mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2020/08/15 06:08:54
This commit is contained in:
parent
6838874b48
commit
59a3003f8d
30 changed files with 103 additions and 259 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 168247796,
|
||||
"name": "CVE-2006-1236",
|
||||
"full_name": "Axua\/CVE-2006-1236",
|
||||
"owner": {
|
||||
"login": "Axua",
|
||||
"id": 28788087,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
|
||||
"html_url": "https:\/\/github.com\/Axua"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236",
|
||||
"description": "Exploit script for Crossfire 1.9.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-29T23:46:59Z",
|
||||
"updated_at": "2019-01-29T23:50:30Z",
|
||||
"pushed_at": "2019-01-29T23:50:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 276101400,
|
||||
"name": "CVE-2006-3392",
|
||||
"full_name": "Ziani52\/CVE-2006-3392",
|
||||
"owner": {
|
||||
"login": "Ziani52",
|
||||
"id": 53442065,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53442065?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ziani52"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ziani52\/CVE-2006-3392",
|
||||
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-30T13:07:31Z",
|
||||
"updated_at": "2020-08-05T16:17:06Z",
|
||||
"pushed_at": "2020-06-30T22:21:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 186166548,
|
||||
"name": "CVE-2006-3592",
|
||||
"full_name": "adenkiewicz\/CVE-2006-3592",
|
||||
"owner": {
|
||||
"login": "adenkiewicz",
|
||||
"id": 1060275,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4",
|
||||
"html_url": "https:\/\/github.com\/adenkiewicz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2006-3592",
|
||||
"description": "Exploit for Easy File Sharing FTP Server 3.5 on Win7 32",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-11T18:11:34Z",
|
||||
"updated_at": "2019-05-11T18:12:45Z",
|
||||
"pushed_at": "2019-05-11T18:12:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 63907042,
|
||||
"name": "cve-2006-6184",
|
||||
"full_name": "shauntdergrigorian\/cve-2006-6184",
|
||||
"owner": {
|
||||
"login": "shauntdergrigorian",
|
||||
"id": 7718028,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7718028?v=4",
|
||||
"html_url": "https:\/\/github.com\/shauntdergrigorian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
|
||||
"description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-21T22:43:43Z",
|
||||
"updated_at": "2020-08-05T03:19:30Z",
|
||||
"pushed_at": "2016-07-22T15:12:43Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 205628184,
|
||||
"name": "CVE-2006-6184",
|
||||
"full_name": "b03902043\/CVE-2006-6184",
|
||||
"owner": {
|
||||
"login": "b03902043",
|
||||
"id": 9023845,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9023845?v=4",
|
||||
"html_url": "https:\/\/github.com\/b03902043"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184",
|
||||
"description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-01T04:18:53Z",
|
||||
"updated_at": "2019-09-01T04:23:25Z",
|
||||
"pushed_at": "2019-09-01T04:23:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC Java exploit based on http:\/\/www.contextis.com\/research\/blog\/java-pwn2own\/",
|
||||
"fork": false,
|
||||
"created_at": "2015-04-16T07:12:19Z",
|
||||
"updated_at": "2019-11-12T04:55:13Z",
|
||||
"updated_at": "2020-08-14T20:04:22Z",
|
||||
"pushed_at": "2015-04-16T07:12:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploiting CVE-2016-0040 uninitialized pointer",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-26T18:00:30Z",
|
||||
"updated_at": "2020-04-28T11:12:49Z",
|
||||
"updated_at": "2020-08-14T17:05:54Z",
|
||||
"pushed_at": "2016-07-17T07:59:10Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2020-08-04T01:19:49Z",
|
||||
"updated_at": "2020-08-14T20:56:38Z",
|
||||
"pushed_at": "2017-09-27T02:35:13Z",
|
||||
"stargazers_count": 830,
|
||||
"watchers_count": 830,
|
||||
"stargazers_count": 829,
|
||||
"watchers_count": 829,
|
||||
"forks_count": 396,
|
||||
"forks": 396,
|
||||
"watchers": 830,
|
||||
"watchers": 829,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "A code demonstrating CVE-2018-0886",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-02T12:52:07Z",
|
||||
"updated_at": "2020-07-27T02:51:20Z",
|
||||
"pushed_at": "2018-06-02T10:33:41Z",
|
||||
"updated_at": "2020-08-14T16:33:46Z",
|
||||
"pushed_at": "2020-08-14T16:33:44Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"forks_count": 59,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2020-08-02T05:35:01Z",
|
||||
"updated_at": "2020-08-14T20:12:05Z",
|
||||
"pushed_at": "2020-03-06T10:52:19Z",
|
||||
"stargazers_count": 411,
|
||||
"watchers_count": 411,
|
||||
"stargazers_count": 412,
|
||||
"watchers_count": 412,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 411,
|
||||
"watchers": 412,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "(CVE-2018-9995) Get DVR Credentials",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-29T20:00:06Z",
|
||||
"updated_at": "2020-08-04T07:00:10Z",
|
||||
"updated_at": "2020-08-14T16:36:24Z",
|
||||
"pushed_at": "2019-01-23T14:27:21Z",
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"forks_count": 178,
|
||||
"forks": 178,
|
||||
"watchers": 422,
|
||||
"watchers": 423,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -24,20 +24,20 @@
|
|||
},
|
||||
{
|
||||
"id": 287558673,
|
||||
"name": "s2-059-cve-2019-0230",
|
||||
"full_name": "cellanu\/s2-059-cve-2019-0230",
|
||||
"name": "cve-2019-0230",
|
||||
"full_name": "cellanu\/cve-2019-0230",
|
||||
"owner": {
|
||||
"login": "cellanu",
|
||||
"id": 65203371,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/65203371?v=4",
|
||||
"html_url": "https:\/\/github.com\/cellanu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cellanu\/s2-059-cve-2019-0230",
|
||||
"html_url": "https:\/\/github.com\/cellanu\/cve-2019-0230",
|
||||
"description": "s2-059漏洞环境加验证",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-14T15:00:03Z",
|
||||
"updated_at": "2020-08-14T15:00:08Z",
|
||||
"pushed_at": "2020-08-14T15:00:05Z",
|
||||
"updated_at": "2020-08-14T16:08:25Z",
|
||||
"pushed_at": "2020-08-14T16:08:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-08-12T14:11:11Z",
|
||||
"updated_at": "2020-08-14T17:11:57Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1600,
|
||||
"watchers_count": 1600,
|
||||
"stargazers_count": 1601,
|
||||
"watchers_count": 1601,
|
||||
"forks_count": 232,
|
||||
"forks": 232,
|
||||
"watchers": 1600,
|
||||
"watchers": 1601,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -266,13 +266,13 @@
|
|||
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T21:11:27Z",
|
||||
"updated_at": "2020-07-07T11:57:00Z",
|
||||
"updated_at": "2020-08-14T17:56:50Z",
|
||||
"pushed_at": "2020-04-28T04:25:33Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-09-24T02:06:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Vbulletin RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T19:11:37Z",
|
||||
"updated_at": "2020-08-14T08:01:15Z",
|
||||
"updated_at": "2020-08-14T17:08:37Z",
|
||||
"pushed_at": "2020-08-14T08:01:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-08-14T13:16:14Z",
|
||||
"updated_at": "2020-08-14T15:46:55Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1483,
|
||||
"watchers_count": 1483,
|
||||
"forks_count": 379,
|
||||
"forks": 379,
|
||||
"watchers": 1483,
|
||||
"stargazers_count": 1484,
|
||||
"watchers_count": 1484,
|
||||
"forks_count": 380,
|
||||
"forks": 380,
|
||||
"watchers": 1484,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2020-07-14T04:37:00Z",
|
||||
"updated_at": "2020-08-14T17:11:28Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 495,
|
||||
"watchers_count": 495,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 495,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-01-11T14:03:52Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-04-14T07:04:15Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -14,11 +14,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-02-21T22:49:53Z",
|
||||
"updated_at": "2020-07-03T07:56:48Z",
|
||||
"pushed_at": "2020-07-03T07:56:56Z",
|
||||
"pushed_at": "2020-08-14T20:41:58Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -496,13 +496,13 @@
|
|||
"description": "PoC for CVE-2020-0601 - CryptoAPI exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-28T21:24:54Z",
|
||||
"updated_at": "2020-03-24T05:22:40Z",
|
||||
"updated_at": "2020-08-14T20:36:50Z",
|
||||
"pushed_at": "2020-01-28T22:06:57Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "PoC for Forgot2kEyXCHANGE (CVE-2020-0688) written in PowerShell",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-04T22:02:30Z",
|
||||
"updated_at": "2020-05-18T10:43:41Z",
|
||||
"updated_at": "2020-08-14T17:15:13Z",
|
||||
"pushed_at": "2020-03-05T08:02:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -427,13 +427,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T19:33:18Z",
|
||||
"updated_at": "2020-08-05T16:26:23Z",
|
||||
"updated_at": "2020-08-14T20:35:45Z",
|
||||
"pushed_at": "2020-03-13T07:38:43Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Telia Technicolor TG389ac v.17.1.7992 Samba privilege escalation exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-14T11:47:37Z",
|
||||
"updated_at": "2020-08-14T13:06:21Z",
|
||||
"pushed_at": "2020-08-14T14:34:52Z",
|
||||
"updated_at": "2020-08-14T17:50:58Z",
|
||||
"pushed_at": "2020-08-14T17:50:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-08-03T18:55:37Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T08:01:20Z",
|
||||
"updated_at": "2020-08-14T13:50:23Z",
|
||||
"updated_at": "2020-08-14T17:23:57Z",
|
||||
"pushed_at": "2020-07-21T10:28:42Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 101,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T10:05:36Z",
|
||||
"updated_at": "2020-08-14T13:02:06Z",
|
||||
"updated_at": "2020-08-14T19:04:18Z",
|
||||
"pushed_at": "2020-08-13T07:16:12Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 90,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T03:27:24Z",
|
||||
"updated_at": "2020-08-06T16:06:09Z",
|
||||
"updated_at": "2020-08-14T19:16:57Z",
|
||||
"pushed_at": "2020-07-20T03:51:06Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-08-14T13:16:14Z",
|
||||
"updated_at": "2020-08-14T15:46:55Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1483,
|
||||
"watchers_count": 1483,
|
||||
"forks_count": 379,
|
||||
"forks": 379,
|
||||
"watchers": 1483,
|
||||
"stargazers_count": 1484,
|
||||
"watchers_count": 1484,
|
||||
"forks_count": 380,
|
||||
"forks": 380,
|
||||
"watchers": 1484,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2020-08-04T09:20:20Z",
|
||||
"updated_at": "2020-08-14T18:23:15Z",
|
||||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 302,
|
||||
"watchers": 301,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Pi-hole Remote Code Execution authenticated Version >= 4.3.2",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-04T10:23:28Z",
|
||||
"updated_at": "2020-08-08T12:27:52Z",
|
||||
"updated_at": "2020-08-14T19:08:37Z",
|
||||
"pushed_at": "2020-08-05T22:38:53Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
35
README.md
35
README.md
|
@ -1961,7 +1961,7 @@ A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4
|
|||
|
||||
### CVE-2019-0230
|
||||
- [xiyan123/CVE-2019-0230](https://github.com/xiyan123/CVE-2019-0230)
|
||||
- [cellanu/s2-059-cve-2019-0230](https://github.com/cellanu/s2-059-cve-2019-0230)
|
||||
- [cellanu/cve-2019-0230](https://github.com/cellanu/cve-2019-0230)
|
||||
|
||||
### CVE-2019-0232
|
||||
|
||||
|
@ -14591,30 +14591,6 @@ March Networks DVR 3204 stores sensitive information under the web root with ins
|
|||
|
||||
|
||||
## 2006
|
||||
### CVE-2006-1236
|
||||
|
||||
<code>
|
||||
Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 allows remote attackers to execute arbitrary code via a long setup sound command, a different vulnerability than CVE-2006-1010.
|
||||
</code>
|
||||
|
||||
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
|
||||
|
||||
### CVE-2006-3392
|
||||
|
||||
<code>
|
||||
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
|
||||
</code>
|
||||
|
||||
- [Ziani52/CVE-2006-3392](https://github.com/Ziani52/CVE-2006-3392)
|
||||
|
||||
### CVE-2006-3592
|
||||
|
||||
<code>
|
||||
Unspecified vulnerability in the command line interface (CLI) in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows local users to execute arbitrary commands with elevated privileges via unspecified vectors, involving "certain CLI commands," aka bug CSCse11005.
|
||||
</code>
|
||||
|
||||
- [adenkiewicz/CVE-2006-3592](https://github.com/adenkiewicz/CVE-2006-3592)
|
||||
|
||||
### CVE-2006-3747
|
||||
|
||||
<code>
|
||||
|
@ -14639,15 +14615,6 @@ The mincore function in the Linux kernel before 2.4.33.6 does not properly lock
|
|||
|
||||
- [tagatac/linux-CVE-2006-4814](https://github.com/tagatac/linux-CVE-2006-4814)
|
||||
|
||||
### CVE-2006-6184
|
||||
|
||||
<code>
|
||||
Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
|
||||
</code>
|
||||
|
||||
- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184)
|
||||
- [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184)
|
||||
|
||||
|
||||
## 2005
|
||||
### CVE-2005-1125
|
||||
|
|
Loading…
Add table
Reference in a new issue