mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-03-31 12:25:43 +02:00
Auto Update 2019/12/20 15:30:02
This commit is contained in:
parent
f7d5dbb073
commit
717a42fcf6
43 changed files with 190 additions and 188 deletions
2007
2015
2016
2017
CVE-2017-0199.jsonCVE-2017-10271.jsonCVE-2017-11882.jsonCVE-2017-12615.jsonCVE-2017-16778.jsonCVE-2017-5124.jsonCVE-2017-7494.jsonCVE-2017-8570.jsonCVE-2017-8759.json
2018
CVE-2018-0952.jsonCVE-2018-1335.jsonCVE-2018-20250.jsonCVE-2018-4407.jsonCVE-2018-8120.jsonCVE-2018-9276.json
2019
CVE-2019-0192.jsonCVE-2019-0232.jsonCVE-2019-0708.jsonCVE-2019-11043.jsonCVE-2019-11708.jsonCVE-2019-11932.jsonCVE-2019-12409.jsonCVE-2019-1253.jsonCVE-2019-12840.jsonCVE-2019-1388.jsonCVE-2019-1476.jsonCVE-2019-17633.jsonCVE-2019-19383.jsonCVE-2019-2107.jsonCVE-2019-2215.jsonCVE-2019-2725.jsonCVE-2019-2888.jsonCVE-2019-2890.jsonCVE-2019-3396.jsonCVE-2019-5736.jsonCVE-2019-6203.jsonCVE-2019-7304.jsonCVE-2019-7609.json
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-08-03T18:49:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "ActiveMQ Deserialization RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T06:03:51Z",
|
||||
"updated_at": "2019-10-30T12:14:59Z",
|
||||
"updated_at": "2019-12-20T09:07:01Z",
|
||||
"pushed_at": "2019-08-30T06:47:20Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-13T07:14:01Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-03-29T05:23:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit code for CVE-2016-9066",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T20:08:13Z",
|
||||
"updated_at": "2019-09-02T13:38:51Z",
|
||||
"updated_at": "2019-12-20T12:22:58Z",
|
||||
"pushed_at": "2017-03-19T17:37:18Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 36,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2019-12-06T03:32:34Z",
|
||||
"updated_at": "2019-12-20T12:23:00Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 602,
|
||||
"watchers_count": 602,
|
||||
"stargazers_count": 601,
|
||||
"watchers_count": 601,
|
||||
"forks_count": 272,
|
||||
"forks": 272,
|
||||
"watchers": 602,
|
||||
"watchers": 601,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-25T03:07:53Z",
|
||||
"updated_at": "2019-12-01T03:43:44Z",
|
||||
"updated_at": "2019-12-20T09:49:29Z",
|
||||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2019-11-28T19:20:54Z",
|
||||
"updated_at": "2019-12-20T12:23:10Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 256,
|
||||
"watchers": 255,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T18:17:28Z",
|
||||
"updated_at": "2019-11-08T14:34:37Z",
|
||||
"updated_at": "2019-12-20T12:07:13Z",
|
||||
"pushed_at": "2017-11-21T20:34:57Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-23T06:15:48Z",
|
||||
"updated_at": "2019-12-03T07:50:30Z",
|
||||
"pushed_at": "2018-05-07T05:18:31Z",
|
||||
"updated_at": "2019-12-20T07:22:19Z",
|
||||
"pushed_at": "2019-12-20T07:22:17Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 20,
|
||||
|
|
25
2017/CVE-2017-16778.json
Normal file
25
2017/CVE-2017-16778.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 229211992,
|
||||
"name": "CVE-2017-16778-Intercom-DTMF-Injection",
|
||||
"full_name": "breaktoprotect\/CVE-2017-16778-Intercom-DTMF-Injection",
|
||||
"owner": {
|
||||
"login": "breaktoprotect",
|
||||
"id": 4725563,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4725563?v=4",
|
||||
"html_url": "https:\/\/github.com\/breaktoprotect"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/breaktoprotect\/CVE-2017-16778-Intercom-DTMF-Injection",
|
||||
"description": "A coordinated disclosure and security advisory on Fermax Intercom DTML Injection vulneraiblity. Special thanks to Fermax International for prompt responses and allowing details to be publicized.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-20T07:20:50Z",
|
||||
"updated_at": "2019-12-20T10:28:04Z",
|
||||
"pushed_at": "2019-12-20T10:28:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-13T21:33:55Z",
|
||||
"updated_at": "2019-10-11T19:04:21Z",
|
||||
"updated_at": "2019-12-20T12:23:09Z",
|
||||
"pushed_at": "2017-11-14T10:26:28Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 156,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2019-12-12T02:11:41Z",
|
||||
"updated_at": "2019-12-20T12:23:02Z",
|
||||
"pushed_at": "2017-11-27T16:28:14Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 184,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept exploit for CVE-2017-8570",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T19:09:33Z",
|
||||
"updated_at": "2019-12-14T13:18:44Z",
|
||||
"updated_at": "2019-12-20T12:23:12Z",
|
||||
"pushed_at": "2018-01-09T19:23:43Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 165,
|
||||
"watchers": 164,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Running CVE-2017-8759 exploit sample.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T09:50:04Z",
|
||||
"updated_at": "2019-12-05T15:51:09Z",
|
||||
"updated_at": "2019-12-20T12:23:06Z",
|
||||
"pushed_at": "2017-09-13T09:58:25Z",
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 257,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-14T10:04:39Z",
|
||||
"updated_at": "2019-12-15T08:17:18Z",
|
||||
"updated_at": "2019-12-20T12:23:07Z",
|
||||
"pushed_at": "2018-09-10T16:25:12Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"watchers": 300,
|
||||
"watchers": 298,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T20:29:10Z",
|
||||
"updated_at": "2019-10-29T20:28:43Z",
|
||||
"updated_at": "2019-12-20T08:59:57Z",
|
||||
"pushed_at": "2018-08-21T20:30:24Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "GUI版 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-20T14:38:09Z",
|
||||
"updated_at": "2019-10-21T13:15:50Z",
|
||||
"updated_at": "2019-12-20T09:49:26Z",
|
||||
"pushed_at": "2019-03-20T14:50:05Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T01:20:34Z",
|
||||
"updated_at": "2019-06-28T23:16:38Z",
|
||||
"updated_at": "2019-12-20T10:41:29Z",
|
||||
"pushed_at": "2019-03-01T13:35:59Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Messing Apple devices on the network with CVE-2018-4407 (heap overflow in bad packet handling)",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-02T08:29:29Z",
|
||||
"updated_at": "2019-12-05T09:26:13Z",
|
||||
"updated_at": "2019-12-20T08:10:24Z",
|
||||
"pushed_at": "2018-12-04T08:21:43Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-07T08:30:07Z",
|
||||
"updated_at": "2019-11-21T06:37:12Z",
|
||||
"updated_at": "2019-12-20T08:15:21Z",
|
||||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"forks_count": 110,
|
||||
"forks": 110,
|
||||
"watchers": 260,
|
||||
"watchers": 261,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-31T08:51:07Z",
|
||||
"updated_at": "2019-10-30T11:35:37Z",
|
||||
"updated_at": "2019-12-20T11:26:29Z",
|
||||
"pushed_at": "2019-03-31T08:52:24Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-10T18:33:43Z",
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 195,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat Remote Code Execution on Windows",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-15T07:54:25Z",
|
||||
"updated_at": "2019-11-27T07:39:42Z",
|
||||
"updated_at": "2019-12-20T06:47:58Z",
|
||||
"pushed_at": "2019-11-27T07:39:40Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2019-12-11T07:39:27Z",
|
||||
"updated_at": "2019-12-20T10:44:25Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"watchers": 276,
|
||||
"watchers": 277,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1301,7 +1301,7 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2019-12-19T19:00:06Z",
|
||||
"updated_at": "2019-12-20T12:23:39Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 670,
|
||||
"watchers_count": 670,
|
||||
|
@ -2267,13 +2267,13 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2019-12-14T11:44:06Z",
|
||||
"updated_at": "2019-12-20T08:12:45Z",
|
||||
"pushed_at": "2019-10-16T01:04:12Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 129,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2019-12-19T19:35:30Z",
|
||||
"updated_at": "2019-12-20T10:28:29Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1477,
|
||||
"watchers_count": 1477,
|
||||
"stargazers_count": 1479,
|
||||
"watchers_count": 1479,
|
||||
"forks_count": 204,
|
||||
"forks": 204,
|
||||
"watchers": 1477,
|
||||
"watchers": 1479,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2019-12-20T02:56:26Z",
|
||||
"updated_at": "2019-12-20T08:56:53Z",
|
||||
"pushed_at": "2019-12-10T11:26:28Z",
|
||||
"stargazers_count": 526,
|
||||
"watchers_count": 526,
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 526,
|
||||
"watchers": 527,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2019-12-18T03:27:44Z",
|
||||
"updated_at": "2019-12-20T12:23:44Z",
|
||||
"pushed_at": "2019-10-03T09:43:55Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 225,
|
||||
"watchers": 224,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2019-12-19T06:34:30Z",
|
||||
"updated_at": "2019-12-20T14:49:43Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-19T08:53:56Z",
|
||||
"updated_at": "2019-12-15T03:57:20Z",
|
||||
"updated_at": "2019-12-20T03:55:29Z",
|
||||
"pushed_at": "2019-11-19T09:18:00Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 80,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Poc for CVE-2019-1253",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T20:40:15Z",
|
||||
"updated_at": "2019-12-19T12:11:12Z",
|
||||
"updated_at": "2019-12-20T11:30:45Z",
|
||||
"pushed_at": "2019-09-12T14:43:47Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 105,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for Webmin Package Update Authenticated Remote Command Execution",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-05T19:22:45Z",
|
||||
"updated_at": "2019-12-18T17:38:26Z",
|
||||
"updated_at": "2019-12-20T08:32:17Z",
|
||||
"pushed_at": "2019-11-05T19:27:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2019-12-19T10:59:19Z",
|
||||
"updated_at": "2019-12-20T06:19:15Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "AppXSvc Arbitrary File Overwrite DoS",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-05T21:00:16Z",
|
||||
"updated_at": "2019-12-11T00:59:49Z",
|
||||
"updated_at": "2019-12-20T10:20:32Z",
|
||||
"pushed_at": "2019-12-10T18:12:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Eclipse Che CSRF leading to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-19T20:22:12Z",
|
||||
"updated_at": "2019-12-20T02:55:31Z",
|
||||
"updated_at": "2019-12-20T14:16:01Z",
|
||||
"pushed_at": "2019-12-19T20:26:14Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "FreeFTPd 1.0.8 Post-Authentication Buffer Overflow via SIZE",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-28T18:24:02Z",
|
||||
"updated_at": "2019-12-08T21:06:54Z",
|
||||
"pushed_at": "2019-11-29T09:09:04Z",
|
||||
"updated_at": "2019-12-20T09:44:09Z",
|
||||
"pushed_at": "2019-12-20T09:44:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-2107",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T14:18:33Z",
|
||||
"updated_at": "2019-12-19T10:59:55Z",
|
||||
"updated_at": "2019-12-20T06:33:19Z",
|
||||
"pushed_at": "2019-07-25T08:01:07Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 300,
|
||||
"watchers": 301,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T06:32:08Z",
|
||||
"updated_at": "2019-12-09T09:04:08Z",
|
||||
"updated_at": "2019-12-20T12:23:44Z",
|
||||
"pushed_at": "2019-11-12T03:58:00Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 45,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-25T03:07:53Z",
|
||||
"updated_at": "2019-12-01T03:43:44Z",
|
||||
"updated_at": "2019-12-20T09:49:29Z",
|
||||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-01T16:44:51Z",
|
||||
"updated_at": "2019-12-01T00:01:13Z",
|
||||
"updated_at": "2019-12-20T03:56:27Z",
|
||||
"pushed_at": "2019-11-02T10:47:46Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 29,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "0-sec.org",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-14T08:01:53Z",
|
||||
"updated_at": "2019-12-16T07:06:29Z",
|
||||
"updated_at": "2019-12-20T03:32:05Z",
|
||||
"pushed_at": "2019-12-14T08:04:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2019-11-01T14:33:21Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -45,29 +45,6 @@
|
|||
"watchers": 365,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170454928,
|
||||
"name": "cve-2019-5736",
|
||||
"full_name": "jakubkrawczyk\/cve-2019-5736",
|
||||
"owner": {
|
||||
"login": "jakubkrawczyk",
|
||||
"id": 22723539,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22723539?v=4",
|
||||
"html_url": "https:\/\/github.com\/jakubkrawczyk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jakubkrawczyk\/cve-2019-5736",
|
||||
"description": "My attempt to create PoC of CVE-2019-5736 (Docker escape)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T06:41:01Z",
|
||||
"updated_at": "2019-04-21T11:25:56Z",
|
||||
"pushed_at": "2019-02-13T06:46:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170613828,
|
||||
"name": "CVE-2019-5736",
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-17T03:10:30Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2019-12-11T20:41:29Z",
|
||||
"updated_at": "2019-12-20T08:43:49Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 495,
|
||||
"watchers_count": 495,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 495,
|
||||
"stargazers_count": 496,
|
||||
"watchers_count": 496,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 496,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T07:32:31Z",
|
||||
"updated_at": "2019-11-19T01:31:35Z",
|
||||
"pushed_at": "2019-10-21T08:05:25Z",
|
||||
"updated_at": "2019-12-20T14:28:47Z",
|
||||
"pushed_at": "2019-12-20T14:28:44Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
|
|
Loading…
Add table
Reference in a new issue