mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/02/14 06:07:31
This commit is contained in:
parent
a26af957c2
commit
66826ad0e1
21 changed files with 87 additions and 87 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "[discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-03T21:44:11Z",
|
||||
"updated_at": "2020-02-09T06:25:51Z",
|
||||
"updated_at": "2020-02-13T16:43:00Z",
|
||||
"pushed_at": "2018-05-21T21:20:54Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "🔥 A checker site for MS15-034 \/ CVE-2015-1635",
|
||||
"fork": false,
|
||||
"created_at": "2015-04-15T15:05:01Z",
|
||||
"updated_at": "2019-08-18T16:42:54Z",
|
||||
"updated_at": "2020-02-13T15:38:56Z",
|
||||
"pushed_at": "2015-05-31T10:16:34Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2020-02-12T15:53:11Z",
|
||||
"updated_at": "2020-02-13T18:20:38Z",
|
||||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 257,
|
||||
"watchers": 258,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2020-02-11T22:05:09Z",
|
||||
"updated_at": "2020-02-13T18:19:11Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 610,
|
||||
"watchers_count": 610,
|
||||
"forks_count": 273,
|
||||
"forks": 273,
|
||||
"watchers": 610,
|
||||
"stargazers_count": 611,
|
||||
"watchers_count": 611,
|
||||
"forks_count": 274,
|
||||
"forks": 274,
|
||||
"watchers": 611,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Proof-of-Concept exploits for CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-20T16:35:30Z",
|
||||
"updated_at": "2020-01-21T23:26:44Z",
|
||||
"updated_at": "2020-02-13T18:20:35Z",
|
||||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
"forks_count": 197,
|
||||
"forks": 197,
|
||||
"watchers": 458,
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 459,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 425,
|
||||
"watchers_count": 425,
|
||||
"forks_count": 233,
|
||||
"forks": 233,
|
||||
"forks_count": 232,
|
||||
"forks": 232,
|
||||
"watchers": 425,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2020-02-01T07:49:02Z",
|
||||
"updated_at": "2020-02-13T18:20:36Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
|
|
|
@ -1236,8 +1236,8 @@
|
|||
"pushed_at": "2020-01-15T16:12:07Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2020-02-07T08:42:08Z",
|
||||
"updated_at": "2020-02-13T18:20:36Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 651,
|
||||
"watchers_count": 651,
|
||||
"stargazers_count": 652,
|
||||
"watchers_count": 652,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"watchers": 651,
|
||||
"watchers": 652,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2020-01-10T20:27:50Z",
|
||||
"updated_at": "2020-02-13T18:20:40Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 228,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept exploit for CVE-2017-8570",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T19:09:33Z",
|
||||
"updated_at": "2020-02-11T12:29:51Z",
|
||||
"updated_at": "2020-02-13T18:20:39Z",
|
||||
"pushed_at": "2018-01-09T19:23:43Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 168,
|
||||
"watchers": 169,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-14T10:04:39Z",
|
||||
"updated_at": "2020-02-11T12:30:02Z",
|
||||
"updated_at": "2020-02-13T18:20:37Z",
|
||||
"pushed_at": "2018-09-10T16:25:12Z",
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"forks_count": 124,
|
||||
"forks": 124,
|
||||
"watchers": 301,
|
||||
"watchers": 302,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2014,13 +2014,13 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2020-01-21T00:42:30Z",
|
||||
"updated_at": "2020-02-13T18:42:35Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 261,
|
||||
"watchers": 262,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-17564 Apache Dubbo deserialization RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-13T01:40:50Z",
|
||||
"updated_at": "2020-02-13T05:58:04Z",
|
||||
"updated_at": "2020-02-13T17:54:24Z",
|
||||
"pushed_at": "2020-02-13T01:42:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T02:41:44Z",
|
||||
"updated_at": "2020-02-12T19:23:14Z",
|
||||
"updated_at": "2020-02-13T15:13:49Z",
|
||||
"pushed_at": "2020-02-07T17:58:39Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2020-02-13T01:43:42Z",
|
||||
"updated_at": "2020-02-13T20:14:38Z",
|
||||
"pushed_at": "2020-02-07T21:21:45Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-30T00:11:20Z",
|
||||
"updated_at": "2020-02-10T11:22:13Z",
|
||||
"updated_at": "2020-02-13T17:14:52Z",
|
||||
"pushed_at": "2020-02-06T15:02:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -726,13 +726,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2020-02-13T12:03:46Z",
|
||||
"pushed_at": "2020-02-12T16:53:30Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 48,
|
||||
"updated_at": "2020-02-13T16:54:52Z",
|
||||
"pushed_at": "2020-02-13T16:54:50Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2020-02-13T14:21:40Z",
|
||||
"updated_at": "2020-02-13T20:09:08Z",
|
||||
"pushed_at": "2020-02-11T21:34:28Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 98,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept code for CVE-2020-0728",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-12T22:32:28Z",
|
||||
"updated_at": "2020-02-13T15:02:19Z",
|
||||
"updated_at": "2020-02-13T20:08:54Z",
|
||||
"pushed_at": "2020-02-12T22:50:22Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-18T07:14:34Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T13:57:14Z",
|
||||
"updated_at": "2020-02-13T14:56:38Z",
|
||||
"updated_at": "2020-02-13T16:01:00Z",
|
||||
"pushed_at": "2020-02-13T12:56:31Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:22:51Z",
|
||||
"updated_at": "2020-02-13T12:33:11Z",
|
||||
"updated_at": "2020-02-13T17:27:22Z",
|
||||
"pushed_at": "2020-02-13T00:52:51Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Reference in a new issue