mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/08/29 18:12:03
This commit is contained in:
parent
bb60595f88
commit
8276017026
36 changed files with 182 additions and 134 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行,反弹shell的脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-27T05:02:04Z",
|
||||
"updated_at": "2021-08-27T22:24:50Z",
|
||||
"updated_at": "2021-08-29T05:19:05Z",
|
||||
"pushed_at": "2020-06-27T10:17:43Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2021-08-17T10:57:40Z",
|
||||
"updated_at": "2021-08-29T06:00:35Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"watchers": 434,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof-of-Concept exploits for CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-20T16:35:30Z",
|
||||
"updated_at": "2021-08-19T10:49:03Z",
|
||||
"updated_at": "2021-08-29T05:32:47Z",
|
||||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 488,
|
||||
"watchers_count": 488,
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 488,
|
||||
"watchers": 489,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 255,
|
||||
"watchers": 1156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 400940873,
|
||||
"name": "CVE-2017-3248",
|
||||
"full_name": "BabyTeam1024\/CVE-2017-3248",
|
||||
"owner": {
|
||||
"login": "BabyTeam1024",
|
||||
"id": 74447452,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
|
||||
"html_url": "https:\/\/github.com\/BabyTeam1024"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2017-3248",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-29T03:24:25Z",
|
||||
"updated_at": "2021-08-29T03:26:32Z",
|
||||
"pushed_at": "2021-08-29T03:26:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2021-08-27T13:33:12Z",
|
||||
"updated_at": "2021-08-29T05:58:54Z",
|
||||
"pushed_at": "2021-03-09T09:12:55Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"forks_count": 418,
|
||||
"forks": 418,
|
||||
"forks_count": 419,
|
||||
"forks": 419,
|
||||
"watchers": 440,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2021-08-13T16:41:32Z",
|
||||
"updated_at": "2021-08-29T08:32:46Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 456,
|
||||
"watchers_count": 456,
|
||||
"stargazers_count": 457,
|
||||
"watchers_count": 457,
|
||||
"forks_count": 183,
|
||||
"forks": 183,
|
||||
"watchers": 456,
|
||||
"watchers": 457,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-08-27T15:45:47Z",
|
||||
"updated_at": "2021-08-29T03:35:33Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 442,
|
||||
"watchers_count": 442,
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 442,
|
||||
"watchers": 443,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Nintendo CVE 2018-6242",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-02T05:00:05Z",
|
||||
"updated_at": "2021-08-28T17:33:15Z",
|
||||
"updated_at": "2021-08-29T06:49:35Z",
|
||||
"pushed_at": "2021-08-23T13:10:27Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T14:23:18Z",
|
||||
"updated_at": "2021-06-28T12:12:20Z",
|
||||
"updated_at": "2021-08-29T05:58:33Z",
|
||||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"watchers": 333,
|
||||
"watchers": 334,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2018-8581",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T06:08:23Z",
|
||||
"updated_at": "2021-08-17T23:47:15Z",
|
||||
"updated_at": "2021-08-29T05:57:13Z",
|
||||
"pushed_at": "2019-06-21T11:29:41Z",
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 328,
|
||||
"watchers": 329,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2589,13 +2589,13 @@
|
|||
"description": "MS CVE 2019-0708 Python Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T12:35:29Z",
|
||||
"updated_at": "2021-08-28T17:34:12Z",
|
||||
"updated_at": "2021-08-29T06:52:29Z",
|
||||
"pushed_at": "2021-08-23T03:01:48Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-06T22:34:16Z",
|
||||
"updated_at": "2021-07-07T11:27:51Z",
|
||||
"updated_at": "2021-08-29T05:53:44Z",
|
||||
"pushed_at": "2020-01-07T14:29:45Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 137,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2021-08-09T19:02:32Z",
|
||||
"updated_at": "2021-08-29T05:53:37Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 260,
|
||||
"watchers": 261,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1056,5 +1056,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 400957950,
|
||||
"name": "Ctirix_RCE-CVE-2019-19781",
|
||||
"full_name": "Vulnmachines\/Ctirix_RCE-CVE-2019-19781",
|
||||
"owner": {
|
||||
"login": "Vulnmachines",
|
||||
"id": 79006904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines\/Ctirix_RCE-CVE-2019-19781",
|
||||
"description": "Citrix ADC RCE cve-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-29T05:22:47Z",
|
||||
"updated_at": "2021-08-29T05:25:40Z",
|
||||
"pushed_at": "2021-08-29T05:25:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Drupal RCE CVE Python Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T18:44:49Z",
|
||||
"updated_at": "2021-08-28T17:34:17Z",
|
||||
"updated_at": "2021-08-29T06:52:33Z",
|
||||
"pushed_at": "2021-08-23T02:58:05Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2021-07-19T14:14:29Z",
|
||||
"updated_at": "2021-08-29T05:51:06Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2021-08-17T19:38:10Z",
|
||||
"updated_at": "2021-08-29T06:11:58Z",
|
||||
"pushed_at": "2020-02-11T21:34:28Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 256,
|
||||
"watchers": 257,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2021-08-27T10:55:49Z",
|
||||
"updated_at": "2021-08-29T05:52:49Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 274,
|
||||
"watchers": 275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -841,13 +841,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-08-26T11:26:59Z",
|
||||
"updated_at": "2021-08-29T07:35:49Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1141,
|
||||
"watchers_count": 1141,
|
||||
"stargazers_count": 1142,
|
||||
"watchers_count": 1142,
|
||||
"forks_count": 358,
|
||||
"forks": 358,
|
||||
"watchers": 1141,
|
||||
"watchers": 1142,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1554,13 +1554,13 @@
|
|||
"description": "MS CVE 2020-0796 SMB",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T17:24:42Z",
|
||||
"updated_at": "2021-08-28T17:34:14Z",
|
||||
"updated_at": "2021-08-29T06:52:30Z",
|
||||
"pushed_at": "2021-08-23T02:59:13Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T23:22:15Z",
|
||||
"updated_at": "2021-08-19T16:05:13Z",
|
||||
"updated_at": "2021-08-29T05:47:36Z",
|
||||
"pushed_at": "2020-06-17T18:10:30Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2021-08-26T19:32:23Z",
|
||||
"updated_at": "2021-08-29T05:45:55Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 234,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T05:15:05Z",
|
||||
"updated_at": "2021-08-17T10:29:52Z",
|
||||
"updated_at": "2021-08-29T05:47:08Z",
|
||||
"pushed_at": "2021-03-17T11:29:58Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T16:03:16Z",
|
||||
"updated_at": "2021-08-28T19:27:06Z",
|
||||
"updated_at": "2021-08-29T08:09:03Z",
|
||||
"pushed_at": "2021-08-15T16:41:05Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 109,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploits for CVE-2020-17382",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T18:26:32Z",
|
||||
"updated_at": "2021-07-28T06:24:09Z",
|
||||
"updated_at": "2021-08-29T05:46:00Z",
|
||||
"pushed_at": "2020-10-02T18:45:43Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-24T15:04:45Z",
|
||||
"updated_at": "2021-07-30T15:26:19Z",
|
||||
"updated_at": "2021-08-29T08:10:48Z",
|
||||
"pushed_at": "2020-08-30T21:34:41Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 25,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2021-08-27T15:16:37Z",
|
||||
"updated_at": "2021-08-29T05:51:31Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 246,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2021-08-02T10:54:54Z",
|
||||
"updated_at": "2021-08-29T05:47:34Z",
|
||||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 353,
|
||||
"watchers": 354,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T15:20:09Z",
|
||||
"updated_at": "2021-08-25T19:47:02Z",
|
||||
"updated_at": "2021-08-29T07:28:02Z",
|
||||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 186,
|
||||
"watchers": 187,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-1675 Detection Info",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T18:32:17Z",
|
||||
"updated_at": "2021-08-28T14:51:42Z",
|
||||
"updated_at": "2021-08-29T05:43:55Z",
|
||||
"pushed_at": "2021-07-07T15:43:05Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 205,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-08-27T13:26:31Z",
|
||||
"updated_at": "2021-08-29T05:43:52Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 582,
|
||||
"watchers_count": 582,
|
||||
"stargazers_count": 583,
|
||||
"watchers_count": 583,
|
||||
"forks_count": 154,
|
||||
"forks": 154,
|
||||
"watchers": 582,
|
||||
"watchers": 583,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit to SYSTEM for CVE-2021-21551",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:23:38Z",
|
||||
"updated_at": "2021-08-19T17:17:42Z",
|
||||
"updated_at": "2021-08-29T05:44:26Z",
|
||||
"pushed_at": "2021-05-20T20:33:09Z",
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 204,
|
||||
"watchers": 205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-08-15T22:01:07Z",
|
||||
"updated_at": "2021-08-29T03:24:09Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2021-08-12T17:46:53Z",
|
||||
"updated_at": "2021-08-29T07:56:40Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -10242,6 +10242,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
|
|||
- [andripwn/CVE-2019-19781](https://github.com/andripwn/CVE-2019-19781)
|
||||
- [VladRico/CVE-2019-19781](https://github.com/VladRico/CVE-2019-19781)
|
||||
- [pwn3z/CVE-2019-19781-Citrix](https://github.com/pwn3z/CVE-2019-19781-Citrix)
|
||||
- [Vulnmachines/Ctirix_RCE-CVE-2019-19781](https://github.com/Vulnmachines/Ctirix_RCE-CVE-2019-19781)
|
||||
|
||||
### CVE-2019-19844 (2019-12-18)
|
||||
|
||||
|
@ -13934,6 +13935,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
|
||||
- [ianxtianxt/CVE-2017-3248](https://github.com/ianxtianxt/CVE-2017-3248)
|
||||
- [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner)
|
||||
- [BabyTeam1024/CVE-2017-3248](https://github.com/BabyTeam1024/CVE-2017-3248)
|
||||
|
||||
### CVE-2017-3506 (2017-04-24)
|
||||
|
||||
|
|
Loading…
Reference in a new issue