mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/03/02 00:08:02
This commit is contained in:
parent
4f564223c3
commit
75f93bb4ad
25 changed files with 231 additions and 135 deletions
|
@ -21,5 +21,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185906522,
|
||||
"name": "cve-2011-1473",
|
||||
"full_name": "zjt674449039\/cve-2011-1473",
|
||||
"owner": {
|
||||
"login": "zjt674449039",
|
||||
"id": 47102219,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/47102219?v=4",
|
||||
"html_url": "https:\/\/github.com\/zjt674449039"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zjt674449039\/cve-2011-1473",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-10T02:42:13Z",
|
||||
"updated_at": "2019-05-10T05:50:12Z",
|
||||
"pushed_at": "2019-05-10T05:50:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 80754018,
|
||||
"name": "GO-CVE-2011-4862",
|
||||
"full_name": "hdbreaker\/GO-CVE-2011-4862",
|
||||
"owner": {
|
||||
"login": "hdbreaker",
|
||||
"id": 5799585,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5799585?v=4",
|
||||
"html_url": "https:\/\/github.com\/hdbreaker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hdbreaker\/GO-CVE-2011-4862",
|
||||
"description": "Go Exploit for CVE-2011-4862",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-02T18:12:56Z",
|
||||
"updated_at": "2019-10-22T07:01:17Z",
|
||||
"pushed_at": "2017-02-02T18:19:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 159565645,
|
||||
"name": "cve-2011-4862",
|
||||
|
@ -21,5 +44,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 238652146,
|
||||
"name": "CVE-2011-4862",
|
||||
"full_name": "kpawar2410\/CVE-2011-4862",
|
||||
"owner": {
|
||||
"login": "kpawar2410",
|
||||
"id": 51210677,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51210677?v=4",
|
||||
"html_url": "https:\/\/github.com\/kpawar2410"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kpawar2410\/CVE-2011-4862",
|
||||
"description": "Final Project for Security and Privacy CS 600.443",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-06T09:30:45Z",
|
||||
"updated_at": "2020-02-12T04:52:15Z",
|
||||
"pushed_at": "2020-02-12T04:52:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"updated_at": "2020-03-01T11:20:22Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 239,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"updated_at": "2020-03-01T11:20:22Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 239,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2017-03-15T20:25:40Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-03T20:47:08Z",
|
||||
"updated_at": "2018-02-10T10:28:17Z",
|
||||
"updated_at": "2020-03-01T09:54:21Z",
|
||||
"pushed_at": "2018-02-10T02:17:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-11-02T03:11:27Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-22T05:31:13Z",
|
||||
"updated_at": "2020-02-17T21:37:49Z",
|
||||
"updated_at": "2020-03-01T13:10:08Z",
|
||||
"pushed_at": "2018-02-25T08:49:07Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"updated_at": "2020-03-01T11:20:22Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 239,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2020-02-25T19:21:27Z",
|
||||
"updated_at": "2020-03-01T13:26:36Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 653,
|
||||
"watchers_count": 653,
|
||||
"stargazers_count": 654,
|
||||
"watchers_count": 654,
|
||||
"forks_count": 172,
|
||||
"forks": 172,
|
||||
"watchers": 653,
|
||||
"watchers": 654,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T13:40:10Z",
|
||||
"updated_at": "2019-04-04T17:14:49Z",
|
||||
"updated_at": "2020-03-01T10:00:36Z",
|
||||
"pushed_at": "2018-11-14T02:40:24Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"updated_at": "2020-03-01T11:20:22Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 239,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T19:34:17Z",
|
||||
"updated_at": "2020-02-09T08:14:49Z",
|
||||
"updated_at": "2020-03-01T09:47:41Z",
|
||||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 359,
|
||||
"watchers": 360,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"forks_count": 173,
|
||||
"forks": 173,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 287,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1144,8 +1144,8 @@
|
|||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1084,
|
||||
"watchers_count": 1084,
|
||||
"forks_count": 362,
|
||||
"forks": 362,
|
||||
"forks_count": 363,
|
||||
"forks": 363,
|
||||
"watchers": 1084,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -726,13 +726,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2020-02-19T15:07:14Z",
|
||||
"updated_at": "2020-03-01T13:47:44Z",
|
||||
"pushed_at": "2020-02-13T16:54:50Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-02-25T08:42:03Z",
|
||||
"updated_at": "2020-03-01T11:20:34Z",
|
||||
"pushed_at": "2019-06-24T06:06:48Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 492,
|
||||
"watchers_count": 492,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 493,
|
||||
"watchers": 492,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-29T15:19:36Z",
|
||||
"updated_at": "2020-03-01T11:20:22Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 239,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-27T19:06:14Z",
|
||||
"updated_at": "2019-11-29T06:51:16Z",
|
||||
"updated_at": "2020-03-01T14:38:32Z",
|
||||
"pushed_at": "2019-05-28T02:55:03Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A small python script that checks for CVE-2019-8446",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-29T04:29:02Z",
|
||||
"updated_at": "2020-02-29T20:50:33Z",
|
||||
"updated_at": "2020-03-01T13:37:35Z",
|
||||
"pushed_at": "2020-02-29T20:50:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Demo Android application for CVE-2019-9465",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T13:57:11Z",
|
||||
"updated_at": "2020-03-01T08:07:32Z",
|
||||
"updated_at": "2020-03-01T09:13:03Z",
|
||||
"pushed_at": "2020-02-19T13:57:29Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-11T09:08:02Z",
|
||||
"updated_at": "2020-02-28T10:06:31Z",
|
||||
"updated_at": "2020-03-01T09:27:09Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2020-03-01T07:01:58Z",
|
||||
"updated_at": "2020-03-01T12:57:05Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 132,
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 133,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-25T23:44:16Z",
|
||||
"updated_at": "2020-02-29T16:33:52Z",
|
||||
"updated_at": "2020-03-01T13:46:51Z",
|
||||
"pushed_at": "2020-02-26T00:58:39Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 128,
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 129,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2020-03-01T07:46:56Z",
|
||||
"updated_at": "2020-03-01T14:42:39Z",
|
||||
"pushed_at": "2020-02-27T02:54:58Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 115,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T13:53:46Z",
|
||||
"updated_at": "2020-03-01T02:29:31Z",
|
||||
"updated_at": "2020-03-01T14:56:16Z",
|
||||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 39,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,36 @@
|
|||
"description": "CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T17:03:53Z",
|
||||
"updated_at": "2020-02-29T15:34:30Z",
|
||||
"updated_at": "2020-03-01T12:06:45Z",
|
||||
"pushed_at": "2020-02-28T17:07:15Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 244149446,
|
||||
"name": "CVE-2020-0688",
|
||||
"full_name": "zcgonvh\/CVE-2020-0688",
|
||||
"owner": {
|
||||
"login": "zcgonvh",
|
||||
"id": 25787677,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4",
|
||||
"html_url": "https:\/\/github.com\/zcgonvh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2020-0688",
|
||||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-03-01T14:57:50Z",
|
||||
"pushed_at": "2020-03-01T12:58:01Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CNVD-2020-10487\/CVE-2020-1938,批量扫描工具",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T21:00:15Z",
|
||||
"updated_at": "2020-03-01T04:06:22Z",
|
||||
"updated_at": "2020-03-01T13:45:04Z",
|
||||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 135,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T07:48:50Z",
|
||||
"updated_at": "2020-02-22T17:43:58Z",
|
||||
"updated_at": "2020-03-01T11:45:22Z",
|
||||
"pushed_at": "2020-02-21T10:19:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,13 +289,13 @@
|
|||
"description": "CNVD-2020-10487 OR CVE-2020-1938 批量验证脚本,批量验证,并自动截图,方便提交及复核",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T13:25:57Z",
|
||||
"updated_at": "2020-02-24T08:18:04Z",
|
||||
"updated_at": "2020-03-01T09:55:08Z",
|
||||
"pushed_at": "2020-02-24T08:18:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": "CVE-2020-1938(GhostCat) clean and readable code version",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T01:45:23Z",
|
||||
"updated_at": "2020-03-01T02:43:05Z",
|
||||
"updated_at": "2020-03-01T12:28:07Z",
|
||||
"pushed_at": "2020-03-01T02:43:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-02-29T04:56:49Z",
|
||||
"pushed_at": "2020-02-28T03:15:41Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"updated_at": "2020-03-01T12:16:08Z",
|
||||
"pushed_at": "2020-03-01T11:27:40Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-03-01T08:26:34Z",
|
||||
"updated_at": "2020-03-01T15:07:42Z",
|
||||
"pushed_at": "2020-02-28T09:34:19Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 43,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T13:57:14Z",
|
||||
"updated_at": "2020-03-01T08:43:59Z",
|
||||
"updated_at": "2020-03-01T14:38:48Z",
|
||||
"pushed_at": "2020-02-13T12:56:31Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 63,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,6 +109,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
|
|||
- [truongtn/cve-2020-0688](https://github.com/truongtn/cve-2020-0688)
|
||||
- [onSec-fr/CVE-2020-0688-Scanner](https://github.com/onSec-fr/CVE-2020-0688-Scanner)
|
||||
- [youncyb/CVE-2020-0688](https://github.com/youncyb/CVE-2020-0688)
|
||||
- [zcgonvh/CVE-2020-0688](https://github.com/zcgonvh/CVE-2020-0688)
|
||||
|
||||
### CVE-2020-0728
|
||||
|
||||
|
@ -11615,6 +11616,7 @@ Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microso
|
|||
</code>
|
||||
|
||||
- [c826/bash-tls-reneg-attack](https://github.com/c826/bash-tls-reneg-attack)
|
||||
- [zjt674449039/cve-2011-1473](https://github.com/zjt674449039/cve-2011-1473)
|
||||
|
||||
### CVE-2011-1475
|
||||
|
||||
|
@ -11746,7 +11748,9 @@ The simplexml_load_string function in the XML import plug-in (libraries/import/x
|
|||
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
|
||||
</code>
|
||||
|
||||
- [hdbreaker/GO-CVE-2011-4862](https://github.com/hdbreaker/GO-CVE-2011-4862)
|
||||
- [lol-fi/cve-2011-4862](https://github.com/lol-fi/cve-2011-4862)
|
||||
- [kpawar2410/CVE-2011-4862](https://github.com/kpawar2410/CVE-2011-4862)
|
||||
|
||||
### CVE-2011-4872
|
||||
|
||||
|
|
Loading…
Reference in a new issue