mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/02/24 18:08:54
This commit is contained in:
parent
ff4527ea9f
commit
665ccef3ea
35 changed files with 154 additions and 154 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-22T23:03:30Z",
|
||||
"updated_at": "2021-02-16T01:19:18Z",
|
||||
"updated_at": "2021-02-24T05:29:30Z",
|
||||
"pushed_at": "2016-06-23T00:47:50Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 110,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -358,13 +358,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-02-18T14:53:12Z",
|
||||
"updated_at": "2021-02-24T07:20:01Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 264,
|
||||
"watchers": 265,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,8 +128,8 @@
|
|||
"description": "Anaysis cve-2017-11176 \/ mq_notify issue",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T05:01:34Z",
|
||||
"updated_at": "2021-02-23T08:49:17Z",
|
||||
"pushed_at": "2021-02-23T08:49:15Z",
|
||||
"updated_at": "2021-02-24T08:13:21Z",
|
||||
"pushed_at": "2021-02-24T08:13:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2021-02-16T09:49:31Z",
|
||||
"updated_at": "2021-02-24T09:06:57Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 688,
|
||||
"watchers_count": 688,
|
||||
"stargazers_count": 689,
|
||||
"watchers_count": 689,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 688,
|
||||
"watchers": 689,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2018-04-28T04:47:05Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Running CVE-2017-8759 exploit sample.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T09:50:04Z",
|
||||
"updated_at": "2021-02-15T02:11:37Z",
|
||||
"updated_at": "2021-02-24T08:50:34Z",
|
||||
"pushed_at": "2020-01-23T06:53:00Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-14T21:07:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-13379",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-11T09:44:37Z",
|
||||
"updated_at": "2021-02-23T11:19:14Z",
|
||||
"updated_at": "2021-02-24T07:54:59Z",
|
||||
"pushed_at": "2019-08-14T08:40:25Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 220,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-14T18:51:50Z",
|
||||
"updated_at": "2021-02-19T04:22:34Z",
|
||||
"updated_at": "2021-02-24T08:45:44Z",
|
||||
"pushed_at": "2018-09-27T07:32:19Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 217,
|
||||
"watchers": 220,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -484,20 +484,20 @@
|
|||
},
|
||||
{
|
||||
"id": 175778651,
|
||||
"name": "drupalgeddon2",
|
||||
"full_name": "madneal\/drupalgeddon2",
|
||||
"name": "codeql-scanner",
|
||||
"full_name": "madneal\/codeql-scanner",
|
||||
"owner": {
|
||||
"login": "madneal",
|
||||
"id": 12164075,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12164075?v=4",
|
||||
"html_url": "https:\/\/github.com\/madneal"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/madneal\/drupalgeddon2",
|
||||
"html_url": "https:\/\/github.com\/madneal\/codeql-scanner",
|
||||
"description": "The exploit python script for CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-15T08:24:27Z",
|
||||
"updated_at": "2019-03-18T05:26:08Z",
|
||||
"pushed_at": "2019-03-18T05:26:07Z",
|
||||
"updated_at": "2021-02-24T07:40:23Z",
|
||||
"pushed_at": "2021-02-24T07:40:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2021-02-09T20:35:17Z",
|
||||
"updated_at": "2021-02-24T06:37:34Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 349,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2037,13 +2037,13 @@
|
|||
"description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-07T05:15:23Z",
|
||||
"updated_at": "2020-11-17T15:10:29Z",
|
||||
"updated_at": "2021-02-24T06:54:35Z",
|
||||
"pushed_at": "2019-09-20T04:53:41Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-06-13T09:55:07Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-02-23T18:28:09Z",
|
||||
"updated_at": "2021-02-24T08:30:09Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2350,
|
||||
"watchers_count": 2350,
|
||||
"stargazers_count": 2352,
|
||||
"watchers_count": 2352,
|
||||
"forks_count": 664,
|
||||
"forks": 664,
|
||||
"watchers": 2350,
|
||||
"watchers": 2352,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-23T10:06:38Z",
|
||||
"updated_at": "2021-02-24T09:09:53Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 923,
|
||||
"watchers_count": 923,
|
||||
"stargazers_count": 924,
|
||||
"watchers_count": 924,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 923,
|
||||
"watchers": 924,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-02-18T14:53:12Z",
|
||||
"updated_at": "2021-02-24T07:20:01Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 264,
|
||||
"watchers": 265,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2019-2890 WebLogic 反序列化RCE漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-08T05:03:32Z",
|
||||
"updated_at": "2020-11-27T18:21:20Z",
|
||||
"updated_at": "2021-02-24T06:35:56Z",
|
||||
"pushed_at": "2019-12-08T05:50:42Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 39,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-3992 & CVE-2019-5544",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T15:15:22Z",
|
||||
"updated_at": "2021-02-23T07:38:10Z",
|
||||
"updated_at": "2021-02-24T06:29:01Z",
|
||||
"pushed_at": "2021-02-05T06:40:50Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2021-02-16T11:45:47Z",
|
||||
"updated_at": "2021-02-24T03:19:48Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 262,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-02-23T16:29:49Z",
|
||||
"updated_at": "2021-02-24T07:02:13Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1082,
|
||||
"watchers_count": 1082,
|
||||
"stargazers_count": 1083,
|
||||
"watchers_count": 1083,
|
||||
"forks_count": 359,
|
||||
"forks": 359,
|
||||
"watchers": 1082,
|
||||
"watchers": 1083,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-08T11:08:35Z",
|
||||
"updated_at": "2020-10-27T03:17:17Z",
|
||||
"updated_at": "2021-02-24T08:23:32Z",
|
||||
"pushed_at": "2020-04-12T13:38:19Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-02-23T18:28:09Z",
|
||||
"updated_at": "2021-02-24T08:30:09Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2350,
|
||||
"watchers_count": 2350,
|
||||
"stargazers_count": 2352,
|
||||
"watchers_count": 2352,
|
||||
"forks_count": 664,
|
||||
"forks": 664,
|
||||
"watchers": 2350,
|
||||
"watchers": 2352,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020–14882 by Jang",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T21:28:12Z",
|
||||
"updated_at": "2021-01-20T16:41:43Z",
|
||||
"updated_at": "2021-02-24T06:37:09Z",
|
||||
"pushed_at": "2020-10-29T03:57:09Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 28,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-17008 splWOW64 Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-24T04:00:29Z",
|
||||
"updated_at": "2021-02-06T15:19:36Z",
|
||||
"updated_at": "2021-02-24T06:38:39Z",
|
||||
"pushed_at": "2020-12-24T06:02:53Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weaponized tool for CVE-2020-17144",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T20:57:16Z",
|
||||
"updated_at": "2021-02-18T02:03:58Z",
|
||||
"updated_at": "2021-02-24T06:38:16Z",
|
||||
"pushed_at": "2020-12-09T20:57:32Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 116,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -339,8 +339,8 @@
|
|||
"pushed_at": "2020-03-01T02:43:03Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-23T10:06:38Z",
|
||||
"updated_at": "2021-02-24T09:09:53Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 923,
|
||||
"watchers_count": 923,
|
||||
"stargazers_count": 924,
|
||||
"watchers_count": 924,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 923,
|
||||
"watchers": 924,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2020-2551 POC to use in Internet",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T02:56:12Z",
|
||||
"updated_at": "2021-01-13T09:07:37Z",
|
||||
"updated_at": "2021-02-24T04:39:35Z",
|
||||
"pushed_at": "2020-05-26T06:58:10Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "osCommerce Phoenix CE <=1.0.5.4 Authenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-30T13:59:23Z",
|
||||
"updated_at": "2020-11-02T01:58:47Z",
|
||||
"updated_at": "2021-02-24T06:37:06Z",
|
||||
"pushed_at": "2020-10-30T14:18:06Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-3992 & CVE-2019-5544",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T15:15:22Z",
|
||||
"updated_at": "2021-02-23T07:38:10Z",
|
||||
"updated_at": "2021-02-24T06:29:01Z",
|
||||
"pushed_at": "2021-02-05T06:40:50Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-12T09:21:02Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-16T16:55:46Z",
|
||||
"updated_at": "2021-02-23T11:49:39Z",
|
||||
"updated_at": "2021-02-24T09:04:01Z",
|
||||
"pushed_at": "2021-02-16T16:59:09Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T14:38:05Z",
|
||||
"updated_at": "2021-02-19T05:08:07Z",
|
||||
"updated_at": "2021-02-24T08:36:35Z",
|
||||
"pushed_at": "2021-02-10T14:39:04Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-12T18:53:37Z",
|
||||
"updated_at": "2021-02-22T01:48:01Z",
|
||||
"updated_at": "2021-02-24T07:49:18Z",
|
||||
"pushed_at": "2021-02-15T14:32:06Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-02-24T00:49:25Z",
|
||||
"updated_at": "2021-02-24T03:54:13Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-02-23T07:34:48Z",
|
||||
"updated_at": "2021-02-24T08:51:03Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "cve-2021-3156;sudo堆溢出漏洞;漏洞检测",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T02:20:24Z",
|
||||
"updated_at": "2021-02-06T07:43:09Z",
|
||||
"updated_at": "2021-02-24T04:57:46Z",
|
||||
"pushed_at": "2021-01-28T02:21:30Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -657,13 +657,13 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-02-23T23:52:27Z",
|
||||
"updated_at": "2021-02-24T08:53:06Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -726,13 +726,13 @@
|
|||
"description": "CVE-2021-3156漏洞复现",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-07T11:09:51Z",
|
||||
"updated_at": "2021-02-13T21:29:26Z",
|
||||
"updated_at": "2021-02-24T04:59:21Z",
|
||||
"pushed_at": "2021-02-07T11:10:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -818,13 +818,13 @@
|
|||
"description": "CVE-2021-3156非交互式执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T19:25:18Z",
|
||||
"updated_at": "2021-02-23T02:11:20Z",
|
||||
"updated_at": "2021-02-24T07:09:23Z",
|
||||
"pushed_at": "2021-02-09T19:31:33Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 116,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -8773,7 +8773,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
|
|||
- [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE)
|
||||
- [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600)
|
||||
- [cved-sources/cve-2018-7600](https://github.com/cved-sources/cve-2018-7600)
|
||||
- [madneal/drupalgeddon2](https://github.com/madneal/drupalgeddon2)
|
||||
- [madneal/codeql-scanner](https://github.com/madneal/codeql-scanner)
|
||||
- [drugeddon/drupal-exploit](https://github.com/drugeddon/drupal-exploit)
|
||||
- [shellord/Drupalgeddon-Mass-Exploiter](https://github.com/shellord/Drupalgeddon-Mass-Exploiter)
|
||||
- [zhzyker/CVE-2018-7600-Drupal-POC-EXP](https://github.com/zhzyker/CVE-2018-7600-Drupal-POC-EXP)
|
||||
|
|
Loading…
Add table
Reference in a new issue