mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/07/26 00:25:43
This commit is contained in:
parent
1b6057ed03
commit
9623bdcb80
32 changed files with 257 additions and 125 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2023-07-21T19:28:33Z",
|
||||
"updated_at": "2023-07-25T18:09:59Z",
|
||||
"pushed_at": "2023-05-07T11:39:29Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -689,6 +689,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 18714630,
|
||||
"name": "bleeding_onions",
|
||||
"full_name": "wwwiretap\/bleeding_onions",
|
||||
"owner": {
|
||||
"login": "wwwiretap",
|
||||
"id": 210109,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210109?v=4",
|
||||
"html_url": "https:\/\/github.com\/wwwiretap"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wwwiretap\/bleeding_onions",
|
||||
"description": "Script to find Exit and Guard nodes in the Tor Network, that are still suffering from CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-12T21:04:55Z",
|
||||
"updated_at": "2014-09-09T17:32:17Z",
|
||||
"pushed_at": "2014-04-13T14:57:20Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 18722665,
|
||||
"name": "heatbleeding",
|
||||
|
@ -779,6 +809,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 18794584,
|
||||
"name": "-Heartbleed-",
|
||||
"full_name": "indiw0rm\/-Heartbleed-",
|
||||
"owner": {
|
||||
"login": "indiw0rm",
|
||||
"id": 7300510,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7300510?v=4",
|
||||
"html_url": "https:\/\/github.com\/indiw0rm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/indiw0rm\/-Heartbleed-",
|
||||
"description": "A checker (site and tool) for CVE-2014-0160: ",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-15T09:30:40Z",
|
||||
"updated_at": "2014-04-15T09:30:40Z",
|
||||
"pushed_at": "2014-04-15T09:30:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 18802435,
|
||||
"name": "heartbleed-tools",
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 18869401,
|
||||
"name": "cve-2014-2734",
|
||||
"full_name": "adrienthebo\/cve-2014-2734",
|
||||
"owner": {
|
||||
"login": "adrienthebo",
|
||||
"id": 172194,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172194?v=4",
|
||||
"html_url": "https:\/\/github.com\/adrienthebo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adrienthebo\/cve-2014-2734",
|
||||
"description": "I think this CVE is full of lies and deceit and very confusing code.",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-17T06:51:01Z",
|
||||
"updated_at": "2023-01-28T20:50:55Z",
|
||||
"pushed_at": "2014-04-17T07:07:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -238,13 +238,13 @@
|
|||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"has_discussions": false,
|
||||
"forks_count": 150,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 150,
|
||||
"forks": 151,
|
||||
"watchers": 444,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
|
@ -447,10 +447,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2023-07-23T23:17:55Z",
|
||||
"updated_at": "2023-07-25T20:57:38Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 753,
|
||||
"watchers_count": 753,
|
||||
"stargazers_count": 754,
|
||||
"watchers_count": 754,
|
||||
"has_discussions": false,
|
||||
"forks_count": 436,
|
||||
"allow_forking": true,
|
||||
|
@ -463,7 +463,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 436,
|
||||
"watchers": 753,
|
||||
"watchers": 754,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-19T16:50:39Z",
|
||||
"updated_at": "2023-07-03T11:55:46Z",
|
||||
"updated_at": "2023-07-25T23:11:33Z",
|
||||
"pushed_at": "2022-03-07T20:04:08Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 167275161,
|
||||
"name": "check_CVE-2019-3462",
|
||||
"full_name": "tonejito\/check_CVE-2019-3462",
|
||||
"owner": {
|
||||
"login": "tonejito",
|
||||
"id": 618588,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/618588?v=4",
|
||||
"html_url": "https:\/\/github.com\/tonejito"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
|
||||
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T00:30:15Z",
|
||||
"updated_at": "2022-09-01T09:06:26Z",
|
||||
"pushed_at": "2019-01-26T01:21:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 170573944,
|
||||
"name": "update-apt-package",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2023-07-18T17:02:01Z",
|
||||
"updated_at": "2023-07-25T20:30:07Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 636,
|
||||
"watchers_count": 636,
|
||||
"stargazers_count": 637,
|
||||
"watchers_count": 637,
|
||||
"has_discussions": false,
|
||||
"forks_count": 160,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 160,
|
||||
"watchers": 636,
|
||||
"watchers": 637,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2023-07-15T04:47:13Z",
|
||||
"updated_at": "2023-07-25T23:20:30Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 684,
|
||||
"watchers_count": 684,
|
||||
"stargazers_count": 685,
|
||||
"watchers_count": 685,
|
||||
"has_discussions": false,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 172,
|
||||
"watchers": 684,
|
||||
"watchers": 685,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T04:44:05Z",
|
||||
"updated_at": "2023-07-10T03:06:43Z",
|
||||
"updated_at": "2023-07-25T23:36:48Z",
|
||||
"pushed_at": "2020-06-17T00:56:08Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2023-07-24T23:50:29Z",
|
||||
"updated_at": "2023-07-25T20:48:50Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
@ -152,7 +152,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 349,
|
||||
"watchers": 350,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -1868,7 +1868,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-02-26T11:49:44Z",
|
||||
"updated_at": "2023-03-06T10:23:44Z",
|
||||
"pushed_at": "2023-07-15T00:55:25Z",
|
||||
"pushed_at": "2023-07-25T19:38:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -79,8 +79,8 @@
|
|||
"description": "WordPress Sites Vulnerability Checker for CVE-2020-35489",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-31T02:12:26Z",
|
||||
"updated_at": "2023-07-07T14:35:38Z",
|
||||
"pushed_at": "2023-07-18T16:53:38Z",
|
||||
"updated_at": "2023-07-25T23:36:58Z",
|
||||
"pushed_at": "2023-07-26T00:05:36Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": true,
|
||||
|
|
62
2020/CVE-2020-8644.json
Normal file
62
2020/CVE-2020-8644.json
Normal file
|
@ -0,0 +1,62 @@
|
|||
[
|
||||
{
|
||||
"id": 670804361,
|
||||
"name": "CVE-2020-8644-PlaySMS-1.4-rlvpp",
|
||||
"full_name": "hheeyywweellccoommee\/CVE-2020-8644-PlaySMS-1.4-rlvpp",
|
||||
"owner": {
|
||||
"login": "hheeyywweellccoommee",
|
||||
"id": 131327252,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131327252?v=4",
|
||||
"html_url": "https:\/\/github.com\/hheeyywweellccoommee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hheeyywweellccoommee\/CVE-2020-8644-PlaySMS-1.4-rlvpp",
|
||||
"description": "Python script to exploit PlaySMS before 1.4.3",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-25T22:01:01Z",
|
||||
"updated_at": "2023-07-25T22:01:02Z",
|
||||
"pushed_at": "2023-07-25T21:38:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 670819223,
|
||||
"name": "CVE-2020-8644-PlaySMS-1.4",
|
||||
"full_name": "H3rm1tR3b0rn\/CVE-2020-8644-PlaySMS-1.4",
|
||||
"owner": {
|
||||
"login": "H3rm1tR3b0rn",
|
||||
"id": 17506633,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17506633?v=4",
|
||||
"html_url": "https:\/\/github.com\/H3rm1tR3b0rn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H3rm1tR3b0rn\/CVE-2020-8644-PlaySMS-1.4",
|
||||
"description": "Python script to exploit PlaySMS before 1.4.3",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-25T23:11:51Z",
|
||||
"updated_at": "2023-07-25T23:13:20Z",
|
||||
"pushed_at": "2023-07-25T23:34:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -776,7 +776,7 @@
|
|||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 385174791,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-07-25T09:44:23Z",
|
||||
"updated_at": "2023-07-26T00:17:15Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"stargazers_count": 979,
|
||||
"watchers_count": 979,
|
||||
"has_discussions": false,
|
||||
"forks_count": 126,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 126,
|
||||
"watchers": 978,
|
||||
"watchers": 979,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T06:40:49Z",
|
||||
"updated_at": "2023-05-13T14:01:02Z",
|
||||
"updated_at": "2023-07-25T19:26:06Z",
|
||||
"pushed_at": "2023-06-29T15:57:12Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -2458,10 +2458,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2023-07-07T02:05:07Z",
|
||||
"updated_at": "2023-07-25T23:36:35Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -2479,7 +2479,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -3476,11 +3476,11 @@
|
|||
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-41773-EXPLOIT",
|
||||
"description": "A PoC exploit for CVE-2021-41773 - Directory Traversal\/RCE Apache version 2.4.49\/2.4.50",
|
||||
"description": "A PoC exploit for CVE-2021-41773 - RCE Apache version 2.4.49\/2.4.50",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-06T17:46:29Z",
|
||||
"updated_at": "2023-07-25T14:48:43Z",
|
||||
"pushed_at": "2023-07-25T14:47:11Z",
|
||||
"updated_at": "2023-07-25T20:59:37Z",
|
||||
"pushed_at": "2023-07-25T21:01:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1428,7 +1428,7 @@
|
|||
"stargazers_count": 850,
|
||||
"watchers_count": 850,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"forks_count": 177,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1447,7 +1447,7 @@
|
|||
"scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"forks": 177,
|
||||
"watchers": 850,
|
||||
"score": 0,
|
||||
"subscribers_count": 32
|
||||
|
@ -10216,7 +10216,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-27T16:45:58Z",
|
||||
"updated_at": "2022-01-04T14:50:09Z",
|
||||
"pushed_at": "2022-10-05T19:03:36Z",
|
||||
"pushed_at": "2023-07-25T20:05:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-44735",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-20T09:20:13Z",
|
||||
"updated_at": "2023-07-25T17:23:54Z",
|
||||
"updated_at": "2023-07-26T00:14:04Z",
|
||||
"pushed_at": "2023-07-23T10:15:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -348,7 +348,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-10-29T18:25:26Z",
|
||||
"updated_at": "2023-05-06T12:14:50Z",
|
||||
"pushed_at": "2023-05-23T04:06:51Z",
|
||||
"pushed_at": "2023-07-25T20:46:14Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-07-25T09:44:23Z",
|
||||
"updated_at": "2023-07-26T00:17:15Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 978,
|
||||
"watchers_count": 978,
|
||||
"stargazers_count": 979,
|
||||
"watchers_count": 979,
|
||||
"has_discussions": false,
|
||||
"forks_count": 126,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 126,
|
||||
"watchers": 978,
|
||||
"watchers": 979,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "iTop < 2.7.6 - (Authenticated) Remote command execution",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-02T07:46:36Z",
|
||||
"updated_at": "2022-11-09T18:16:12Z",
|
||||
"updated_at": "2023-07-25T22:43:08Z",
|
||||
"pushed_at": "2022-09-02T07:48:18Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"forks": 41,
|
||||
"watchers": 254,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2023-20126",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-17T08:59:40Z",
|
||||
"updated_at": "2023-07-25T15:38:22Z",
|
||||
"updated_at": "2023-07-26T00:11:13Z",
|
||||
"pushed_at": "2023-06-20T12:45:45Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "Repository with everything I have tracking the impact of MOVEit CVE-2023-34362",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T00:39:37Z",
|
||||
"updated_at": "2023-06-19T10:15:51Z",
|
||||
"updated_at": "2023-07-25T20:51:32Z",
|
||||
"pushed_at": "2023-06-19T16:11:47Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -172,13 +172,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC of CVE-2023-35086 only DoS",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-25T01:36:07Z",
|
||||
"updated_at": "2023-07-25T16:48:53Z",
|
||||
"updated_at": "2023-07-25T23:54:26Z",
|
||||
"pushed_at": "2023-07-25T01:42:02Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Citrix Scanner for CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-20T13:16:38Z",
|
||||
"updated_at": "2023-07-25T02:44:30Z",
|
||||
"updated_at": "2023-07-25T20:06:06Z",
|
||||
"pushed_at": "2023-07-24T11:49:37Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Cloudpanel 0-day Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T09:20:22Z",
|
||||
"updated_at": "2023-07-25T11:32:16Z",
|
||||
"updated_at": "2023-07-25T21:06:18Z",
|
||||
"pushed_at": "2023-07-24T01:43:17Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-07-21T01:53:10Z",
|
||||
"updated_at": "2023-07-25T15:35:11Z",
|
||||
"pushed_at": "2023-07-25T15:34:41Z",
|
||||
"pushed_at": "2023-07-25T22:16:44Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
|
|
12
README.md
12
README.md
|
@ -16738,6 +16738,14 @@
|
|||
|
||||
- [DXY0411/CVE-2020-8637](https://github.com/DXY0411/CVE-2020-8637)
|
||||
|
||||
### CVE-2020-8644 (2020-02-05)
|
||||
|
||||
<code>PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
|
||||
</code>
|
||||
|
||||
- [hheeyywweellccoommee/CVE-2020-8644-PlaySMS-1.4-rlvpp](https://github.com/hheeyywweellccoommee/CVE-2020-8644-PlaySMS-1.4-rlvpp)
|
||||
- [H3rm1tR3b0rn/CVE-2020-8644-PlaySMS-1.4](https://github.com/H3rm1tR3b0rn/CVE-2020-8644-PlaySMS-1.4)
|
||||
|
||||
### CVE-2020-8809 (2020-02-25)
|
||||
|
||||
<code>Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker can modify the contents of downloaded files. In the case of add-ins (if the user is using those), this will lead to code execution. In case of OBIS codes (which the user is always using as they are needed to communicate with the energy meters), this can lead to code execution when combined with CVE-2020-8810.
|
||||
|
@ -20477,7 +20485,6 @@
|
|||
<code>Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
|
||||
</code>
|
||||
|
||||
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
|
||||
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
|
||||
|
||||
### CVE-2019-3663 (2019-11-13)
|
||||
|
@ -31115,9 +31122,11 @@
|
|||
- [sammyfung/openssl-heartbleed-fix](https://github.com/sammyfung/openssl-heartbleed-fix)
|
||||
- [a0726h77/heartbleed-test](https://github.com/a0726h77/heartbleed-test)
|
||||
- [hreese/heartbleed-dtls](https://github.com/hreese/heartbleed-dtls)
|
||||
- [wwwiretap/bleeding_onions](https://github.com/wwwiretap/bleeding_onions)
|
||||
- [idkqh7/heatbleeding](https://github.com/idkqh7/heatbleeding)
|
||||
- [GeeksXtreme/ssl-heartbleed.nse](https://github.com/GeeksXtreme/ssl-heartbleed.nse)
|
||||
- [xlucas/heartbleed](https://github.com/xlucas/heartbleed)
|
||||
- [indiw0rm/-Heartbleed-](https://github.com/indiw0rm/-Heartbleed-)
|
||||
- [einaros/heartbleed-tools](https://github.com/einaros/heartbleed-tools)
|
||||
- [mozilla-services/Heartbleed](https://github.com/mozilla-services/Heartbleed)
|
||||
- [yryz/heartbleed.js](https://github.com/yryz/heartbleed.js)
|
||||
|
@ -31341,6 +31350,7 @@
|
|||
</code>
|
||||
|
||||
- [gdisneyleugers/CVE-2014-2734](https://github.com/gdisneyleugers/CVE-2014-2734)
|
||||
- [adrienthebo/cve-2014-2734](https://github.com/adrienthebo/cve-2014-2734)
|
||||
|
||||
### CVE-2014-2815 (2014-08-12)
|
||||
|
||||
|
|
Loading…
Reference in a new issue