mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/10/28 12:12:48
This commit is contained in:
parent
10ebe7dfd7
commit
8d39d3a1d7
30 changed files with 131 additions and 131 deletions
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-10-27T13:27:29Z",
|
||||
"updated_at": "2021-10-28T00:13:54Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1204,
|
||||
"watchers_count": 1204,
|
||||
"stargazers_count": 1205,
|
||||
"watchers_count": 1205,
|
||||
"forks_count": 266,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 266,
|
||||
"watchers": 1204,
|
||||
"watchers": 1205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -29,14 +29,14 @@
|
|||
{
|
||||
"id": 284615073,
|
||||
"name": "ActiveMQ_CVE-2015-5254",
|
||||
"full_name": "gsheller\/ActiveMQ_CVE-2015-5254",
|
||||
"full_name": "Ma1Dong\/ActiveMQ_CVE-2015-5254",
|
||||
"owner": {
|
||||
"login": "gsheller",
|
||||
"login": "Ma1Dong",
|
||||
"id": 52943794,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4",
|
||||
"html_url": "https:\/\/github.com\/gsheller"
|
||||
"html_url": "https:\/\/github.com\/Ma1Dong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gsheller\/ActiveMQ_CVE-2015-5254",
|
||||
"html_url": "https:\/\/github.com\/Ma1Dong\/ActiveMQ_CVE-2015-5254",
|
||||
"description": "ActiveMQ_CVE-2015-5254",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-03T05:51:52Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-10-27T13:27:29Z",
|
||||
"updated_at": "2021-10-28T00:13:54Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1204,
|
||||
"watchers_count": 1204,
|
||||
"stargazers_count": 1205,
|
||||
"watchers_count": 1205,
|
||||
"forks_count": 266,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 266,
|
||||
"watchers": 1204,
|
||||
"watchers": 1205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 283991287,
|
||||
"name": "ActiveMQ_putshell-CVE-2016-3088",
|
||||
"full_name": "gsheller\/ActiveMQ_putshell-CVE-2016-3088",
|
||||
"full_name": "Ma1Dong\/ActiveMQ_putshell-CVE-2016-3088",
|
||||
"owner": {
|
||||
"login": "gsheller",
|
||||
"login": "Ma1Dong",
|
||||
"id": 52943794,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4",
|
||||
"html_url": "https:\/\/github.com\/gsheller"
|
||||
"html_url": "https:\/\/github.com\/Ma1Dong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gsheller\/ActiveMQ_putshell-CVE-2016-3088",
|
||||
"html_url": "https:\/\/github.com\/Ma1Dong\/ActiveMQ_putshell-CVE-2016-3088",
|
||||
"description": "ActiveMQ_putshell直接获取webshell",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-31T09:06:15Z",
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-10-27T13:27:29Z",
|
||||
"updated_at": "2021-10-28T00:13:54Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1204,
|
||||
"watchers_count": 1204,
|
||||
"stargazers_count": 1205,
|
||||
"watchers_count": 1205,
|
||||
"forks_count": 266,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 266,
|
||||
"watchers": 1204,
|
||||
"watchers": 1205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "PoC for CVE-2018-1002105.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-06T11:28:02Z",
|
||||
"updated_at": "2021-07-17T01:09:24Z",
|
||||
"updated_at": "2021-10-28T02:38:11Z",
|
||||
"pushed_at": "2018-12-21T14:34:04Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 216,
|
||||
"watchers": 217,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-10-27T13:27:29Z",
|
||||
"updated_at": "2021-10-28T00:13:54Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1204,
|
||||
"watchers_count": 1204,
|
||||
"stargazers_count": 1205,
|
||||
"watchers_count": 1205,
|
||||
"forks_count": 266,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 266,
|
||||
"watchers": 1204,
|
||||
"watchers": 1205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 33,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2019-0230 Exploit POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T15:18:32Z",
|
||||
"updated_at": "2021-04-20T04:24:40Z",
|
||||
"updated_at": "2021-10-28T00:01:45Z",
|
||||
"pushed_at": "2020-08-21T07:35:11Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2948,
|
||||
"watchers_count": 2948,
|
||||
"forks_count": 867,
|
||||
"forks_count": 868,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,21 +69,21 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 867,
|
||||
"forks": 868,
|
||||
"watchers": 2948,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 284893505,
|
||||
"name": "Solr_CVE-2019-17558",
|
||||
"full_name": "gsheller\/Solr_CVE-2019-17558",
|
||||
"full_name": "Ma1Dong\/Solr_CVE-2019-17558",
|
||||
"owner": {
|
||||
"login": "gsheller",
|
||||
"login": "Ma1Dong",
|
||||
"id": 52943794,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4",
|
||||
"html_url": "https:\/\/github.com\/gsheller"
|
||||
"html_url": "https:\/\/github.com\/Ma1Dong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gsheller\/Solr_CVE-2019-17558",
|
||||
"html_url": "https:\/\/github.com\/Ma1Dong\/Solr_CVE-2019-17558",
|
||||
"description": "Solr_CVE-2019-17558",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-04T06:13:33Z",
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-10-27T13:27:29Z",
|
||||
"updated_at": "2021-10-28T00:13:54Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1204,
|
||||
"watchers_count": 1204,
|
||||
"stargazers_count": 1205,
|
||||
"watchers_count": 1205,
|
||||
"forks_count": 266,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 266,
|
||||
"watchers": 1204,
|
||||
"watchers": 1205,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -125,14 +125,14 @@
|
|||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 601,
|
||||
"watchers_count": 601,
|
||||
"forks_count": 196,
|
||||
"forks_count": 197,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2020-0796"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 196,
|
||||
"forks": 197,
|
||||
"watchers": 601,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T13:08:21Z",
|
||||
"updated_at": "2021-08-19T14:23:22Z",
|
||||
"updated_at": "2021-10-27T22:34:35Z",
|
||||
"pushed_at": "2021-02-14T15:08:01Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2948,
|
||||
"watchers_count": 2948,
|
||||
"forks_count": 867,
|
||||
"forks_count": 868,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,7 +42,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 867,
|
||||
"forks": 868,
|
||||
"watchers": 2948,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -121,11 +121,11 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-10-27T03:19:05Z",
|
||||
"updated_at": "2021-10-28T01:45:03Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 870,
|
||||
"watchers_count": 870,
|
||||
"forks_count": 274,
|
||||
"stargazers_count": 871,
|
||||
"watchers_count": 871,
|
||||
"forks_count": 275,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -134,8 +134,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 274,
|
||||
"watchers": 870,
|
||||
"forks": 275,
|
||||
"watchers": 871,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-10-27T13:27:29Z",
|
||||
"updated_at": "2021-10-28T00:13:54Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1204,
|
||||
"watchers_count": 1204,
|
||||
"stargazers_count": 1205,
|
||||
"watchers_count": 1205,
|
||||
"forks_count": 266,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 266,
|
||||
"watchers": 1204,
|
||||
"watchers": 1205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2021-10-13T21:38:26Z",
|
||||
"updated_at": "2021-10-27T23:24:10Z",
|
||||
"pushed_at": "2021-09-23T09:35:46Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T00:41:06Z",
|
||||
"updated_at": "2021-10-23T14:01:14Z",
|
||||
"pushed_at": "2021-10-21T18:12:50Z",
|
||||
"updated_at": "2021-10-28T02:31:09Z",
|
||||
"pushed_at": "2021-10-28T02:31:04Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 28,
|
||||
|
|
|
@ -274,17 +274,17 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-10-27T09:17:56Z",
|
||||
"updated_at": "2021-10-27T23:49:07Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 670,
|
||||
"watchers_count": 670,
|
||||
"stargazers_count": 672,
|
||||
"watchers_count": 672,
|
||||
"forks_count": 177,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 177,
|
||||
"watchers": 670,
|
||||
"watchers": 672,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -484,14 +484,14 @@
|
|||
{
|
||||
"id": 343440136,
|
||||
"name": "vcenter_rce",
|
||||
"full_name": "gsheller\/vcenter_rce",
|
||||
"full_name": "Ma1Dong\/vcenter_rce",
|
||||
"owner": {
|
||||
"login": "gsheller",
|
||||
"login": "Ma1Dong",
|
||||
"id": 52943794,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4",
|
||||
"html_url": "https:\/\/github.com\/gsheller"
|
||||
"html_url": "https:\/\/github.com\/Ma1Dong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gsheller\/vcenter_rce",
|
||||
"html_url": "https:\/\/github.com\/Ma1Dong\/vcenter_rce",
|
||||
"description": "漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T14:14:01Z",
|
||||
|
|
|
@ -128,17 +128,17 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-10-25T12:16:12Z",
|
||||
"updated_at": "2021-10-28T01:22:22Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 275,
|
||||
"watchers": 276,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-25T16:21:56Z",
|
||||
"updated_at": "2021-10-27T13:45:15Z",
|
||||
"updated_at": "2021-10-28T03:08:41Z",
|
||||
"pushed_at": "2021-10-02T03:17:45Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 35,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 149,
|
||||
"forks": 37,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2021-10-27T13:54:17Z",
|
||||
"pushed_at": "2021-06-07T02:03:19Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 7,
|
||||
"updated_at": "2021-10-28T03:09:00Z",
|
||||
"pushed_at": "2021-10-28T02:46:54Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"forks": 8,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "h2-jdbc(https:\/\/github.com\/h2database\/h2database\/issues\/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-22T07:14:25Z",
|
||||
"updated_at": "2021-10-26T09:22:07Z",
|
||||
"updated_at": "2021-10-28T01:05:12Z",
|
||||
"pushed_at": "2021-10-22T07:28:11Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,11 +121,11 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-10-27T03:19:05Z",
|
||||
"updated_at": "2021-10-28T01:45:03Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 870,
|
||||
"watchers_count": 870,
|
||||
"forks_count": 274,
|
||||
"stargazers_count": 871,
|
||||
"watchers_count": 871,
|
||||
"forks_count": 275,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -134,8 +134,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 274,
|
||||
"watchers": 870,
|
||||
"forks": 275,
|
||||
"watchers": 871,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -73,17 +73,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2021-10-21T15:40:46Z",
|
||||
"updated_at": "2021-10-27T23:13:43Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 134,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-23T01:35:42Z",
|
||||
"updated_at": "2021-10-27T18:31:21Z",
|
||||
"updated_at": "2021-10-28T03:01:35Z",
|
||||
"pushed_at": "2021-10-23T01:44:54Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-36260",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-18T06:40:48Z",
|
||||
"updated_at": "2021-10-27T19:56:06Z",
|
||||
"updated_at": "2021-10-28T01:28:51Z",
|
||||
"pushed_at": "2021-10-27T15:40:38Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2021-10-27T19:54:05Z",
|
||||
"updated_at": "2021-10-28T02:34:11Z",
|
||||
"pushed_at": "2021-10-27T15:55:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2021-10-27T09:38:33Z",
|
||||
"updated_at": "2021-10-28T03:10:44Z",
|
||||
"pushed_at": "2021-10-24T21:01:29Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 293,
|
||||
"watchers": 297,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -724,7 +724,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
|
|||
- [GuayoyoCyber/CVE-2021-21972](https://github.com/GuayoyoCyber/CVE-2021-21972)
|
||||
- [JMousqueton/Detect-CVE-2021-21972](https://github.com/JMousqueton/Detect-CVE-2021-21972)
|
||||
- [robwillisinfo/VMware_vCenter_CVE-2021-21972](https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972)
|
||||
- [gsheller/vcenter_rce](https://github.com/gsheller/vcenter_rce)
|
||||
- [Ma1Dong/vcenter_rce](https://github.com/Ma1Dong/vcenter_rce)
|
||||
- [d3sh1n/cve-2021-21972](https://github.com/d3sh1n/cve-2021-21972)
|
||||
- [ByZain/CVE-2021-21972](https://github.com/ByZain/CVE-2021-21972)
|
||||
- [TaroballzChen/CVE-2021-21972](https://github.com/TaroballzChen/CVE-2021-21972)
|
||||
|
@ -10863,7 +10863,7 @@ Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution
|
|||
|
||||
- [SDNDTeam/CVE-2019-17558_Solr_Vul_Tool](https://github.com/SDNDTeam/CVE-2019-17558_Solr_Vul_Tool)
|
||||
- [zhzyker/exphub](https://github.com/zhzyker/exphub)
|
||||
- [gsheller/Solr_CVE-2019-17558](https://github.com/gsheller/Solr_CVE-2019-17558)
|
||||
- [Ma1Dong/Solr_CVE-2019-17558](https://github.com/Ma1Dong/Solr_CVE-2019-17558)
|
||||
- [xkyrage/Exploit_CVE-2019-17558-RCE](https://github.com/xkyrage/Exploit_CVE-2019-17558-RCE)
|
||||
|
||||
### CVE-2019-17564 (2020-04-01)
|
||||
|
@ -17368,7 +17368,7 @@ Avaya Fabric Connect Virtual Services Platform (VSP) Operating System Software (
|
|||
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.
|
||||
</code>
|
||||
|
||||
- [gsheller/ActiveMQ_putshell-CVE-2016-3088](https://github.com/gsheller/ActiveMQ_putshell-CVE-2016-3088)
|
||||
- [Ma1Dong/ActiveMQ_putshell-CVE-2016-3088](https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088)
|
||||
- [pudiding/CVE-2016-3088](https://github.com/pudiding/CVE-2016-3088)
|
||||
- [cyberaguiar/CVE-2016-3088](https://github.com/cyberaguiar/CVE-2016-3088)
|
||||
- [vonderchild/CVE-2016-3088](https://github.com/vonderchild/CVE-2016-3088)
|
||||
|
@ -18690,7 +18690,7 @@ Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be seri
|
|||
</code>
|
||||
|
||||
- [jas502n/CVE-2015-5254](https://github.com/jas502n/CVE-2015-5254)
|
||||
- [gsheller/ActiveMQ_CVE-2015-5254](https://github.com/gsheller/ActiveMQ_CVE-2015-5254)
|
||||
- [Ma1Dong/ActiveMQ_CVE-2015-5254](https://github.com/Ma1Dong/ActiveMQ_CVE-2015-5254)
|
||||
|
||||
### CVE-2015-5347 (2016-04-12)
|
||||
|
||||
|
|
Loading…
Reference in a new issue