09-23T03:12:17Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 222,
|
||||
"watchers": 223,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-20T12:09:23Z",
|
||||
"updated_at": "2020-09-23T07:12:20Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 698,
|
||||
"watchers_count": 698,
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 698,
|
||||
"watchers": 699,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2020-09-21T05:14:41Z",
|
||||
"updated_at": "2020-09-23T08:28:24Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 246,
|
||||
"watchers": 245,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Hikvision camera CVE-2017-7921-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-27T11:49:40Z",
|
||||
"updated_at": "2020-09-17T14:10:57Z",
|
||||
"updated_at": "2020-09-23T04:10:09Z",
|
||||
"pushed_at": "2020-08-09T15:35:16Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE 2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-06T08:32:01Z",
|
||||
"updated_at": "2020-06-27T15:56:18Z",
|
||||
"updated_at": "2020-09-23T06:38:31Z",
|
||||
"pushed_at": "2020-08-31T04:34:29Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,8 +128,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-19T08:53:38Z",
|
||||
"updated_at": "2020-09-19T09:08:46Z",
|
||||
"pushed_at": "2020-09-19T09:08:43Z",
|
||||
"updated_at": "2020-09-23T07:43:38Z",
|
||||
"pushed_at": "2020-09-23T07:43:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -151,8 +151,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-19T09:12:15Z",
|
||||
"updated_at": "2020-09-19T09:17:11Z",
|
||||
"pushed_at": "2020-09-19T09:17:08Z",
|
||||
"updated_at": "2020-09-23T07:40:19Z",
|
||||
"pushed_at": "2020-09-23T07:40:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Proof of consept for CVE-2018-17431",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-08T07:47:41Z",
|
||||
"updated_at": "2020-07-19T09:24:31Z",
|
||||
"pushed_at": "2019-05-18T05:54:31Z",
|
||||
"updated_at": "2020-09-23T05:29:28Z",
|
||||
"pushed_at": "2020-09-23T05:29:26Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-20T12:09:23Z",
|
||||
"updated_at": "2020-09-23T07:12:20Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 698,
|
||||
"watchers_count": 698,
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 698,
|
||||
"watchers": 699,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-23T01:01:28Z",
|
||||
"updated_at": "2020-09-23T07:39:36Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1882,
|
||||
"watchers_count": 1882,
|
||||
"forks_count": 483,
|
||||
"forks": 483,
|
||||
"watchers": 1882,
|
||||
"stargazers_count": 1884,
|
||||
"watchers_count": 1884,
|
||||
"forks_count": 486,
|
||||
"forks": 486,
|
||||
"watchers": 1884,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-20T12:09:23Z",
|
||||
"updated_at": "2020-09-23T07:12:20Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 698,
|
||||
"watchers_count": 698,
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 698,
|
||||
"watchers": 699,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-09-19T07:36:03Z",
|
||||
"updated_at": "2020-09-23T03:12:17Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 222,
|
||||
"watchers": 223,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2020-09-22T08:20:15Z",
|
||||
"updated_at": "2020-09-23T04:05:27Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"forks_count": 153,
|
||||
"forks": 153,
|
||||
"watchers": 358,
|
||||
"watchers": 359,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-2729 Exploit Script",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T03:49:51Z",
|
||||
"updated_at": "2020-09-23T01:49:27Z",
|
||||
"updated_at": "2020-09-23T08:57:32Z",
|
||||
"pushed_at": "2020-02-19T08:48:02Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-08-25T10:21:46Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T21:25:18Z",
|
||||
"updated_at": "2020-09-23T00:10:46Z",
|
||||
"updated_at": "2020-09-23T06:39:45Z",
|
||||
"pushed_at": "2020-09-18T00:01:00Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-23T01:44:51Z",
|
||||
"pushed_at": "2020-09-17T08:18:25Z",
|
||||
"stargazers_count": 1021,
|
||||
"watchers_count": 1021,
|
||||
"forks_count": 200,
|
||||
"forks": 200,
|
||||
"watchers": 1021,
|
||||
"updated_at": "2020-09-23T08:43:32Z",
|
||||
"pushed_at": "2020-09-23T07:04:58Z",
|
||||
"stargazers_count": 1028,
|
||||
"watchers_count": 1028,
|
||||
"forks_count": 202,
|
||||
"forks": 202,
|
||||
"watchers": 1028,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-09-23T01:18:45Z",
|
||||
"pushed_at": "2020-09-15T15:50:03Z",
|
||||
"stargazers_count": 554,
|
||||
"watchers_count": 554,
|
||||
"forks_count": 149,
|
||||
"forks": 149,
|
||||
"watchers": 554,
|
||||
"updated_at": "2020-09-23T08:51:32Z",
|
||||
"pushed_at": "2020-09-23T07:48:50Z",
|
||||
"stargazers_count": 559,
|
||||
"watchers_count": 559,
|
||||
"forks_count": 150,
|
||||
"forks": 150,
|
||||
"watchers": 559,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-09-17T07:26:50Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 97,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-09-22T20:50:44Z",
|
||||
"updated_at": "2020-09-23T09:08:02Z",
|
||||
"pushed_at": "2020-09-17T18:06:57Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 127,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:27:14Z",
|
||||
"updated_at": "2020-09-23T01:54:05Z",
|
||||
"updated_at": "2020-09-23T03:45:25Z",
|
||||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -335,13 +335,13 @@
|
|||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2020-09-22T13:22:00Z",
|
||||
"updated_at": "2020-09-23T03:30:01Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "几条关于CVE-2020-15148(yii2反序列化)的绕过",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-21T03:55:55Z",
|
||||
"updated_at": "2020-09-23T02:41:34Z",
|
||||
"updated_at": "2020-09-23T09:08:28Z",
|
||||
"pushed_at": "2020-09-21T04:04:39Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 43,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-22T14:50:14Z",
|
||||
"updated_at": "2020-09-22T23:30:19Z",
|
||||
"updated_at": "2020-09-23T07:11:25Z",
|
||||
"pushed_at": "2020-09-22T14:52:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25270.json
Normal file
25
2020/CVE-2020-25270.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297838971,
|
||||
"name": "CVE-2020-25270",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25270",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25270",
|
||||
"description": "PHPGurukul hostel-management-system 2.1 allows XSS via Guardian Name, Guardian Relation, Guardian Contact no, Address, City",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T03:16:08Z",
|
||||
"updated_at": "2020-09-23T03:22:49Z",
|
||||
"pushed_at": "2020-09-23T03:22:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25271.json
Normal file
25
2020/CVE-2020-25271.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297840535,
|
||||
"name": "CVE-2020-25271",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25271",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25271",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T03:24:20Z",
|
||||
"updated_at": "2020-09-23T03:49:17Z",
|
||||
"pushed_at": "2020-09-23T03:49:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25272.json
Normal file
25
2020/CVE-2020-25272.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297850617,
|
||||
"name": "CVE-2020-25272",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25272",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25272",
|
||||
"description": "Online Bus Booking System 1.0,there is XSS through the name parameter in book_now.php",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T04:20:16Z",
|
||||
"updated_at": "2020-09-23T04:28:17Z",
|
||||
"pushed_at": "2020-09-23T04:28:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25273.json
Normal file
25
2020/CVE-2020-25273.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297852230,
|
||||
"name": "CVE-2020-25273",
|
||||
"full_name": "Ko-kn3t\/CVE-2020-25273",
|
||||
"owner": {
|
||||
"login": "Ko-kn3t",
|
||||
"id": 57166441,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57166441?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-25273",
|
||||
"description": "Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T04:29:29Z",
|
||||
"updated_at": "2020-09-23T04:34:25Z",
|
||||
"pushed_at": "2020-09-23T04:34:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-20T12:09:23Z",
|
||||
"updated_at": "2020-09-23T07:12:20Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 698,
|
||||
"watchers_count": 698,
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"watchers": 698,
|
||||
"watchers": 699,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-22T04:58:59Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-23T01:01:28Z",
|
||||
"updated_at": "2020-09-23T07:39:36Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1882,
|
||||
"watchers_count": 1882,
|
||||
"forks_count": 483,
|
||||
"forks": 483,
|
||||
"watchers": 1882,
|
||||
"stargazers_count": 1884,
|
||||
"watchers_count": 1884,
|
||||
"forks_count": 486,
|
||||
"forks": 486,
|
||||
"watchers": 1884,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T06:19:09Z",
|
||||
"updated_at": "2020-09-05T23:07:13Z",
|
||||
"updated_at": "2020-09-23T07:25:14Z",
|
||||
"pushed_at": "2020-07-07T07:19:16Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for uTorrent vulnerability CVE-2020-8437 by whtaguy",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-18T01:03:18Z",
|
||||
"updated_at": "2020-09-18T01:04:11Z",
|
||||
"updated_at": "2020-09-23T08:17:29Z",
|
||||
"pushed_at": "2020-09-18T01:04:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
12
README.md
12
README.md
|
@ -2233,6 +2233,18 @@ SUPERAntiSyware Professional X Trial 10.0.1206 is vulnerable to local privilege
|
|||
### CVE-2020-25200
|
||||
- [lukaszstu/pritunl](https://github.com/lukaszstu/pritunl)
|
||||
|
||||
### CVE-2020-25270
|
||||
- [Ko-kn3t/CVE-2020-25270](https://github.com/Ko-kn3t/CVE-2020-25270)
|
||||
|
||||
### CVE-2020-25271
|
||||
- [Ko-kn3t/CVE-2020-25271](https://github.com/Ko-kn3t/CVE-2020-25271)
|
||||
|
||||
### CVE-2020-25272
|
||||
- [Ko-kn3t/CVE-2020-25272](https://github.com/Ko-kn3t/CVE-2020-25272)
|
||||
|
||||
### CVE-2020-25273
|
||||
- [Ko-kn3t/CVE-2020-25273](https://github.com/Ko-kn3t/CVE-2020-25273)
|
||||
|
||||
### CVE-2020-25487
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue