mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/08/28 18:08:38
This commit is contained in:
parent
b2fe3779af
commit
5a735e271f
34 changed files with 165 additions and 141 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-08-27T09:34:41Z",
|
||||
"updated_at": "2020-08-28T08:56:37Z",
|
||||
"pushed_at": "2020-08-21T03:09:57Z",
|
||||
"stargazers_count": 660,
|
||||
"watchers_count": 660,
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"forks_count": 162,
|
||||
"forks": 162,
|
||||
"watchers": 660,
|
||||
"watchers": 662,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -592,8 +592,8 @@
|
|||
"pushed_at": "2015-06-19T04:48:17Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-08-27T09:34:41Z",
|
||||
"updated_at": "2020-08-28T08:56:37Z",
|
||||
"pushed_at": "2020-08-21T03:09:57Z",
|
||||
"stargazers_count": 660,
|
||||
"watchers_count": 660,
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"forks_count": 162,
|
||||
"forks": 162,
|
||||
"watchers": 660,
|
||||
"watchers": 662,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 219,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-08-27T09:34:41Z",
|
||||
"updated_at": "2020-08-28T08:56:37Z",
|
||||
"pushed_at": "2020-08-21T03:09:57Z",
|
||||
"stargazers_count": 660,
|
||||
"watchers_count": 660,
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"forks_count": 162,
|
||||
"forks": 162,
|
||||
"watchers": 660,
|
||||
"watchers": 662,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2020-08-20T18:07:15Z",
|
||||
"updated_at": "2020-08-28T09:03:22Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"forks_count": 132,
|
||||
"forks": 132,
|
||||
"watchers": 371,
|
||||
"watchers": 372,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2020-08-27T17:36:55Z",
|
||||
"updated_at": "2020-08-28T03:49:31Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 242,
|
||||
"watchers": 243,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2020-08-27T17:36:56Z",
|
||||
"updated_at": "2020-08-28T03:43:56Z",
|
||||
"pushed_at": "2017-11-27T16:28:14Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T04:36:23Z",
|
||||
"updated_at": "2020-06-19T07:55:23Z",
|
||||
"updated_at": "2020-08-28T04:38:41Z",
|
||||
"pushed_at": "2018-08-14T07:47:02Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 290940044,
|
||||
"name": "CVE-2018-1000861",
|
||||
"full_name": "xDro1d\/CVE-2018-1000861",
|
||||
"owner": {
|
||||
"login": "xDro1d",
|
||||
"id": 31328292,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/31328292?v=4",
|
||||
"html_url": "https:\/\/github.com\/xDro1d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xDro1d\/CVE-2018-1000861",
|
||||
"description": "CVE-2018-1000861 Jenkins远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-28T03:18:25Z",
|
||||
"updated_at": "2020-08-28T03:27:54Z",
|
||||
"pushed_at": "2020-08-28T03:27:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-08-27T09:34:41Z",
|
||||
"updated_at": "2020-08-28T08:56:37Z",
|
||||
"pushed_at": "2020-08-21T03:09:57Z",
|
||||
"stargazers_count": 660,
|
||||
"watchers_count": 660,
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"forks_count": 162,
|
||||
"forks": 162,
|
||||
"watchers": 660,
|
||||
"watchers": 662,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-08-27T19:30:38Z",
|
||||
"updated_at": "2020-08-28T08:20:08Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 293,
|
||||
"watchers": 294,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2020-08-24T18:12:19Z",
|
||||
"updated_at": "2020-08-28T06:52:27Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 406,
|
||||
"watchers_count": 406,
|
||||
"stargazers_count": 405,
|
||||
"watchers_count": 405,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 406,
|
||||
"watchers": 405,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-7600 Drupal RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T08:52:54Z",
|
||||
"updated_at": "2020-06-09T08:57:16Z",
|
||||
"updated_at": "2020-08-28T04:51:42Z",
|
||||
"pushed_at": "2018-04-18T06:58:39Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2020-08-25T02:42:16Z",
|
||||
"updated_at": "2020-08-28T05:21:51Z",
|
||||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 432,
|
||||
"watchers_count": 432,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"watchers": 432,
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"forks_count": 145,
|
||||
"forks": 145,
|
||||
"watchers": 433,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-08-27T19:47:27Z",
|
||||
"updated_at": "2020-08-28T08:07:05Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1605,
|
||||
"watchers_count": 1605,
|
||||
"stargazers_count": 1606,
|
||||
"watchers_count": 1606,
|
||||
"forks_count": 233,
|
||||
"forks": 233,
|
||||
"watchers": 1605,
|
||||
"watchers": 1606,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-04T13:06:02Z",
|
||||
"updated_at": "2020-08-07T16:48:55Z",
|
||||
"updated_at": "2020-08-28T06:36:58Z",
|
||||
"pushed_at": "2019-09-04T17:39:35Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-27T19:32:07Z",
|
||||
"updated_at": "2020-08-28T02:49:40Z",
|
||||
"updated_at": "2020-08-28T08:57:14Z",
|
||||
"pushed_at": "2020-08-27T19:33:42Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,12 +36,12 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-08-27T06:39:48Z",
|
||||
"updated_at": "2020-08-28T08:26:04Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1540,
|
||||
"watchers_count": 1540,
|
||||
"forks_count": 400,
|
||||
"forks": 400,
|
||||
"forks_count": 401,
|
||||
"forks": 401,
|
||||
"watchers": 1540,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE 2019-2215 Android Binder Use After Free",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T11:27:44Z",
|
||||
"updated_at": "2020-08-06T07:48:58Z",
|
||||
"updated_at": "2020-08-28T05:12:11Z",
|
||||
"pushed_at": "2020-03-16T07:20:14Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-08-28T03:08:41Z",
|
||||
"updated_at": "2020-08-28T08:56:37Z",
|
||||
"pushed_at": "2020-08-21T03:09:57Z",
|
||||
"stargazers_count": 661,
|
||||
"watchers_count": 661,
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"forks_count": 162,
|
||||
"forks": 162,
|
||||
"watchers": 661,
|
||||
"watchers": 662,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 219,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2020-08-27T10:17:00Z",
|
||||
"updated_at": "2020-08-28T04:57:14Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 135,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-6340-Drupal SA-CORE-2019-003",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T16:03:40Z",
|
||||
"updated_at": "2020-08-23T20:33:42Z",
|
||||
"updated_at": "2020-08-28T05:30:04Z",
|
||||
"pushed_at": "2019-02-24T18:43:05Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-02-12T19:38:35Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-08-27T17:38:15Z",
|
||||
"updated_at": "2020-08-28T06:11:04Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 218,
|
||||
"watchers": 219,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-08-28T02:47:07Z",
|
||||
"updated_at": "2020-08-28T04:10:35Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 402,
|
||||
"watchers_count": 402,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 402,
|
||||
"stargazers_count": 403,
|
||||
"watchers_count": 403,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 403,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1324,13 +1324,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2020-08-17T21:38:07Z",
|
||||
"updated_at": "2020-08-28T03:59:37Z",
|
||||
"pushed_at": "2020-07-08T08:26:24Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T04:44:05Z",
|
||||
"updated_at": "2020-08-13T14:10:20Z",
|
||||
"updated_at": "2020-08-28T04:10:50Z",
|
||||
"pushed_at": "2020-06-17T00:56:08Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-16T19:47:29Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 287072011,
|
||||
"name": "vBulletin-0Day-Auto-shell-CVE-2020-17496-",
|
||||
"full_name": "noopslide\/vBulletin-0Day-Auto-shell-CVE-2020-17496-",
|
||||
"full_name": "0x00fy\/vBulletin-0Day-Auto-shell-CVE-2020-17496-",
|
||||
"owner": {
|
||||
"login": "noopslide",
|
||||
"login": "0x00fy",
|
||||
"id": 63475375,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/63475375?v=4",
|
||||
"html_url": "https:\/\/github.com\/noopslide"
|
||||
"html_url": "https:\/\/github.com\/0x00fy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/noopslide\/vBulletin-0Day-Auto-shell-CVE-2020-17496-",
|
||||
"html_url": "https:\/\/github.com\/0x00fy\/vBulletin-0Day-Auto-shell-CVE-2020-17496-",
|
||||
"description": "Auto Shell upload & Patch vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T17:15:14Z",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-08-28T03:08:41Z",
|
||||
"updated_at": "2020-08-28T08:56:37Z",
|
||||
"pushed_at": "2020-08-21T03:09:57Z",
|
||||
"stargazers_count": 661,
|
||||
"watchers_count": 661,
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"forks_count": 162,
|
||||
"forks": 162,
|
||||
"watchers": 661,
|
||||
"watchers": 662,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2020-08-28T01:37:39Z",
|
||||
"updated_at": "2020-08-28T08:19:50Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 69,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-08-27T06:39:48Z",
|
||||
"updated_at": "2020-08-28T08:26:04Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1540,
|
||||
"watchers_count": 1540,
|
||||
"forks_count": 400,
|
||||
"forks": 400,
|
||||
"forks_count": 401,
|
||||
"forks": 401,
|
||||
"watchers": 1540,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "[CVE-2020-6287] SAP NetWeaver AS JAVA (LM Configuration Wizard) Authentication Bypass (Create Simple & Administrator Java User)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T09:12:37Z",
|
||||
"updated_at": "2020-08-13T15:59:38Z",
|
||||
"updated_at": "2020-08-28T03:40:12Z",
|
||||
"pushed_at": "2020-08-13T15:59:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1965,7 +1965,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
|
|||
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
|
||||
</code>
|
||||
|
||||
- [noopslide/vBulletin-0Day-Auto-shell-CVE-2020-17496-](https://github.com/noopslide/vBulletin-0Day-Auto-shell-CVE-2020-17496-)
|
||||
- [0x00fy/vBulletin-0Day-Auto-shell-CVE-2020-17496-](https://github.com/0x00fy/vBulletin-0Day-Auto-shell-CVE-2020-17496-)
|
||||
- [ctlyz123/CVE-2020-17496](https://github.com/ctlyz123/CVE-2020-17496)
|
||||
|
||||
### CVE-2020-24033
|
||||
|
@ -8574,6 +8574,7 @@ A code execution vulnerability exists in the Stapler web framework used by Jenki
|
|||
</code>
|
||||
|
||||
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
|
||||
- [xDro1d/CVE-2018-1000861](https://github.com/xDro1d/CVE-2018-1000861)
|
||||
|
||||
### CVE-2018-1002105
|
||||
|
||||
|
|
Loading…
Reference in a new issue