mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2021/03/22 18:12:24
This commit is contained in:
parent
8b746f2f2c
commit
93c8848add
28 changed files with 198 additions and 126 deletions
2014
2016
2017
2018
2019
2020
CVE-2020-0796.jsonCVE-2020-1472.jsonCVE-2020-14882.jsonCVE-2020-14883.jsonCVE-2020-15906.jsonCVE-2020-16898.jsonCVE-2020-17523.jsonCVE-2020-2551.jsonCVE-2020-25686.jsonCVE-2020-2883.jsonCVE-2020-9483.json
2021
CVE-2021-1732.jsonCVE-2021-22986.jsonCVE-2021-25646.jsonCVE-2021-26855.jsonCVE-2021-3019.jsonCVE-2021-3156.json
README.md
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2252,
|
||||
"watchers_count": 2252,
|
||||
"forks_count": 485,
|
||||
"forks": 485,
|
||||
"forks_count": 484,
|
||||
"forks": 484,
|
||||
"watchers": 2252,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-22T01:49:49Z",
|
||||
"updated_at": "2021-03-22T07:31:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 962,
|
||||
"watchers_count": 962,
|
||||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 962,
|
||||
"watchers": 963,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-22T01:49:49Z",
|
||||
"updated_at": "2021-03-22T07:31:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 962,
|
||||
"watchers_count": 962,
|
||||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 962,
|
||||
"watchers": 963,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 350263870,
|
||||
"name": "Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-",
|
||||
"full_name": "ari5ti\/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-",
|
||||
"owner": {
|
||||
"login": "ari5ti",
|
||||
"id": 52395887,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52395887?v=4",
|
||||
"html_url": "https:\/\/github.com\/ari5ti"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ari5ti\/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T08:27:10Z",
|
||||
"updated_at": "2021-03-22T08:30:48Z",
|
||||
"pushed_at": "2021-03-22T08:30:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-22T01:49:49Z",
|
||||
"updated_at": "2021-03-22T07:31:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 962,
|
||||
"watchers_count": 962,
|
||||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 962,
|
||||
"watchers": 963,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-22T01:49:49Z",
|
||||
"updated_at": "2021-03-22T07:31:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 962,
|
||||
"watchers_count": 962,
|
||||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 962,
|
||||
"watchers": 963,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2018-3191 反弹shell",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-23T17:24:43Z",
|
||||
"updated_at": "2021-02-16T18:19:59Z",
|
||||
"updated_at": "2021-03-22T07:47:56Z",
|
||||
"pushed_at": "2018-10-23T17:28:05Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-22T03:03:20Z",
|
||||
"updated_at": "2021-03-22T07:54:25Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2414,
|
||||
"watchers_count": 2414,
|
||||
"stargazers_count": 2418,
|
||||
"watchers_count": 2418,
|
||||
"forks_count": 695,
|
||||
"forks": 695,
|
||||
"watchers": 2414,
|
||||
"watchers": 2418,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-22T01:49:49Z",
|
||||
"updated_at": "2021-03-22T07:31:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 962,
|
||||
"watchers_count": 962,
|
||||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 962,
|
||||
"watchers": 963,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T02:22:24Z",
|
||||
"updated_at": "2021-03-09T02:12:48Z",
|
||||
"updated_at": "2021-03-22T08:02:48Z",
|
||||
"pushed_at": "2019-11-01T14:33:21Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2021-03-03T11:48:00Z",
|
||||
"updated_at": "2021-03-22T08:30:24Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 579,
|
||||
"watchers_count": 579,
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"forks_count": 195,
|
||||
"forks": 195,
|
||||
"watchers": 579,
|
||||
"watchers": 580,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-03-13T19:46:03Z",
|
||||
"updated_at": "2021-03-22T04:46:26Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1102,
|
||||
"watchers_count": 1102,
|
||||
"stargazers_count": 1103,
|
||||
"watchers_count": 1103,
|
||||
"forks_count": 359,
|
||||
"forks": 359,
|
||||
"watchers": 1102,
|
||||
"watchers": 1103,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-03-19T21:43:06Z",
|
||||
"updated_at": "2021-03-22T08:37:05Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1256,
|
||||
"watchers_count": 1256,
|
||||
"stargazers_count": 1258,
|
||||
"watchers_count": 1258,
|
||||
"forks_count": 290,
|
||||
"forks": 290,
|
||||
"watchers": 1256,
|
||||
"watchers": 1258,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2021-03-20T05:47:32Z",
|
||||
"updated_at": "2021-03-22T07:39:15Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 183,
|
||||
"watchers": 184,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-22T03:03:20Z",
|
||||
"updated_at": "2021-03-22T07:54:25Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2414,
|
||||
"watchers_count": 2414,
|
||||
"stargazers_count": 2418,
|
||||
"watchers_count": 2418,
|
||||
"forks_count": 695,
|
||||
"forks": 695,
|
||||
"watchers": 2414,
|
||||
"watchers": 2418,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -500,8 +500,8 @@
|
|||
"pushed_at": "2021-01-25T07:54:23Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "用于对WebLogic(10.3.6.0.0 ;12.1.3.0.0 ;12.2.1.3.0; 12.2.1.4.0 ;14.1.1.0.0)进行验证及利用",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T15:33:04Z",
|
||||
"updated_at": "2021-01-26T14:31:14Z",
|
||||
"updated_at": "2021-03-22T03:22:01Z",
|
||||
"pushed_at": "2021-01-26T14:26:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -102,16 +102,16 @@
|
|||
"html_url": "https:\/\/github.com\/Yang0615777"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yang0615777\/PocList",
|
||||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE",
|
||||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-03-22T02:04:28Z",
|
||||
"pushed_at": "2021-03-21T16:38:20Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"updated_at": "2021-03-22T08:31:11Z",
|
||||
"pushed_at": "2021-03-22T03:46:42Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 176,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Writeup of CVE-2020-15906",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-23T09:20:53Z",
|
||||
"updated_at": "2021-02-20T15:03:34Z",
|
||||
"updated_at": "2021-03-22T04:03:34Z",
|
||||
"pushed_at": "2020-10-26T22:01:33Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:25:58Z",
|
||||
"updated_at": "2021-03-22T02:57:56Z",
|
||||
"updated_at": "2021-03-22T03:25:52Z",
|
||||
"pushed_at": "2020-10-28T11:27:17Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析(带漏洞环境)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T08:14:03Z",
|
||||
"updated_at": "2021-03-22T02:14:09Z",
|
||||
"updated_at": "2021-03-22T07:44:31Z",
|
||||
"pushed_at": "2021-02-07T09:42:36Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 56,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-22T01:49:49Z",
|
||||
"updated_at": "2021-03-22T07:31:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 962,
|
||||
"watchers_count": 962,
|
||||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 962,
|
||||
"watchers": 963,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-23T19:07:18Z",
|
||||
"updated_at": "2021-03-12T23:36:44Z",
|
||||
"updated_at": "2021-03-22T03:33:22Z",
|
||||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 218,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-9483 OR CVE-2020-13921",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-06T13:22:32Z",
|
||||
"updated_at": "2021-01-06T13:54:42Z",
|
||||
"updated_at": "2021-03-22T05:21:36Z",
|
||||
"pushed_at": "2021-01-06T13:52:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-03-20T16:49:12Z",
|
||||
"updated_at": "2021-03-22T08:20:06Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 255,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,7 +59,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T02:13:43Z",
|
||||
"updated_at": "2021-03-09T02:13:54Z",
|
||||
"updated_at": "2021-03-22T08:20:46Z",
|
||||
"pushed_at": "2021-03-09T02:13:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This is a Poc for BIGIP iControl unauth RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-17T05:02:45Z",
|
||||
"updated_at": "2021-03-22T02:41:28Z",
|
||||
"updated_at": "2021-03-22T07:55:18Z",
|
||||
"pushed_at": "2021-03-17T05:10:03Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "F5 BIG-IP\/BIG-IQ iControl Rest API SSRF to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-21T04:58:17Z",
|
||||
"updated_at": "2021-03-22T02:44:58Z",
|
||||
"updated_at": "2021-03-22T07:53:50Z",
|
||||
"pushed_at": "2021-03-21T17:10:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,8 +105,31 @@
|
|||
"description": "CVE-2021-22986 F5 BIG-IP iControl 命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-21T07:40:51Z",
|
||||
"updated_at": "2021-03-21T07:55:14Z",
|
||||
"updated_at": "2021-03-22T07:52:00Z",
|
||||
"pushed_at": "2021-03-21T07:40:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 350243656,
|
||||
"name": "CVE-2021-22986",
|
||||
"full_name": "Al1ex\/CVE-2021-22986",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-22986",
|
||||
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T07:13:50Z",
|
||||
"updated_at": "2021-03-22T08:40:16Z",
|
||||
"pushed_at": "2021-03-22T08:40:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -102,16 +102,16 @@
|
|||
"html_url": "https:\/\/github.com\/Yang0615777"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yang0615777\/PocList",
|
||||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE",
|
||||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-03-22T02:04:28Z",
|
||||
"pushed_at": "2021-03-21T16:38:20Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"updated_at": "2021-03-22T08:31:11Z",
|
||||
"pushed_at": "2021-03-22T03:46:42Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 176,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:22:07Z",
|
||||
"updated_at": "2021-03-20T08:34:47Z",
|
||||
"updated_at": "2021-03-22T03:36:12Z",
|
||||
"pushed_at": "2021-03-16T08:34:14Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T20:51:48Z",
|
||||
"updated_at": "2021-03-19T16:14:46Z",
|
||||
"updated_at": "2021-03-22T06:50:36Z",
|
||||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 350235820,
|
||||
"name": "cve-2021-3019",
|
||||
"full_name": "Aoyuh\/cve-2021-3019",
|
||||
"owner": {
|
||||
"login": "Aoyuh",
|
||||
"id": 48713040,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48713040?v=4",
|
||||
"html_url": "https:\/\/github.com\/Aoyuh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Aoyuh\/cve-2021-3019",
|
||||
"description": "lanproxy(CVE-2021-3019)目录遍历",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T06:44:07Z",
|
||||
"updated_at": "2021-03-22T06:44:07Z",
|
||||
"pushed_at": "2021-03-22T06:44:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-03-22T02:12:51Z",
|
||||
"updated_at": "2021-03-22T08:50:14Z",
|
||||
"pushed_at": "2021-03-19T17:21:48Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 211,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -57,6 +57,7 @@ ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties
|
|||
- [FanqXu/CVE-2021-3019](https://github.com/FanqXu/CVE-2021-3019)
|
||||
- [liuxu54898/CVE-2021-3019](https://github.com/liuxu54898/CVE-2021-3019)
|
||||
- [murataydemir/CVE-2021-3019](https://github.com/murataydemir/CVE-2021-3019)
|
||||
- [Aoyuh/cve-2021-3019](https://github.com/Aoyuh/cve-2021-3019)
|
||||
|
||||
### CVE-2021-3122 (2021-02-07)
|
||||
|
||||
|
@ -319,6 +320,7 @@ VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code exe
|
|||
- [Osyanina/westone-CVE-2021-22986-scanner](https://github.com/Osyanina/westone-CVE-2021-22986-scanner)
|
||||
- [Udyz/CVE-2021-22986](https://github.com/Udyz/CVE-2021-22986)
|
||||
- [safesword/F5_RCE](https://github.com/safesword/F5_RCE)
|
||||
- [Al1ex/CVE-2021-22986](https://github.com/Al1ex/CVE-2021-22986)
|
||||
|
||||
### CVE-2021-23132 (2021-03-04)
|
||||
|
||||
|
@ -13030,6 +13032,7 @@ An elevation of privilege vulnerability in the Android system (art). Product: An
|
|||
- [caxmd/CVE-2017-13156](https://github.com/caxmd/CVE-2017-13156)
|
||||
- [giacomoferretti/janus-toolkit](https://github.com/giacomoferretti/janus-toolkit)
|
||||
- [tea9/CVE-2017-13156-Janus](https://github.com/tea9/CVE-2017-13156-Janus)
|
||||
- [ari5ti/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-](https://github.com/ari5ti/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-)
|
||||
|
||||
### CVE-2017-13253 (2018-04-04)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue