mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/05/05 12:11:01
This commit is contained in:
parent
dd6c5cdc1c
commit
7cf2abb86a
13 changed files with 40 additions and 64 deletions
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2021-04-28T06:15:31Z",
|
||||
"updated_at": "2021-05-04T22:18:58Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 649,
|
||||
"watchers_count": 649,
|
||||
"stargazers_count": 650,
|
||||
"watchers_count": 650,
|
||||
"forks_count": 288,
|
||||
"forks": 288,
|
||||
"watchers": 649,
|
||||
"watchers": 650,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T08:04:19Z",
|
||||
"updated_at": "2021-04-26T08:52:18Z",
|
||||
"updated_at": "2021-05-05T00:52:25Z",
|
||||
"pushed_at": "2018-08-28T08:06:21Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 95,
|
||||
"watchers": 97,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -458,28 +458,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 305114825,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "Elsfa7-110\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "Elsfa7-110",
|
||||
"id": 26175351,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26175351?v=4",
|
||||
"html_url": "https:\/\/github.com\/Elsfa7-110"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Elsfa7-110\/CVE-2018-6389",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-05-04T16:35:09Z",
|
||||
"pushed_at": "2021-05-04T16:34:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2021-04-02T03:02:13Z",
|
||||
"updated_at": "2021-05-05T02:20:09Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"watchers": 352,
|
||||
"watchers": 351,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,8 +174,8 @@
|
|||
"description": "GitLab Arbitrary File Read Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-02T08:45:03Z",
|
||||
"updated_at": "2021-05-03T22:18:47Z",
|
||||
"pushed_at": "2021-05-03T22:18:45Z",
|
||||
"updated_at": "2021-05-04T22:25:53Z",
|
||||
"pushed_at": "2021-05-04T22:25:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-03T09:13:51Z",
|
||||
"updated_at": "2021-05-05T02:29:36Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 722,
|
||||
"watchers": 723,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2021-04-28T23:24:16Z",
|
||||
"updated_at": "2021-05-05T02:21:37Z",
|
||||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"watchers": 346,
|
||||
"watchers": 345,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-03T09:13:51Z",
|
||||
"updated_at": "2021-05-05T02:29:36Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 722,
|
||||
"watchers": 723,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-24T22:06:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-24T22:08:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploiting a Cross-site request forgery (CSRF) attack to creat a new privileged user through the Webmin's add users feature ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T20:13:06Z",
|
||||
"updated_at": "2021-05-01T04:33:57Z",
|
||||
"updated_at": "2021-05-05T01:22:21Z",
|
||||
"pushed_at": "2021-04-24T22:05:36Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T23:47:14Z",
|
||||
"updated_at": "2021-05-04T11:28:46Z",
|
||||
"updated_at": "2021-05-05T01:30:17Z",
|
||||
"pushed_at": "2021-02-28T16:29:07Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -9739,7 +9739,6 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
|
|||
- [fakedob/tvsz](https://github.com/fakedob/tvsz)
|
||||
- [vineetkia/Wordpress-DOS-Attack-CVE-2018-6389](https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389)
|
||||
- [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389)
|
||||
- [Elsfa7-110/CVE-2018-6389](https://github.com/Elsfa7-110/CVE-2018-6389)
|
||||
|
||||
### CVE-2018-6396 (2018-02-17)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue