mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2020/06/03 06:07:49
This commit is contained in:
parent
7b51fa7766
commit
7b63bade94
25 changed files with 106 additions and 82 deletions
2014
2016
2017
2018
2019
CVE-2019-0232.jsonCVE-2019-17221.jsonCVE-2019-17558.jsonCVE-2019-18935.jsonCVE-2019-2198.jsonCVE-2019-2618.jsonCVE-2019-6447.jsonCVE-2019-7616.json
2020
CVE-2020-0796.jsonCVE-2020-10199.jsonCVE-2020-1066.jsonCVE-2020-11444.jsonCVE-2020-12078.jsonCVE-2020-12753.jsonCVE-2020-2551.jsonCVE-2020-3956.json
README.md
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-01T09:15:47Z",
|
||||
"updated_at": "2020-06-02T18:16:39Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Updates OS X 10.6.8 NTP to include patch for CVE-2014-9295",
|
||||
"fork": false,
|
||||
"created_at": "2014-12-26T15:30:12Z",
|
||||
"updated_at": "2017-11-21T23:54:08Z",
|
||||
"updated_at": "2020-06-02T20:09:19Z",
|
||||
"pushed_at": "2014-12-26T15:41:49Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-01T09:15:47Z",
|
||||
"updated_at": "2020-06-02T18:16:39Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-10-27T20:23:15Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 187,
|
||||
"forks": 187,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-01T09:15:47Z",
|
||||
"updated_at": "2020-06-02T18:16:39Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T15:44:29Z",
|
||||
"updated_at": "2020-05-18T10:42:37Z",
|
||||
"updated_at": "2020-06-02T19:16:31Z",
|
||||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 170,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-01T09:15:47Z",
|
||||
"updated_at": "2020-06-02T18:16:39Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-27T07:39:40Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PhantomJS uses internal module: webpage, to open, close, render, and perform multiple actions on webpages, which suffers from an arbitrary file read vulnerability. The vulnerability exists in the page.open() function of the webpage module, which loads the specified URL and calls a given callback. When opening a HTML file, an attacker can supply specially crafted file content, which allows reading arbitrary files on the filesystem. The vulnerability is demonstrated by using page.render() as the function callback, resulting in the generation of a PDF or an image of the targeted file.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T18:07:07Z",
|
||||
"updated_at": "2020-01-23T15:23:36Z",
|
||||
"updated_at": "2020-06-02T16:05:24Z",
|
||||
"pushed_at": "2020-01-16T18:08:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-02T15:04:51Z",
|
||||
"updated_at": "2020-06-02T15:46:35Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 851,
|
||||
"watchers_count": 851,
|
||||
"stargazers_count": 852,
|
||||
"watchers_count": 852,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 851,
|
||||
"watchers": 852,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2020-06-02T13:08:01Z",
|
||||
"updated_at": "2020-06-02T17:48:48Z",
|
||||
"pushed_at": "2020-05-01T20:00:12Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 139,
|
||||
"watchers": 140,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-17T10:10:31Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-01T09:15:47Z",
|
||||
"updated_at": "2020-06-02T18:16:39Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2020-06-01T11:14:48Z",
|
||||
"updated_at": "2020-06-02T15:35:39Z",
|
||||
"pushed_at": "2019-01-22T21:00:36Z",
|
||||
"stargazers_count": 578,
|
||||
"watchers_count": 578,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-02T07:29:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -933,13 +933,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-06-02T15:00:39Z",
|
||||
"updated_at": "2020-06-02T16:54:20Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 905,
|
||||
"watchers_count": 905,
|
||||
"stargazers_count": 906,
|
||||
"watchers_count": 906,
|
||||
"forks_count": 280,
|
||||
"forks": 280,
|
||||
"watchers": 905,
|
||||
"watchers": 906,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1347,8 +1347,8 @@
|
|||
"description": "CVE-2020-0796-exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-02T12:04:53Z",
|
||||
"updated_at": "2020-06-02T12:08:18Z",
|
||||
"pushed_at": "2020-06-02T12:08:13Z",
|
||||
"updated_at": "2020-06-02T15:18:59Z",
|
||||
"pushed_at": "2020-06-02T15:18:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T09:40:15Z",
|
||||
"updated_at": "2020-06-02T12:42:17Z",
|
||||
"updated_at": "2020-06-02T17:04:17Z",
|
||||
"pushed_at": "2020-05-26T10:23:34Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T04:44:05Z",
|
||||
"updated_at": "2020-06-02T15:02:57Z",
|
||||
"updated_at": "2020-06-02T16:13:14Z",
|
||||
"pushed_at": "2020-06-01T09:04:18Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 73,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-06-02T15:04:51Z",
|
||||
"updated_at": "2020-06-02T15:46:35Z",
|
||||
"pushed_at": "2020-06-01T02:34:27Z",
|
||||
"stargazers_count": 851,
|
||||
"watchers_count": 851,
|
||||
"stargazers_count": 852,
|
||||
"watchers_count": 852,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 851,
|
||||
"watchers": 852,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 268869147,
|
||||
"name": "CVE-2020-12078",
|
||||
"full_name": "84KaliPleXon3\/CVE-2020-12078",
|
||||
"owner": {
|
||||
"login": "84KaliPleXon3",
|
||||
"id": 59977956,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59977956?v=4",
|
||||
"html_url": "https:\/\/github.com\/84KaliPleXon3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/84KaliPleXon3\/CVE-2020-12078",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-06-02T17:44:07Z",
|
||||
"updated_at": "2020-06-02T17:44:22Z",
|
||||
"pushed_at": "2020-06-02T17:44:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A proof-of-concept for CVE-2020-12753",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T21:58:42Z",
|
||||
"updated_at": "2020-06-02T14:38:31Z",
|
||||
"updated_at": "2020-06-02T16:54:46Z",
|
||||
"pushed_at": "2020-06-01T22:55:46Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-06-01T09:15:47Z",
|
||||
"updated_at": "2020-06-02T18:16:39Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T18:26:32Z",
|
||||
"updated_at": "2020-06-02T15:05:50Z",
|
||||
"updated_at": "2020-06-02T17:54:36Z",
|
||||
"pushed_at": "2020-06-02T08:30:22Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 24,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -527,6 +527,7 @@ An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter inject
|
|||
</code>
|
||||
|
||||
- [mhaskar/CVE-2020-12078](https://github.com/mhaskar/CVE-2020-12078)
|
||||
- [84KaliPleXon3/CVE-2020-12078](https://github.com/84KaliPleXon3/CVE-2020-12078)
|
||||
|
||||
### CVE-2020-12112
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue