mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2020/05/27 06:07:50
This commit is contained in:
parent
f17f986c9a
commit
9944877711
17 changed files with 58 additions and 58 deletions
2013
2014
2016
2017
2018
2019
CVE-2019-11043.jsonCVE-2019-1388.jsonCVE-2019-16724.jsonCVE-2019-20085.jsonCVE-2019-2618.jsonCVE-2019-8641.json
2020
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/stoicboomer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stoicboomer\/CVE-2013-6987",
|
||||
"description": null,
|
||||
"description": "exploit for DNS 4.3",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-13T21:42:24Z",
|
||||
"updated_at": "2020-02-14T08:48:49Z",
|
||||
"updated_at": "2020-05-26T16:51:50Z",
|
||||
"pushed_at": "2020-02-13T21:51:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-26T14:55:11Z",
|
||||
"updated_at": "2020-05-26T17:52:04Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 428,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-26T14:55:11Z",
|
||||
"updated_at": "2020-05-26T17:52:04Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 428,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-26T14:55:11Z",
|
||||
"updated_at": "2020-05-26T17:52:04Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 428,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"forks_count": 321,
|
||||
"forks": 321,
|
||||
"forks_count": 322,
|
||||
"forks": 322,
|
||||
"watchers": 345,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-26T14:55:11Z",
|
||||
"updated_at": "2020-05-26T17:52:04Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 428,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-10-22T16:49:08Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-05-25T08:03:43Z",
|
||||
"updated_at": "2020-05-26T18:26:44Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1573,
|
||||
"watchers_count": 1573,
|
||||
"stargazers_count": 1574,
|
||||
"watchers_count": 1574,
|
||||
"forks_count": 224,
|
||||
"forks": 224,
|
||||
"watchers": 1573,
|
||||
"watchers": 1574,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2020-05-24T10:56:04Z",
|
||||
"updated_at": "2020-05-26T17:52:04Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Developed proof-of-concept exploits for various types of vulnerabilities and mitigation bypasses with user-mode Windows applications, New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-31T20:28:12Z",
|
||||
"updated_at": "2020-05-25T16:20:50Z",
|
||||
"updated_at": "2020-05-26T15:41:21Z",
|
||||
"pushed_at": "2020-05-09T16:01:14Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-15T13:22:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-26T14:55:11Z",
|
||||
"updated_at": "2020-05-26T17:52:04Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 428,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "The reproduction code for CVE-2019-8641.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T07:29:01Z",
|
||||
"updated_at": "2020-05-26T13:38:59Z",
|
||||
"pushed_at": "2020-05-26T13:38:56Z",
|
||||
"updated_at": "2020-05-26T17:25:14Z",
|
||||
"pushed_at": "2020-05-26T17:25:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-11T09:08:02Z",
|
||||
"updated_at": "2020-05-26T12:45:01Z",
|
||||
"updated_at": "2020-05-26T19:18:09Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-05-26T14:55:11Z",
|
||||
"updated_at": "2020-05-26T17:52:04Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 428,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T14:30:46Z",
|
||||
"updated_at": "2020-05-26T08:22:08Z",
|
||||
"updated_at": "2020-05-26T19:39:29Z",
|
||||
"pushed_at": "2020-05-21T15:13:22Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 20,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue