mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/09/29 06:09:04
This commit is contained in:
parent
00645ba0fa
commit
69fa20230e
17 changed files with 104 additions and 48 deletions
|
@ -128,13 +128,13 @@
|
|||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T06:14:28Z",
|
||||
"updated_at": "2020-09-28T14:29:52Z",
|
||||
"updated_at": "2020-09-28T15:26:33Z",
|
||||
"pushed_at": "2018-01-03T00:42:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2018/CVE-2018-5353.json
Normal file
25
2018/CVE-2018-5353.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 299399882,
|
||||
"name": "CVE-2018-5353",
|
||||
"full_name": "missing0x00\/CVE-2018-5353",
|
||||
"owner": {
|
||||
"login": "missing0x00",
|
||||
"id": 29318503,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29318503?v=4",
|
||||
"html_url": "https:\/\/github.com\/missing0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/missing0x00\/CVE-2018-5353",
|
||||
"description": "CVE-2018-5353",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-28T18:38:26Z",
|
||||
"updated_at": "2020-09-28T20:13:00Z",
|
||||
"pushed_at": "2020-09-28T20:09:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-5354.json
Normal file
25
2018/CVE-2018-5354.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 299421954,
|
||||
"name": "CVE-2018-5354",
|
||||
"full_name": "missing0x00\/CVE-2018-5354",
|
||||
"owner": {
|
||||
"login": "missing0x00",
|
||||
"id": 29318503,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29318503?v=4",
|
||||
"html_url": "https:\/\/github.com\/missing0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/missing0x00\/CVE-2018-5354",
|
||||
"description": "CVE-2018-5354",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-28T20:17:50Z",
|
||||
"updated_at": "2020-09-28T20:51:00Z",
|
||||
"pushed_at": "2020-09-28T20:49:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-25T03:07:08Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -2497,13 +2497,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2020-09-28T12:13:48Z",
|
||||
"updated_at": "2020-09-28T15:55:56Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 59,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2020-09-23T18:49:23Z",
|
||||
"updated_at": "2020-09-28T19:33:57Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-08T10:44:51Z",
|
||||
"updated_at": "2020-08-14T13:33:22Z",
|
||||
"updated_at": "2020-09-28T18:24:48Z",
|
||||
"pushed_at": "2019-12-08T17:55:01Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-12T19:30:03Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-08-24T19:45:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-07-20T02:20:43Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-10T02:05:53Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-28T14:37:53Z",
|
||||
"updated_at": "2020-09-28T17:46:39Z",
|
||||
"pushed_at": "2020-09-23T07:04:58Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"stargazers_count": 1073,
|
||||
"watchers_count": 1073,
|
||||
"forks_count": 224,
|
||||
"forks": 224,
|
||||
"watchers": 1072,
|
||||
"watchers": 1073,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-09-28T13:08:59Z",
|
||||
"updated_at": "2020-09-28T21:00:59Z",
|
||||
"pushed_at": "2020-09-25T15:32:01Z",
|
||||
"stargazers_count": 621,
|
||||
"watchers_count": 621,
|
||||
"stargazers_count": 623,
|
||||
"watchers_count": 623,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 621,
|
||||
"watchers": 623,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2020-09-24T12:10:24Z",
|
||||
"updated_at": "2020-09-28T16:59:19Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 141,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Hacking Artifactory with server side template injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T13:56:43Z",
|
||||
"updated_at": "2020-09-28T12:55:50Z",
|
||||
"updated_at": "2020-09-28T18:59:57Z",
|
||||
"pushed_at": "2020-03-12T06:55:39Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 22,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-03T18:49:35Z",
|
||||
"updated_at": "2020-09-25T21:11:02Z",
|
||||
"updated_at": "2020-09-28T20:13:31Z",
|
||||
"pushed_at": "2020-04-03T19:23:54Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -6468,6 +6468,12 @@ The Norton Core router prior to v237 may be susceptible to a command injection e
|
|||
|
||||
- [embedi/ble_norton_core](https://github.com/embedi/ble_norton_core)
|
||||
|
||||
### CVE-2018-5353
|
||||
- [missing0x00/CVE-2018-5353](https://github.com/missing0x00/CVE-2018-5353)
|
||||
|
||||
### CVE-2018-5354
|
||||
- [missing0x00/CVE-2018-5354](https://github.com/missing0x00/CVE-2018-5354)
|
||||
|
||||
### CVE-2018-5711
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue