mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/09/16 00:10:01
This commit is contained in:
parent
097c8cbb73
commit
9ddd7ce05b
30 changed files with 247 additions and 151 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "phpMyAdmin '\/scripts\/setup.php' PHP Code Injection RCE PoC (CVE-2009-1151)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-03T22:26:09Z",
|
||||
"updated_at": "2019-08-28T02:14:03Z",
|
||||
"updated_at": "2020-09-15T14:40:41Z",
|
||||
"pushed_at": "2019-07-18T20:27:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-13T13:39:02Z",
|
||||
"updated_at": "2020-09-15T10:25:16Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"forks_count": 168,
|
||||
"forks": 168,
|
||||
"watchers": 682,
|
||||
"watchers": 683,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-13T13:39:02Z",
|
||||
"updated_at": "2020-09-15T10:25:16Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"forks_count": 168,
|
||||
"forks": 168,
|
||||
"watchers": 682,
|
||||
"watchers": 683,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-09-13T03:50:26Z",
|
||||
"updated_at": "2020-09-15T13:32:21Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 220,
|
||||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2020-09-11T14:54:28Z",
|
||||
"updated_at": "2020-09-15T11:24:15Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 270,
|
||||
"watchers": 271,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-13T13:39:02Z",
|
||||
"updated_at": "2020-09-15T10:25:16Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"forks_count": 168,
|
||||
"forks": 168,
|
||||
"watchers": 682,
|
||||
"watchers": 683,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 374,
|
||||
"watchers_count": 374,
|
||||
"forks_count": 132,
|
||||
"forks": 132,
|
||||
"forks_count": 133,
|
||||
"forks": 133,
|
||||
"watchers": 374,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Weblogic 反序列化漏洞(CVE-2018-2628)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-05T11:00:40Z",
|
||||
"updated_at": "2020-09-08T13:57:03Z",
|
||||
"updated_at": "2020-09-15T10:59:31Z",
|
||||
"pushed_at": "2019-09-30T01:18:02Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-13T13:39:02Z",
|
||||
"updated_at": "2020-09-15T10:25:16Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"forks_count": 168,
|
||||
"forks": 168,
|
||||
"watchers": 682,
|
||||
"watchers": 683,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-09-11T01:53:18Z",
|
||||
"updated_at": "2020-09-15T14:18:32Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1606,
|
||||
"watchers_count": 1606,
|
||||
"stargazers_count": 1605,
|
||||
"watchers_count": 1605,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1606,
|
||||
"watchers": 1605,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2020-08-31T00:00:43Z",
|
||||
"updated_at": "2020-09-15T14:59:29Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"stargazers_count": 579,
|
||||
"watchers_count": 579,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 580,
|
||||
"watchers": 579,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-15T14:27:49Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-27T19:32:07Z",
|
||||
"updated_at": "2020-09-10T21:35:08Z",
|
||||
"updated_at": "2020-09-15T12:52:52Z",
|
||||
"pushed_at": "2020-08-27T19:33:42Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-15T09:01:59Z",
|
||||
"updated_at": "2020-09-15T14:51:16Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1736,
|
||||
"watchers_count": 1736,
|
||||
"forks_count": 460,
|
||||
"forks": 460,
|
||||
"watchers": 1736,
|
||||
"stargazers_count": 1756,
|
||||
"watchers_count": 1756,
|
||||
"forks_count": 461,
|
||||
"forks": 461,
|
||||
"watchers": 1756,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-2107",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T14:18:33Z",
|
||||
"updated_at": "2020-09-03T03:35:11Z",
|
||||
"updated_at": "2020-09-15T14:59:33Z",
|
||||
"pushed_at": "2019-07-25T08:01:07Z",
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 309,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-13T13:39:02Z",
|
||||
"updated_at": "2020-09-15T10:25:16Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"forks_count": 168,
|
||||
"forks": 168,
|
||||
"watchers": 682,
|
||||
"watchers": 683,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-09-13T03:50:26Z",
|
||||
"updated_at": "2020-09-15T13:32:21Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 220,
|
||||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2020-09-15T04:48:17Z",
|
||||
"updated_at": "2020-09-15T12:52:54Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 174,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -703,13 +703,13 @@
|
|||
"description": "An unauthenticated PoC for CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-15T22:17:50Z",
|
||||
"updated_at": "2020-08-23T19:45:57Z",
|
||||
"updated_at": "2020-09-15T12:53:03Z",
|
||||
"pushed_at": "2020-03-15T22:20:58Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -868,8 +868,8 @@
|
|||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 999,
|
||||
"watchers_count": 999,
|
||||
"forks_count": 328,
|
||||
"forks": 328,
|
||||
"forks_count": 327,
|
||||
"forks": 327,
|
||||
"watchers": 999,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-23T18:45:24Z",
|
||||
"updated_at": "2020-08-14T07:02:45Z",
|
||||
"updated_at": "2020-09-15T13:40:59Z",
|
||||
"pushed_at": "2020-06-25T12:22:06Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2020-13162",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-02T17:58:32Z",
|
||||
"updated_at": "2020-09-04T09:43:03Z",
|
||||
"updated_at": "2020-09-15T14:51:56Z",
|
||||
"pushed_at": "2020-09-02T19:14:21Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of Full Account Takeover on RAD SecFlow-1v ",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-31T13:22:21Z",
|
||||
"updated_at": "2020-09-14T22:05:23Z",
|
||||
"updated_at": "2020-09-15T09:24:49Z",
|
||||
"pushed_at": "2020-08-31T13:53:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T23:00:00Z",
|
||||
"updated_at": "2020-09-08T10:28:22Z",
|
||||
"updated_at": "2020-09-15T12:52:53Z",
|
||||
"pushed_at": "2020-07-17T13:07:29Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 205,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-15T09:04:57Z",
|
||||
"updated_at": "2020-09-15T14:57:34Z",
|
||||
"pushed_at": "2020-09-11T13:59:15Z",
|
||||
"stargazers_count": 540,
|
||||
"watchers_count": 540,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 540,
|
||||
"stargazers_count": 590,
|
||||
"watchers_count": 590,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 590,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-09-14T16:53:07Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-09-15T09:05:16Z",
|
||||
"pushed_at": "2020-09-15T08:54:17Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 219,
|
||||
"updated_at": "2020-09-15T15:04:12Z",
|
||||
"pushed_at": "2020-09-15T09:53:20Z",
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 270,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2020-09-15T07:32:31Z",
|
||||
"pushed_at": "2020-09-15T07:32:29Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"updated_at": "2020-09-15T15:03:50Z",
|
||||
"pushed_at": "2020-09-15T14:52:26Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-09-15T08:54:05Z",
|
||||
"updated_at": "2020-09-15T15:05:38Z",
|
||||
"pushed_at": "2020-09-14T19:44:25Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,105 @@
|
|||
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:27:14Z",
|
||||
"updated_at": "2020-09-15T08:05:32Z",
|
||||
"pushed_at": "2020-09-14T21:16:36Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"updated_at": "2020-09-15T14:23:32Z",
|
||||
"pushed_at": "2020-09-15T10:52:03Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295692006,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "Kamimuka\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "Kamimuka",
|
||||
"id": 19571618,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19571618?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kamimuka"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kamimuka\/CVE-2020-1472",
|
||||
"description": "CVE-2020-1472漏洞复现过程",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T10:25:47Z",
|
||||
"updated_at": "2020-09-15T10:39:42Z",
|
||||
"pushed_at": "2020-09-15T10:39:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295716616,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "NAXG\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "NAXG",
|
||||
"id": 28560949,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/28560949?v=4",
|
||||
"html_url": "https:\/\/github.com\/NAXG"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NAXG\/CVE-2020-1472",
|
||||
"description": "CVE-2020-1472 zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T12:11:49Z",
|
||||
"updated_at": "2020-09-15T14:35:38Z",
|
||||
"pushed_at": "2020-09-15T12:49:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295743213,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "s0wr0b1ndef\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "s0wr0b1ndef",
|
||||
"id": 37288034,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
|
||||
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/CVE-2020-1472",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T13:50:01Z",
|
||||
"updated_at": "2020-09-15T13:50:22Z",
|
||||
"pushed_at": "2020-09-15T13:50:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295754317,
|
||||
"name": "zerologon-CVE-2020-1472",
|
||||
"full_name": "harshil-shah004\/zerologon-CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "harshil-shah004",
|
||||
"id": 34110198,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/34110198?v=4",
|
||||
"html_url": "https:\/\/github.com\/harshil-shah004"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/harshil-shah004\/zerologon-CVE-2020-1472",
|
||||
"description": "PoC for Zerologon (CVE-2020-1472) - Research credits to Tom Tervoort of Secura & exploit credits to dirkjanm",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T14:29:24Z",
|
||||
"updated_at": "2020-09-15T14:46:25Z",
|
||||
"pushed_at": "2020-09-15T14:46:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-15505: RCE on MobileIron MDM PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-13T23:10:56Z",
|
||||
"updated_at": "2020-09-15T08:22:34Z",
|
||||
"updated_at": "2020-09-15T14:53:04Z",
|
||||
"pushed_at": "2020-09-14T12:47:09Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "[CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-14T02:42:41Z",
|
||||
"updated_at": "2020-09-14T18:42:44Z",
|
||||
"updated_at": "2020-09-15T11:33:18Z",
|
||||
"pushed_at": "2020-09-09T19:33:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-13T13:39:02Z",
|
||||
"updated_at": "2020-09-15T10:25:16Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"forks_count": 168,
|
||||
"forks": 168,
|
||||
"watchers": 682,
|
||||
"watchers": 683,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-15T09:01:59Z",
|
||||
"updated_at": "2020-09-15T14:51:16Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1736,
|
||||
"watchers_count": 1736,
|
||||
"forks_count": 460,
|
||||
"forks": 460,
|
||||
"watchers": 1736,
|
||||
"stargazers_count": 1756,
|
||||
"watchers_count": 1756,
|
||||
"forks_count": 461,
|
||||
"forks": 461,
|
||||
"watchers": 1756,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -500,6 +500,10 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu
|
|||
- [VoidSec/CVE-2020-1472](https://github.com/VoidSec/CVE-2020-1472)
|
||||
- [risksense/zerologon](https://github.com/risksense/zerologon)
|
||||
- [bb00/zer0dump](https://github.com/bb00/zer0dump)
|
||||
- [Kamimuka/CVE-2020-1472](https://github.com/Kamimuka/CVE-2020-1472)
|
||||
- [NAXG/CVE-2020-1472](https://github.com/NAXG/CVE-2020-1472)
|
||||
- [s0wr0b1ndef/CVE-2020-1472](https://github.com/s0wr0b1ndef/CVE-2020-1472)
|
||||
- [harshil-shah004/zerologon-CVE-2020-1472](https://github.com/harshil-shah004/zerologon-CVE-2020-1472)
|
||||
|
||||
### CVE-2020-1493
|
||||
|
||||
|
|
Loading…
Reference in a new issue