mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/01/21 18:10:06
This commit is contained in:
parent
cd3f5ef1c5
commit
5be96612cf
26 changed files with 228 additions and 234 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 155039044,
|
||||
"name": "CVE-2010-5327",
|
||||
"full_name": "Michael-Main\/CVE-2010-5327",
|
||||
"owner": {
|
||||
"login": "Michael-Main",
|
||||
"id": 44539668,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44539668?v=4",
|
||||
"html_url": "https:\/\/github.com\/Michael-Main"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Michael-Main\/CVE-2010-5327",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-28T05:37:23Z",
|
||||
"updated_at": "2018-10-28T05:37:23Z",
|
||||
"pushed_at": "2018-10-28T05:37:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 155044548,
|
||||
"name": "CVE-2011-4905",
|
||||
"full_name": "Michael-Main\/CVE-2011-4905",
|
||||
"owner": {
|
||||
"login": "Michael-Main",
|
||||
"id": 44539668,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44539668?v=4",
|
||||
"html_url": "https:\/\/github.com\/Michael-Main"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Michael-Main\/CVE-2011-4905",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-28T07:07:42Z",
|
||||
"updated_at": "2018-10-28T07:25:54Z",
|
||||
"pushed_at": "2018-10-28T07:25:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,24 +1,24 @@
|
|||
[
|
||||
{
|
||||
"id": 155046587,
|
||||
"id": 195067727,
|
||||
"name": "CVE-2012-4431",
|
||||
"full_name": "Michael-Main\/CVE-2012-4431",
|
||||
"full_name": "imjdl\/CVE-2012-4431",
|
||||
"owner": {
|
||||
"login": "Michael-Main",
|
||||
"id": 44539668,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44539668?v=4",
|
||||
"html_url": "https:\/\/github.com\/Michael-Main"
|
||||
"login": "imjdl",
|
||||
"id": 31382943,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
|
||||
"html_url": "https:\/\/github.com\/imjdl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Michael-Main\/CVE-2012-4431",
|
||||
"html_url": "https:\/\/github.com\/imjdl\/CVE-2012-4431",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-28T07:38:58Z",
|
||||
"updated_at": "2018-10-28T07:56:34Z",
|
||||
"created_at": "2019-07-03T14:13:23Z",
|
||||
"updated_at": "2021-01-21T03:19:39Z",
|
||||
"pushed_at": "2018-10-28T07:55:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2021-01-05T10:18:00Z",
|
||||
"updated_at": "2021-01-21T04:25:39Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 686,
|
||||
"watchers_count": 686,
|
||||
"stargazers_count": 687,
|
||||
"watchers_count": 687,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 686,
|
||||
"watchers": 687,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2021-01-01T11:31:42Z",
|
||||
"updated_at": "2021-01-21T07:24:53Z",
|
||||
"pushed_at": "2020-08-18T00:00:15Z",
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"forks_count": 142,
|
||||
"forks": 142,
|
||||
"watchers": 427,
|
||||
"watchers": 428,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 681,
|
||||
"watchers_count": 681,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 681,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-20T13:34:49Z",
|
||||
"updated_at": "2021-01-21T07:04:03Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2280,
|
||||
"watchers_count": 2280,
|
||||
"forks_count": 640,
|
||||
"forks": 640,
|
||||
"watchers": 2280,
|
||||
"stargazers_count": 2283,
|
||||
"watchers_count": 2283,
|
||||
"forks_count": 641,
|
||||
"forks": 641,
|
||||
"watchers": 2283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T15:40:28Z",
|
||||
"updated_at": "2020-12-31T15:50:39Z",
|
||||
"pushed_at": "2020-12-31T15:50:37Z",
|
||||
"updated_at": "2021-01-21T07:59:40Z",
|
||||
"pushed_at": "2021-01-21T07:59:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -59,8 +59,8 @@
|
|||
"description": "TelerikUI Vulnerability Scanner (CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-17T04:22:45Z",
|
||||
"updated_at": "2020-11-20T20:16:55Z",
|
||||
"pushed_at": "2020-11-20T20:16:52Z",
|
||||
"updated_at": "2021-01-21T06:12:59Z",
|
||||
"pushed_at": "2021-01-21T06:12:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"forks_count": 156,
|
||||
"forks": 156,
|
||||
"forks_count": 157,
|
||||
"forks": 157,
|
||||
"watchers": 379,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Synaptics Audio Driver LPE",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-14T06:16:34Z",
|
||||
"updated_at": "2021-01-02T13:00:32Z",
|
||||
"updated_at": "2021-01-21T03:16:33Z",
|
||||
"pushed_at": "2019-04-15T11:17:39Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -206,75 +206,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234920281,
|
||||
"name": "curveball_lua",
|
||||
"full_name": "dlee35\/curveball_lua",
|
||||
"owner": {
|
||||
"login": "dlee35",
|
||||
"id": 7849311,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7849311?v=4",
|
||||
"html_url": "https:\/\/github.com\/dlee35"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dlee35\/curveball_lua",
|
||||
"description": "Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffic",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T15:20:19Z",
|
||||
"updated_at": "2020-01-19T21:25:55Z",
|
||||
"pushed_at": "2020-01-19T21:25:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 234944443,
|
||||
"name": "-CVE-2020-0601-ECC---EXPLOIT",
|
||||
"full_name": "IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
|
||||
"owner": {
|
||||
"login": "IIICTECH",
|
||||
"id": 5104528,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5104528?v=4",
|
||||
"html_url": "https:\/\/github.com\/IIICTECH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
|
||||
"description": "CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T18:20:26Z",
|
||||
"updated_at": "2020-01-27T17:28:54Z",
|
||||
"pushed_at": "2020-01-19T18:26:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235000073,
|
||||
"name": "CVE-2020-0601",
|
||||
"full_name": "Ash112121\/CVE-2020-0601",
|
||||
"owner": {
|
||||
"login": "Ash112121",
|
||||
"id": 50549802,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50549802?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ash112121"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ash112121\/CVE-2020-0601",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T02:04:05Z",
|
||||
"updated_at": "2020-01-20T02:05:22Z",
|
||||
"pushed_at": "2020-01-20T02:05:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235145190,
|
||||
"name": "curveball",
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2021-01-19T05:57:18Z",
|
||||
"updated_at": "2021-01-21T05:19:54Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 255,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -822,8 +822,8 @@
|
|||
"pushed_at": "2020-03-18T08:57:36Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -914,8 +914,8 @@
|
|||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1063,
|
||||
"watchers_count": 1063,
|
||||
"forks_count": 355,
|
||||
"forks": 355,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1063,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -937,8 +937,8 @@
|
|||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-12T13:38:19Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T09:40:15Z",
|
||||
"updated_at": "2021-01-01T16:03:25Z",
|
||||
"updated_at": "2021-01-21T03:34:57Z",
|
||||
"pushed_at": "2020-05-26T10:23:34Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-23T10:24:07Z",
|
||||
"updated_at": "2021-01-20T11:53:30Z",
|
||||
"updated_at": "2021-01-21T07:16:04Z",
|
||||
"pushed_at": "2020-11-23T11:20:28Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-07-18T06:38:11Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-01-20T02:06:07Z",
|
||||
"updated_at": "2021-01-21T09:07:10Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1226,
|
||||
"watchers_count": 1226,
|
||||
"stargazers_count": 1228,
|
||||
"watchers_count": 1228,
|
||||
"forks_count": 285,
|
||||
"forks": 285,
|
||||
"watchers": 1226,
|
||||
"watchers": 1228,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -335,13 +335,13 @@
|
|||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2021-01-21T03:06:29Z",
|
||||
"updated_at": "2021-01-21T06:52:07Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 40,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -680,13 +680,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-26T08:31:47Z",
|
||||
"updated_at": "2020-11-29T03:32:16Z",
|
||||
"updated_at": "2021-01-21T09:02:23Z",
|
||||
"pushed_at": "2020-09-26T08:44:42Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-20T13:34:49Z",
|
||||
"updated_at": "2021-01-21T07:04:03Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2280,
|
||||
"watchers_count": 2280,
|
||||
"forks_count": 640,
|
||||
"forks": 640,
|
||||
"watchers": 2280,
|
||||
"stargazers_count": 2283,
|
||||
"watchers_count": 2283,
|
||||
"forks_count": 641,
|
||||
"forks": 641,
|
||||
"watchers": 2283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2021-01-20T13:34:42Z",
|
||||
"updated_at": "2021-01-21T08:09:58Z",
|
||||
"pushed_at": "2021-01-13T10:38:48Z",
|
||||
"stargazers_count": 772,
|
||||
"watchers_count": 772,
|
||||
"forks_count": 139,
|
||||
"forks": 139,
|
||||
"watchers": 772,
|
||||
"stargazers_count": 775,
|
||||
"watchers_count": 775,
|
||||
"forks_count": 143,
|
||||
"forks": 143,
|
||||
"watchers": 775,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2021-01-20T03:05:29Z",
|
||||
"updated_at": "2021-01-21T07:36:43Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 207,
|
||||
"watchers": 208,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-17456.json
Normal file
25
2020/CVE-2020-17456.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 331533622,
|
||||
"name": "CVE-2020-17456",
|
||||
"full_name": "Al1ex\/CVE-2020-17456",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-17456",
|
||||
"description": "CVE-2020-17456 & Seowon SLC 130 Router RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T06:16:40Z",
|
||||
"updated_at": "2021-01-21T06:48:06Z",
|
||||
"pushed_at": "2021-01-21T06:17:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-12-18T00:57:50Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2020/CVE-2020-24032.json
Normal file
25
2020/CVE-2020-24032.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 331558019,
|
||||
"name": "CVE-2020-24032",
|
||||
"full_name": "jet-pentest\/CVE-2020-24032",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2020-24032",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T08:07:09Z",
|
||||
"updated_at": "2021-01-21T08:08:29Z",
|
||||
"pushed_at": "2021-01-21T08:08:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-35713.json
Normal file
25
2020/CVE-2020-35713.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 331538426,
|
||||
"name": "CVE-2020-35713",
|
||||
"full_name": "Al1ex\/CVE-2020-35713",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-35713",
|
||||
"description": "CVE-2020-35713",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T06:39:58Z",
|
||||
"updated_at": "2021-01-21T06:40:17Z",
|
||||
"pushed_at": "2021-01-21T06:40:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3130.json
Normal file
25
2021/CVE-2021-3130.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 331557374,
|
||||
"name": "CVE-2021-3130",
|
||||
"full_name": "jet-pentest\/CVE-2021-3130",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3130",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T08:04:32Z",
|
||||
"updated_at": "2021-01-21T08:06:09Z",
|
||||
"pushed_at": "2021-01-21T08:06:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
53
README.md
53
README.md
|
@ -35,6 +35,14 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
|||
|
||||
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
|
||||
|
||||
### CVE-2021-3130 (2021-01-20)
|
||||
|
||||
<code>
|
||||
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2021-3130](https://github.com/jet-pentest/CVE-2021-3130)
|
||||
|
||||
### CVE-2021-3131 (2021-01-13)
|
||||
|
||||
<code>
|
||||
|
@ -178,9 +186,6 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
|
|||
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
|
||||
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
|
||||
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
|
||||
- [dlee35/curveball_lua](https://github.com/dlee35/curveball_lua)
|
||||
- [IIICTECH/-CVE-2020-0601-ECC---EXPLOIT](https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT)
|
||||
- [Ash112121/CVE-2020-0601](https://github.com/Ash112121/CVE-2020-0601)
|
||||
- [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball)
|
||||
- [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall)
|
||||
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
|
||||
|
@ -2952,6 +2957,14 @@ The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x8
|
|||
|
||||
- [uf0o/CVE-2020-17382](https://github.com/uf0o/CVE-2020-17382)
|
||||
|
||||
### CVE-2020-17456 (2020-08-19)
|
||||
|
||||
<code>
|
||||
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2020-17456](https://github.com/Al1ex/CVE-2020-17456)
|
||||
|
||||
### CVE-2020-17496 (2020-08-12)
|
||||
|
||||
<code>
|
||||
|
@ -3103,6 +3116,14 @@ ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthe
|
|||
|
||||
- [underprotection/CVE-2020-24030](https://github.com/underprotection/CVE-2020-24030)
|
||||
|
||||
### CVE-2020-24032 (2020-08-18)
|
||||
|
||||
<code>
|
||||
tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&tz=OS command injection via shell metacharacters in a timezone.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2020-24032](https://github.com/jet-pentest/CVE-2020-24032)
|
||||
|
||||
### CVE-2020-24033 (2020-10-22)
|
||||
|
||||
<code>
|
||||
|
@ -3732,6 +3753,14 @@ Arbitrary command execution can occur in Webmin through 1.962. Any user authoriz
|
|||
|
||||
- [anasbousselham/webminscan](https://github.com/anasbousselham/webminscan)
|
||||
|
||||
### CVE-2020-35713 (2020-12-25)
|
||||
|
||||
<code>
|
||||
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2020-35713](https://github.com/Al1ex/CVE-2020-35713)
|
||||
|
||||
### CVE-2020-35717 (2021-01-01)
|
||||
|
||||
<code>
|
||||
|
@ -16213,7 +16242,7 @@ diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG)
|
|||
org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.
|
||||
</code>
|
||||
|
||||
- [Michael-Main/CVE-2012-4431](https://github.com/Michael-Main/CVE-2012-4431)
|
||||
- [imjdl/CVE-2012-4431](https://github.com/imjdl/CVE-2012-4431)
|
||||
|
||||
### CVE-2012-4681 (2012-08-27)
|
||||
|
||||
|
@ -16472,14 +16501,6 @@ Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MI
|
|||
- [lol-fi/cve-2011-4862](https://github.com/lol-fi/cve-2011-4862)
|
||||
- [kpawar2410/CVE-2011-4862](https://github.com/kpawar2410/CVE-2011-4862)
|
||||
|
||||
### CVE-2011-4905 (2012-01-05)
|
||||
|
||||
<code>
|
||||
Apache ActiveMQ before 5.6.0 allows remote attackers to cause a denial of service (file-descriptor exhaustion and broker crash or hang) by sending many openwire failover:tcp:// connection requests.
|
||||
</code>
|
||||
|
||||
- [Michael-Main/CVE-2011-4905](https://github.com/Michael-Main/CVE-2011-4905)
|
||||
|
||||
### CVE-2011-4919 (2019-11-19)
|
||||
|
||||
<code>
|
||||
|
@ -16636,14 +16657,6 @@ The Android browser in Android before 2.3.4 allows remote attackers to obtain SD
|
|||
|
||||
- [thomascannon/android-cve-2010-4804](https://github.com/thomascannon/android-cve-2010-4804)
|
||||
|
||||
### CVE-2010-5327 (2017-01-13)
|
||||
|
||||
<code>
|
||||
Liferay Portal through 6.2.10 allows remote authenticated users to execute arbitrary shell commands via a crafted Velocity template.
|
||||
</code>
|
||||
|
||||
- [Michael-Main/CVE-2010-5327](https://github.com/Michael-Main/CVE-2010-5327)
|
||||
|
||||
|
||||
## 2009
|
||||
### CVE-2009-0229 (2009-06-10)
|
||||
|
|
Loading…
Reference in a new issue