mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 10:04:09 +01:00
Auto Update 2020/06/03 06:07:49
This commit is contained in:
parent
7b51fa7766
commit
7b63bade94
25 changed files with 106 additions and 82 deletions
|
@ -36,13 +36,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-06-01T09:15:47Z",
|
"updated_at": "2020-06-02T18:16:39Z",
|
||||||
"pushed_at": "2020-03-27T09:16:40Z",
|
"pushed_at": "2020-03-27T09:16:40Z",
|
||||||
"stargazers_count": 443,
|
"stargazers_count": 444,
|
||||||
"watchers_count": 443,
|
"watchers_count": 444,
|
||||||
"forks_count": 102,
|
"forks_count": 102,
|
||||||
"forks": 102,
|
"forks": 102,
|
||||||
"watchers": 443,
|
"watchers": 444,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Updates OS X 10.6.8 NTP to include patch for CVE-2014-9295",
|
"description": "Updates OS X 10.6.8 NTP to include patch for CVE-2014-9295",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2014-12-26T15:30:12Z",
|
"created_at": "2014-12-26T15:30:12Z",
|
||||||
"updated_at": "2017-11-21T23:54:08Z",
|
"updated_at": "2020-06-02T20:09:19Z",
|
||||||
"pushed_at": "2014-12-26T15:41:49Z",
|
"pushed_at": "2014-12-26T15:41:49Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 6,
|
"watchers_count": 5,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 6,
|
"watchers": 5,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-06-01T09:15:47Z",
|
"updated_at": "2020-06-02T18:16:39Z",
|
||||||
"pushed_at": "2020-03-27T09:16:40Z",
|
"pushed_at": "2020-03-27T09:16:40Z",
|
||||||
"stargazers_count": 443,
|
"stargazers_count": 444,
|
||||||
"watchers_count": 443,
|
"watchers_count": 444,
|
||||||
"forks_count": 102,
|
"forks_count": 102,
|
||||||
"forks": 102,
|
"forks": 102,
|
||||||
"watchers": 443,
|
"watchers": 444,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2016-10-27T20:23:15Z",
|
"pushed_at": "2016-10-27T20:23:15Z",
|
||||||
"stargazers_count": 73,
|
"stargazers_count": 73,
|
||||||
"watchers_count": 73,
|
"watchers_count": 73,
|
||||||
"forks_count": 35,
|
"forks_count": 34,
|
||||||
"forks": 35,
|
"forks": 34,
|
||||||
"watchers": 73,
|
"watchers": 73,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2017-09-23T05:11:45Z",
|
"pushed_at": "2017-09-23T05:11:45Z",
|
||||||
"stargazers_count": 415,
|
"stargazers_count": 415,
|
||||||
"watchers_count": 415,
|
"watchers_count": 415,
|
||||||
"forks_count": 187,
|
"forks_count": 188,
|
||||||
"forks": 187,
|
"forks": 188,
|
||||||
"watchers": 415,
|
"watchers": 415,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-06-01T09:15:47Z",
|
"updated_at": "2020-06-02T18:16:39Z",
|
||||||
"pushed_at": "2020-03-27T09:16:40Z",
|
"pushed_at": "2020-03-27T09:16:40Z",
|
||||||
"stargazers_count": 443,
|
"stargazers_count": 444,
|
||||||
"watchers_count": 443,
|
"watchers_count": 444,
|
||||||
"forks_count": 102,
|
"forks_count": 102,
|
||||||
"forks": 102,
|
"forks": 102,
|
||||||
"watchers": 443,
|
"watchers": 444,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-06-21T15:44:29Z",
|
"created_at": "2018-06-21T15:44:29Z",
|
||||||
"updated_at": "2020-05-18T10:42:37Z",
|
"updated_at": "2020-06-02T19:16:31Z",
|
||||||
"pushed_at": "2020-01-30T12:52:42Z",
|
"pushed_at": "2020-01-30T12:52:42Z",
|
||||||
"stargazers_count": 170,
|
"stargazers_count": 171,
|
||||||
"watchers_count": 170,
|
"watchers_count": 171,
|
||||||
"forks_count": 60,
|
"forks_count": 60,
|
||||||
"forks": 60,
|
"forks": 60,
|
||||||
"watchers": 170,
|
"watchers": 171,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -450,13 +450,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-06-01T09:15:47Z",
|
"updated_at": "2020-06-02T18:16:39Z",
|
||||||
"pushed_at": "2020-03-27T09:16:40Z",
|
"pushed_at": "2020-03-27T09:16:40Z",
|
||||||
"stargazers_count": 443,
|
"stargazers_count": 444,
|
||||||
"watchers_count": 443,
|
"watchers_count": 444,
|
||||||
"forks_count": 102,
|
"forks_count": 102,
|
||||||
"forks": 102,
|
"forks": 102,
|
||||||
"watchers": 443,
|
"watchers": 444,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2019-11-27T07:39:40Z",
|
"pushed_at": "2019-11-27T07:39:40Z",
|
||||||
"stargazers_count": 170,
|
"stargazers_count": 170,
|
||||||
"watchers_count": 170,
|
"watchers_count": 170,
|
||||||
"forks_count": 45,
|
"forks_count": 46,
|
||||||
"forks": 45,
|
"forks": 46,
|
||||||
"watchers": 170,
|
"watchers": 170,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "PhantomJS uses internal module: webpage, to open, close, render, and perform multiple actions on webpages, which suffers from an arbitrary file read vulnerability. The vulnerability exists in the page.open() function of the webpage module, which loads the specified URL and calls a given callback. When opening a HTML file, an attacker can supply specially crafted file content, which allows reading arbitrary files on the filesystem. The vulnerability is demonstrated by using page.render() as the function callback, resulting in the generation of a PDF or an image of the targeted file.",
|
"description": "PhantomJS uses internal module: webpage, to open, close, render, and perform multiple actions on webpages, which suffers from an arbitrary file read vulnerability. The vulnerability exists in the page.open() function of the webpage module, which loads the specified URL and calls a given callback. When opening a HTML file, an attacker can supply specially crafted file content, which allows reading arbitrary files on the filesystem. The vulnerability is demonstrated by using page.render() as the function callback, resulting in the generation of a PDF or an image of the targeted file.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-16T18:07:07Z",
|
"created_at": "2020-01-16T18:07:07Z",
|
||||||
"updated_at": "2020-01-23T15:23:36Z",
|
"updated_at": "2020-06-02T16:05:24Z",
|
||||||
"pushed_at": "2020-01-16T18:08:13Z",
|
"pushed_at": "2020-01-16T18:08:13Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2020-06-02T15:04:51Z",
|
"updated_at": "2020-06-02T15:46:35Z",
|
||||||
"pushed_at": "2020-06-01T02:34:27Z",
|
"pushed_at": "2020-06-01T02:34:27Z",
|
||||||
"stargazers_count": 851,
|
"stargazers_count": 852,
|
||||||
"watchers_count": 851,
|
"watchers_count": 852,
|
||||||
"forks_count": 198,
|
"forks_count": 198,
|
||||||
"forks": 198,
|
"forks": 198,
|
||||||
"watchers": 851,
|
"watchers": 852,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -36,13 +36,13 @@
|
||||||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-12-12T07:58:11Z",
|
"created_at": "2019-12-12T07:58:11Z",
|
||||||
"updated_at": "2020-06-02T13:08:01Z",
|
"updated_at": "2020-06-02T17:48:48Z",
|
||||||
"pushed_at": "2020-05-01T20:00:12Z",
|
"pushed_at": "2020-05-01T20:00:12Z",
|
||||||
"stargazers_count": 139,
|
"stargazers_count": 140,
|
||||||
"watchers_count": 139,
|
"watchers_count": 140,
|
||||||
"forks_count": 32,
|
"forks_count": 32,
|
||||||
"forks": 32,
|
"forks": 32,
|
||||||
"watchers": 139,
|
"watchers": 140,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-01-17T10:10:31Z",
|
"pushed_at": "2020-01-17T10:10:31Z",
|
||||||
"stargazers_count": 28,
|
"stargazers_count": 28,
|
||||||
"watchers_count": 28,
|
"watchers_count": 28,
|
||||||
"forks_count": 17,
|
"forks_count": 18,
|
||||||
"forks": 17,
|
"forks": 18,
|
||||||
"watchers": 28,
|
"watchers": 28,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -151,13 +151,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-06-01T09:15:47Z",
|
"updated_at": "2020-06-02T18:16:39Z",
|
||||||
"pushed_at": "2020-03-27T09:16:40Z",
|
"pushed_at": "2020-03-27T09:16:40Z",
|
||||||
"stargazers_count": 443,
|
"stargazers_count": 444,
|
||||||
"watchers_count": 443,
|
"watchers_count": 444,
|
||||||
"forks_count": 102,
|
"forks_count": 102,
|
||||||
"forks": 102,
|
"forks": 102,
|
||||||
"watchers": 443,
|
"watchers": 444,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,7 +13,7 @@
|
||||||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-01-09T22:30:42Z",
|
"created_at": "2019-01-09T22:30:42Z",
|
||||||
"updated_at": "2020-06-01T11:14:48Z",
|
"updated_at": "2020-06-02T15:35:39Z",
|
||||||
"pushed_at": "2019-01-22T21:00:36Z",
|
"pushed_at": "2019-01-22T21:00:36Z",
|
||||||
"stargazers_count": 578,
|
"stargazers_count": 578,
|
||||||
"watchers_count": 578,
|
"watchers_count": 578,
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
"pushed_at": "2020-06-02T07:29:20Z",
|
"pushed_at": "2020-06-02T07:29:20Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 3,
|
"watchers_count": 3,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 3,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -933,13 +933,13 @@
|
||||||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-30T11:42:56Z",
|
"created_at": "2020-03-30T11:42:56Z",
|
||||||
"updated_at": "2020-06-02T15:00:39Z",
|
"updated_at": "2020-06-02T16:54:20Z",
|
||||||
"pushed_at": "2020-04-08T19:27:07Z",
|
"pushed_at": "2020-04-08T19:27:07Z",
|
||||||
"stargazers_count": 905,
|
"stargazers_count": 906,
|
||||||
"watchers_count": 905,
|
"watchers_count": 906,
|
||||||
"forks_count": 280,
|
"forks_count": 280,
|
||||||
"forks": 280,
|
"forks": 280,
|
||||||
"watchers": 905,
|
"watchers": 906,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1347,8 +1347,8 @@
|
||||||
"description": "CVE-2020-0796-exp",
|
"description": "CVE-2020-0796-exp",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-02T12:04:53Z",
|
"created_at": "2020-06-02T12:04:53Z",
|
||||||
"updated_at": "2020-06-02T12:08:18Z",
|
"updated_at": "2020-06-02T15:18:59Z",
|
||||||
"pushed_at": "2020-06-02T12:08:13Z",
|
"pushed_at": "2020-06-02T15:18:57Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
|
|
|
@ -82,13 +82,13 @@
|
||||||
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
|
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-16T09:40:15Z",
|
"created_at": "2020-04-16T09:40:15Z",
|
||||||
"updated_at": "2020-06-02T12:42:17Z",
|
"updated_at": "2020-06-02T17:04:17Z",
|
||||||
"pushed_at": "2020-05-26T10:23:34Z",
|
"pushed_at": "2020-05-26T10:23:34Z",
|
||||||
"stargazers_count": 9,
|
"stargazers_count": 11,
|
||||||
"watchers_count": 9,
|
"watchers_count": 11,
|
||||||
"forks_count": 2,
|
"forks_count": 3,
|
||||||
"forks": 2,
|
"forks": 3,
|
||||||
"watchers": 9,
|
"watchers": 11,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-01T04:44:05Z",
|
"created_at": "2020-06-01T04:44:05Z",
|
||||||
"updated_at": "2020-06-02T15:02:57Z",
|
"updated_at": "2020-06-02T16:13:14Z",
|
||||||
"pushed_at": "2020-06-01T09:04:18Z",
|
"pushed_at": "2020-06-01T09:04:18Z",
|
||||||
"stargazers_count": 73,
|
"stargazers_count": 82,
|
||||||
"watchers_count": 73,
|
"watchers_count": 82,
|
||||||
"forks_count": 19,
|
"forks_count": 22,
|
||||||
"forks": 19,
|
"forks": 22,
|
||||||
"watchers": 73,
|
"watchers": 82,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2020-06-02T15:04:51Z",
|
"updated_at": "2020-06-02T15:46:35Z",
|
||||||
"pushed_at": "2020-06-01T02:34:27Z",
|
"pushed_at": "2020-06-01T02:34:27Z",
|
||||||
"stargazers_count": 851,
|
"stargazers_count": 852,
|
||||||
"watchers_count": 851,
|
"watchers_count": 852,
|
||||||
"forks_count": 198,
|
"forks_count": 198,
|
||||||
"forks": 198,
|
"forks": 198,
|
||||||
"watchers": 851,
|
"watchers": 852,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -21,5 +21,28 @@
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 17,
|
"watchers": 17,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 268869147,
|
||||||
|
"name": "CVE-2020-12078",
|
||||||
|
"full_name": "84KaliPleXon3\/CVE-2020-12078",
|
||||||
|
"owner": {
|
||||||
|
"login": "84KaliPleXon3",
|
||||||
|
"id": 59977956,
|
||||||
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59977956?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/84KaliPleXon3"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/84KaliPleXon3\/CVE-2020-12078",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2020-06-02T17:44:07Z",
|
||||||
|
"updated_at": "2020-06-02T17:44:22Z",
|
||||||
|
"pushed_at": "2020-06-02T17:44:19Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,7 +13,7 @@
|
||||||
"description": "A proof-of-concept for CVE-2020-12753",
|
"description": "A proof-of-concept for CVE-2020-12753",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-01T21:58:42Z",
|
"created_at": "2020-06-01T21:58:42Z",
|
||||||
"updated_at": "2020-06-02T14:38:31Z",
|
"updated_at": "2020-06-02T16:54:46Z",
|
||||||
"pushed_at": "2020-06-01T22:55:46Z",
|
"pushed_at": "2020-06-01T22:55:46Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 6,
|
"watchers_count": 6,
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2020-06-01T09:15:47Z",
|
"updated_at": "2020-06-02T18:16:39Z",
|
||||||
"pushed_at": "2020-03-27T09:16:40Z",
|
"pushed_at": "2020-03-27T09:16:40Z",
|
||||||
"stargazers_count": 443,
|
"stargazers_count": 444,
|
||||||
"watchers_count": 443,
|
"watchers_count": 444,
|
||||||
"forks_count": 102,
|
"forks_count": 102,
|
||||||
"forks": 102,
|
"forks": 102,
|
||||||
"watchers": 443,
|
"watchers": 444,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,13 +13,13 @@
|
||||||
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
|
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-01T18:26:32Z",
|
"created_at": "2020-06-01T18:26:32Z",
|
||||||
"updated_at": "2020-06-02T15:05:50Z",
|
"updated_at": "2020-06-02T17:54:36Z",
|
||||||
"pushed_at": "2020-06-02T08:30:22Z",
|
"pushed_at": "2020-06-02T08:30:22Z",
|
||||||
"stargazers_count": 24,
|
"stargazers_count": 28,
|
||||||
"watchers_count": 24,
|
"watchers_count": 28,
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"forks": 13,
|
"forks": 13,
|
||||||
"watchers": 24,
|
"watchers": 28,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -527,6 +527,7 @@ An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter inject
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [mhaskar/CVE-2020-12078](https://github.com/mhaskar/CVE-2020-12078)
|
- [mhaskar/CVE-2020-12078](https://github.com/mhaskar/CVE-2020-12078)
|
||||||
|
- [84KaliPleXon3/CVE-2020-12078](https://github.com/84KaliPleXon3/CVE-2020-12078)
|
||||||
|
|
||||||
### CVE-2020-12112
|
### CVE-2020-12112
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue