mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2020/07/07 18:09:41
This commit is contained in:
parent
d414e96338
commit
61daa22dd4
34 changed files with 201 additions and 177 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-06T06:03:48Z",
|
||||
"updated_at": "2020-07-07T08:04:45Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
"stargazers_count": 490,
|
||||
"watchers_count": 490,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 489,
|
||||
"watchers": 490,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apple CoreGraphics framework fails to validate the input when parsing CCITT group 3 encoded data resulting in a heap overflow condition. A small heap memory allocation can be overflowed with controlled data from the input resulting in arbitrary code execution in the context of Mobile Safari.",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-28T00:02:06Z",
|
||||
"updated_at": "2017-02-20T02:06:27Z",
|
||||
"updated_at": "2020-07-07T06:47:37Z",
|
||||
"pushed_at": "2015-01-28T00:28:36Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-06T06:03:48Z",
|
||||
"updated_at": "2020-07-07T08:04:45Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
"stargazers_count": 490,
|
||||
"watchers_count": 490,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 489,
|
||||
"watchers": 490,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Ruby On Rails unrestricted render() exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T16:16:08Z",
|
||||
"updated_at": "2020-02-27T16:01:12Z",
|
||||
"updated_at": "2020-07-07T04:23:24Z",
|
||||
"pushed_at": "2018-02-09T16:17:35Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2016-10-03T20:37:11Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-10-27T20:23:15Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "jenkins CVE-2017-1000353 POC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-12T13:24:26Z",
|
||||
"updated_at": "2020-06-23T03:33:21Z",
|
||||
"updated_at": "2020-07-07T07:58:40Z",
|
||||
"pushed_at": "2020-06-11T00:16:40Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-06T06:03:48Z",
|
||||
"updated_at": "2020-07-07T08:04:45Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
"stargazers_count": 490,
|
||||
"watchers_count": 490,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 489,
|
||||
"watchers": 490,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-06-20T15:16:39Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-24T14:46:35Z",
|
||||
"updated_at": "2020-03-06T22:29:46Z",
|
||||
"updated_at": "2020-07-07T06:20:56Z",
|
||||
"pushed_at": "2018-02-09T00:22:16Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T22:56:29Z",
|
||||
"updated_at": "2020-04-16T15:11:16Z",
|
||||
"updated_at": "2020-07-07T03:30:23Z",
|
||||
"pushed_at": "2018-06-03T18:55:07Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-06T06:03:48Z",
|
||||
"updated_at": "2020-07-07T08:04:45Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
"stargazers_count": 490,
|
||||
"watchers_count": 490,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 489,
|
||||
"watchers": 490,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2018-02-10T19:39:10Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-06-30T07:17:22Z",
|
||||
"updated_at": "2020-07-07T03:55:14Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 274,
|
||||
"watchers": 275,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -289,7 +289,7 @@
|
|||
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-04T14:25:09Z",
|
||||
"updated_at": "2020-05-21T08:01:11Z",
|
||||
"updated_at": "2020-07-07T07:52:19Z",
|
||||
"pushed_at": "2019-05-05T15:49:44Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-8174_python",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T03:12:32Z",
|
||||
"updated_at": "2020-06-29T09:48:12Z",
|
||||
"updated_at": "2020-07-07T06:03:37Z",
|
||||
"pushed_at": "2018-05-30T03:33:14Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-17T15:17:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-07-06T19:38:26Z",
|
||||
"updated_at": "2020-07-07T08:29:22Z",
|
||||
"pushed_at": "2020-07-05T03:49:23Z",
|
||||
"stargazers_count": 1169,
|
||||
"watchers_count": 1169,
|
||||
"forks_count": 289,
|
||||
"forks": 289,
|
||||
"watchers": 1169,
|
||||
"stargazers_count": 1175,
|
||||
"watchers_count": 1175,
|
||||
"forks_count": 290,
|
||||
"forks": 290,
|
||||
"watchers": 1175,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-06T06:03:48Z",
|
||||
"updated_at": "2020-07-07T08:04:45Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
"stargazers_count": 490,
|
||||
"watchers_count": 490,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 489,
|
||||
"watchers": 490,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-01-15T08:36:05Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2020-06-23T14:26:15Z",
|
||||
"updated_at": "2020-07-07T04:39:07Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-24T13:10:39Z",
|
||||
"updated_at": "2020-07-01T02:56:48Z",
|
||||
"updated_at": "2020-07-07T08:33:34Z",
|
||||
"pushed_at": "2020-03-24T13:19:34Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC of StrandHogg2 (CVE-2020-0096)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-18T09:05:49Z",
|
||||
"updated_at": "2020-07-03T13:36:20Z",
|
||||
"updated_at": "2020-07-07T05:02:06Z",
|
||||
"pushed_at": "2020-06-18T09:05:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-07-06T03:35:50Z",
|
||||
"updated_at": "2020-07-07T08:21:49Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 355,
|
||||
"watchers": 356,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Powershell SMBv3 Compression checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T09:13:48Z",
|
||||
"updated_at": "2020-05-27T09:05:35Z",
|
||||
"updated_at": "2020-07-07T09:07:56Z",
|
||||
"pushed_at": "2020-04-14T11:38:39Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -937,8 +937,8 @@
|
|||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 971,
|
||||
"watchers_count": 971,
|
||||
"forks_count": 318,
|
||||
"forks": 318,
|
||||
"forks_count": 319,
|
||||
"forks": 319,
|
||||
"watchers": 971,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1186,13 +1186,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-07-06T19:43:27Z",
|
||||
"updated_at": "2020-07-07T04:02:00Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 285,
|
||||
"watchers": 286,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1462,13 +1462,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T14:45:07Z",
|
||||
"updated_at": "2020-07-07T01:48:01Z",
|
||||
"updated_at": "2020-07-07T08:15:13Z",
|
||||
"pushed_at": "2020-07-06T19:00:06Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-23T18:45:24Z",
|
||||
"updated_at": "2020-06-27T06:49:15Z",
|
||||
"updated_at": "2020-07-07T08:51:54Z",
|
||||
"pushed_at": "2020-06-25T12:22:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-07-06T19:38:26Z",
|
||||
"updated_at": "2020-07-07T08:29:22Z",
|
||||
"pushed_at": "2020-07-05T03:49:23Z",
|
||||
"stargazers_count": 1169,
|
||||
"watchers_count": 1169,
|
||||
"forks_count": 289,
|
||||
"forks": 289,
|
||||
"watchers": 1169,
|
||||
"stargazers_count": 1175,
|
||||
"watchers_count": 1175,
|
||||
"forks_count": 290,
|
||||
"forks": 290,
|
||||
"watchers": 1175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-11651: Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T11:47:56Z",
|
||||
"updated_at": "2020-07-02T05:41:58Z",
|
||||
"updated_at": "2020-07-07T05:55:12Z",
|
||||
"pushed_at": "2020-05-05T03:27:11Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1958 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-11T13:31:02Z",
|
||||
"updated_at": "2020-05-18T10:43:49Z",
|
||||
"updated_at": "2020-07-07T08:32:35Z",
|
||||
"pushed_at": "2020-04-11T14:52:36Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-06T06:03:48Z",
|
||||
"updated_at": "2020-07-07T08:04:45Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
"stargazers_count": 490,
|
||||
"watchers_count": 490,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 489,
|
||||
"watchers": 490,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 205,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2020-2551 POC to use in Internet",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T02:56:12Z",
|
||||
"updated_at": "2020-06-27T16:27:55Z",
|
||||
"updated_at": "2020-07-07T06:26:51Z",
|
||||
"pushed_at": "2020-05-26T06:58:10Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T06:19:09Z",
|
||||
"updated_at": "2020-07-07T01:51:11Z",
|
||||
"pushed_at": "2020-07-06T18:30:35Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 22,
|
||||
"updated_at": "2020-07-07T07:23:29Z",
|
||||
"pushed_at": "2020-07-07T07:19:16Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2020-07-07T02:49:11Z",
|
||||
"updated_at": "2020-07-07T09:03:59Z",
|
||||
"pushed_at": "2020-07-07T02:49:09Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 159,
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 177,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Proof of concept for CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T17:01:27Z",
|
||||
"updated_at": "2020-07-07T02:49:43Z",
|
||||
"updated_at": "2020-07-07T09:09:56Z",
|
||||
"pushed_at": "2020-07-06T17:47:17Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 45,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T01:12:23Z",
|
||||
"updated_at": "2020-07-07T01:44:34Z",
|
||||
"updated_at": "2020-07-07T08:06:18Z",
|
||||
"pushed_at": "2020-07-06T01:36:32Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,13 +266,13 @@
|
|||
"description": "F5 Big-IP CVE-2020-5902 - LFI and RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T04:03:58Z",
|
||||
"updated_at": "2020-07-06T23:37:59Z",
|
||||
"pushed_at": "2020-07-06T04:43:25Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"updated_at": "2020-07-07T07:44:31Z",
|
||||
"pushed_at": "2020-07-07T05:22:19Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -404,13 +404,13 @@
|
|||
"description": "批量扫描CVE-2020-5902,远程代码执行,已测试",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T09:16:36Z",
|
||||
"updated_at": "2020-07-07T02:25:26Z",
|
||||
"updated_at": "2020-07-07T06:54:17Z",
|
||||
"pushed_at": "2020-07-06T09:53:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -500,8 +500,8 @@
|
|||
"pushed_at": "2020-07-06T15:53:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -542,13 +542,36 @@
|
|||
"description": "F5 BIG-IP Scanner (CVE-2020-5902)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T02:03:39Z",
|
||||
"updated_at": "2020-07-07T03:09:06Z",
|
||||
"updated_at": "2020-07-07T05:53:06Z",
|
||||
"pushed_at": "2020-07-07T02:03:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277725875,
|
||||
"name": "CVE-2020-5902-F5BIG",
|
||||
"full_name": "Any3ite\/CVE-2020-5902-F5BIG",
|
||||
"owner": {
|
||||
"login": "Any3ite",
|
||||
"id": 20638313,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20638313?v=4",
|
||||
"html_url": "https:\/\/github.com\/Any3ite"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Any3ite\/CVE-2020-5902-F5BIG",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T05:32:46Z",
|
||||
"updated_at": "2020-07-07T05:54:24Z",
|
||||
"pushed_at": "2020-07-07T05:54:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2020-07-03T09:11:22Z",
|
||||
"updated_at": "2020-07-07T03:11:53Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-06-05T21:04:43Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -691,6 +691,7 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
|
|||
- [jinnywc/CVE-2020-5902](https://github.com/jinnywc/CVE-2020-5902)
|
||||
- [GoodiesHQ/F5-Patch](https://github.com/GoodiesHQ/F5-Patch)
|
||||
- [jiansiting/CVE-2020-5902](https://github.com/jiansiting/CVE-2020-5902)
|
||||
- [Any3ite/CVE-2020-5902-F5BIG](https://github.com/Any3ite/CVE-2020-5902-F5BIG)
|
||||
|
||||
### CVE-2020-6418
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue