mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/04/13 06:15:27
This commit is contained in:
parent
31dea70ef4
commit
89c6c75543
32 changed files with 205 additions and 140 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-09T20:08:56Z",
|
||||
"updated_at": "2020-03-29T08:18:26Z",
|
||||
"updated_at": "2020-04-12T20:09:02Z",
|
||||
"pushed_at": "2018-04-07T00:30:52Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2020-03-29T08:18:18Z",
|
||||
"updated_at": "2020-04-12T20:12:49Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T00:46:19Z",
|
||||
"updated_at": "2020-04-11T19:26:35Z",
|
||||
"pushed_at": "2020-04-07T02:30:32Z",
|
||||
"updated_at": "2020-04-12T19:46:43Z",
|
||||
"pushed_at": "2020-04-12T19:46:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-06T17:55:44Z",
|
||||
"updated_at": "2020-04-10T14:32:44Z",
|
||||
"updated_at": "2020-04-12T20:11:57Z",
|
||||
"pushed_at": "2017-01-06T23:34:03Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2018-09-10T16:25:12Z",
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"forks_count": 122,
|
||||
"forks": 122,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 168,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"forks_count": 299,
|
||||
"forks": 299,
|
||||
"forks_count": 300,
|
||||
"forks": 300,
|
||||
"watchers": 326,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-26T03:41:24Z",
|
||||
"updated_at": "2020-03-30T04:24:25Z",
|
||||
"updated_at": "2020-04-12T20:14:06Z",
|
||||
"pushed_at": "2019-01-26T03:49:09Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2018/CVE-2018-19320.json
Normal file
25
2018/CVE-2018-19320.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 255170065,
|
||||
"name": "CVE-2018-19320",
|
||||
"full_name": "fdiskyou\/CVE-2018-19320",
|
||||
"owner": {
|
||||
"login": "fdiskyou",
|
||||
"id": 6840612,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6840612?v=4",
|
||||
"html_url": "https:\/\/github.com\/fdiskyou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fdiskyou\/CVE-2018-19320",
|
||||
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-12T21:06:26Z",
|
||||
"updated_at": "2020-04-12T21:12:00Z",
|
||||
"pushed_at": "2020-04-12T21:11:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"forks_count": 172,
|
||||
"forks": 172,
|
||||
"watchers": 394,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -611,13 +611,13 @@
|
|||
"description": "CVE-2018-7600【Drupa7】批量扫描工具。",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-12T07:37:14Z",
|
||||
"updated_at": "2020-04-12T14:45:44Z",
|
||||
"updated_at": "2020-04-12T17:10:10Z",
|
||||
"pushed_at": "2020-04-12T08:22:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1278,13 +1278,13 @@
|
|||
"description": "A social experiment",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T15:08:30Z",
|
||||
"updated_at": "2020-04-07T14:14:51Z",
|
||||
"updated_at": "2020-04-12T19:58:32Z",
|
||||
"pushed_at": "2019-05-29T17:12:33Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1347,13 +1347,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-04-08T10:31:46Z",
|
||||
"updated_at": "2020-04-12T19:55:05Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"stargazers_count": 706,
|
||||
"watchers_count": 706,
|
||||
"forks_count": 165,
|
||||
"forks": 165,
|
||||
"watchers": 705,
|
||||
"watchers": 706,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2179,8 +2179,8 @@
|
|||
"pushed_at": "2019-09-20T04:53:41Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T15:33:50Z",
|
||||
"updated_at": "2020-04-04T11:04:55Z",
|
||||
"updated_at": "2020-04-12T20:03:31Z",
|
||||
"pushed_at": "2020-03-23T11:22:54Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 211,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-12-16T22:32:06Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2020-04-11T19:38:33Z",
|
||||
"updated_at": "2020-04-12T15:25:45Z",
|
||||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T10:12:44Z",
|
||||
"updated_at": "2020-04-08T19:40:16Z",
|
||||
"updated_at": "2020-04-12T18:22:32Z",
|
||||
"pushed_at": "2019-02-08T12:38:05Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 186,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2020-04-06T09:50:29Z",
|
||||
"updated_at": "2020-04-12T16:46:53Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 120,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-12T15:06:31Z",
|
||||
"updated_at": "2020-04-12T18:17:09Z",
|
||||
"pushed_at": "2020-04-10T10:00:48Z",
|
||||
"stargazers_count": 409,
|
||||
"watchers_count": 409,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 409,
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 255116667,
|
||||
"name": "CVE-2019-5475-EXP",
|
||||
"full_name": "rabbitmask\/CVE-2019-5475-EXP",
|
||||
"owner": {
|
||||
"login": "rabbitmask",
|
||||
"id": 37649548,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37649548?v=4",
|
||||
"html_url": "https:\/\/github.com\/rabbitmask"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rabbitmask\/CVE-2019-5475-EXP",
|
||||
"description": "CVE-2019-5475-EXP 【Nexus Repository Manager 2.x远程命令执行漏洞】",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-12T15:49:36Z",
|
||||
"updated_at": "2020-04-12T17:09:11Z",
|
||||
"pushed_at": "2020-04-12T15:59:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T15:31:13Z",
|
||||
"updated_at": "2020-03-21T18:45:33Z",
|
||||
"updated_at": "2020-04-12T19:58:38Z",
|
||||
"pushed_at": "2019-10-23T07:10:35Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :).",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-17T17:59:26Z",
|
||||
"updated_at": "2020-03-28T13:30:35Z",
|
||||
"updated_at": "2020-04-12T16:35:52Z",
|
||||
"pushed_at": "2019-10-15T17:05:38Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 261,
|
||||
"watchers": 260,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-06T15:47:20Z",
|
||||
"updated_at": "2020-04-06T18:18:46Z",
|
||||
"updated_at": "2020-04-12T15:58:38Z",
|
||||
"pushed_at": "2019-05-08T16:22:58Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-04-10T13:16:23Z",
|
||||
"updated_at": "2020-04-12T19:17:36Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 798,
|
||||
"watchers_count": 798,
|
||||
"stargazers_count": 799,
|
||||
"watchers_count": 799,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 798,
|
||||
"watchers": 799,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-03-22T15:14:31Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-01-28T12:36:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-11T09:08:02Z",
|
||||
"updated_at": "2020-04-12T14:46:53Z",
|
||||
"updated_at": "2020-04-12T19:57:06Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-02-27T02:54:58Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-04-12T06:19:48Z",
|
||||
"updated_at": "2020-04-12T19:20:20Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 421,
|
||||
"watchers": 423,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -427,13 +427,13 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2020-04-10T09:08:06Z",
|
||||
"updated_at": "2020-04-12T16:22:16Z",
|
||||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 194,
|
||||
"watchers": 195,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -979,13 +979,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-04-12T03:14:12Z",
|
||||
"updated_at": "2020-04-12T16:02:45Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 803,
|
||||
"watchers_count": 803,
|
||||
"stargazers_count": 805,
|
||||
"watchers_count": 805,
|
||||
"forks_count": 221,
|
||||
"forks": 221,
|
||||
"watchers": 803,
|
||||
"watchers": 805,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1002,13 +1002,13 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2020-04-12T06:56:12Z",
|
||||
"updated_at": "2020-04-12T17:25:34Z",
|
||||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-12T15:06:31Z",
|
||||
"updated_at": "2020-04-12T18:17:09Z",
|
||||
"pushed_at": "2020-04-10T10:00:48Z",
|
||||
"stargazers_count": 409,
|
||||
"watchers_count": 409,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 409,
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1958 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-11T13:31:02Z",
|
||||
"updated_at": "2020-04-12T09:50:26Z",
|
||||
"updated_at": "2020-04-12T17:34:56Z",
|
||||
"pushed_at": "2020-04-11T14:52:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-04-09T09:24:40Z",
|
||||
"updated_at": "2020-04-12T16:29:21Z",
|
||||
"pushed_at": "2020-04-07T02:57:46Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-12T02:25:31Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
|
|
17
README.md
17
README.md
|
@ -3175,6 +3175,7 @@ The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution whe
|
|||
</code>
|
||||
|
||||
- [jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-](https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-)
|
||||
- [rabbitmask/CVE-2019-5475-EXP](https://github.com/rabbitmask/CVE-2019-5475-EXP)
|
||||
|
||||
### CVE-2019-5489
|
||||
|
||||
|
@ -5309,6 +5310,14 @@ OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerab
|
|||
|
||||
- [mpgn/CVE-2018-19276](https://github.com/mpgn/CVE-2018-19276)
|
||||
|
||||
### CVE-2018-19320
|
||||
|
||||
<code>
|
||||
The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system.
|
||||
</code>
|
||||
|
||||
- [fdiskyou/CVE-2018-19320](https://github.com/fdiskyou/CVE-2018-19320)
|
||||
|
||||
### CVE-2018-19466
|
||||
|
||||
<code>
|
||||
|
@ -12971,6 +12980,14 @@ Xerver Free Web Server 2.10 and earlier allows remote attackers to cause a denia
|
|||
|
||||
- [alt3kx/CVE-2002-0448](https://github.com/alt3kx/CVE-2002-0448)
|
||||
|
||||
### CVE-2002-0740
|
||||
|
||||
<code>
|
||||
Buffer overflow in slrnpull for the SLRN package, when installed setuid or setgid, allows local users to gain privileges via a long -d (SPOOLDIR) argument.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2002-0740](https://github.com/alt3kx/CVE-2002-0740)
|
||||
|
||||
### CVE-2002-0991
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue