mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/12/18 00:09:54
This commit is contained in:
parent
bf754fbafd
commit
a88b5084a4
31 changed files with 196 additions and 135 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2013-6282 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2013-11-18T03:08:41Z",
|
||||
"updated_at": "2019-10-20T07:13:13Z",
|
||||
"updated_at": "2020-12-17T10:07:21Z",
|
||||
"pushed_at": "2013-11-18T08:56:33Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 25,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2013-6282 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2013-11-28T08:34:35Z",
|
||||
"updated_at": "2017-08-06T23:25:14Z",
|
||||
"updated_at": "2020-12-17T10:07:19Z",
|
||||
"pushed_at": "2013-11-28T08:38:53Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2014-3153 aka towelroot",
|
||||
"fork": false,
|
||||
"created_at": "2014-07-24T13:28:00Z",
|
||||
"updated_at": "2020-11-13T15:45:10Z",
|
||||
"updated_at": "2020-12-17T10:06:58Z",
|
||||
"pushed_at": "2017-04-25T07:24:08Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 119,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86",
|
||||
"fork": false,
|
||||
"created_at": "2014-09-20T08:24:15Z",
|
||||
"updated_at": "2020-08-19T15:34:32Z",
|
||||
"updated_at": "2020-12-17T10:07:00Z",
|
||||
"pushed_at": "2014-10-25T10:45:32Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 40,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,8 +174,8 @@
|
|||
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-31T11:39:11Z",
|
||||
"updated_at": "2020-12-13T19:40:23Z",
|
||||
"pushed_at": "2020-12-13T19:36:06Z",
|
||||
"updated_at": "2020-12-17T09:46:29Z",
|
||||
"pushed_at": "2020-12-17T09:46:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2014-4322 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2015-08-16T00:02:45Z",
|
||||
"updated_at": "2020-10-12T10:02:59Z",
|
||||
"updated_at": "2020-12-17T10:07:38Z",
|
||||
"pushed_at": "2016-01-24T16:19:47Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 20,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2014-4323 poc",
|
||||
"fork": false,
|
||||
"created_at": "2015-10-15T04:21:08Z",
|
||||
"updated_at": "2020-08-06T09:12:41Z",
|
||||
"updated_at": "2020-12-17T10:05:22Z",
|
||||
"pushed_at": "2015-10-15T04:21:45Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,7 +82,7 @@
|
|||
"description": "exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;",
|
||||
"fork": false,
|
||||
"created_at": "2015-12-29T07:28:46Z",
|
||||
"updated_at": "2020-10-03T01:51:16Z",
|
||||
"updated_at": "2020-12-17T10:26:55Z",
|
||||
"pushed_at": "2016-01-01T15:14:47Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-24T13:49:03Z",
|
||||
"updated_at": "2020-10-03T01:49:30Z",
|
||||
"updated_at": "2020-12-17T10:07:05Z",
|
||||
"pushed_at": "2016-01-24T22:20:44Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 72,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-03-24T02:55:09Z",
|
||||
"updated_at": "2020-04-02T08:01:42Z",
|
||||
"updated_at": "2020-12-17T10:05:31Z",
|
||||
"pushed_at": "2016-04-20T03:52:22Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 33,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2015-1805 root tool",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-01T12:10:14Z",
|
||||
"updated_at": "2020-07-17T17:39:28Z",
|
||||
"updated_at": "2020-12-17T10:05:19Z",
|
||||
"pushed_at": "2017-11-23T20:55:03Z",
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"forks_count": 148,
|
||||
"forks": 148,
|
||||
"watchers": 251,
|
||||
"watchers": 250,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC code for 32 bit Android OS",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-12T01:31:36Z",
|
||||
"updated_at": "2020-11-12T10:10:34Z",
|
||||
"updated_at": "2020-12-17T10:07:18Z",
|
||||
"pushed_at": "2015-12-15T05:42:02Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 130,
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 129,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "root with CVE-2015-3636",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-13T06:23:54Z",
|
||||
"updated_at": "2017-06-27T13:20:08Z",
|
||||
"updated_at": "2020-12-17T10:04:18Z",
|
||||
"pushed_at": "2016-07-13T06:24:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-06T12:00:27Z",
|
||||
"updated_at": "2020-04-22T04:43:37Z",
|
||||
"updated_at": "2020-12-17T09:59:05Z",
|
||||
"pushed_at": "2017-08-30T15:17:08Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 54,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,12 +59,12 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2020-12-11T23:12:20Z",
|
||||
"updated_at": "2020-12-17T10:07:11Z",
|
||||
"pushed_at": "2020-08-18T10:37:49Z",
|
||||
"stargazers_count": 858,
|
||||
"watchers_count": 858,
|
||||
"forks_count": 401,
|
||||
"forks": 401,
|
||||
"forks_count": 402,
|
||||
"forks": 402,
|
||||
"watchers": 858,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "poc for cve-2017-10661",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-11T10:45:10Z",
|
||||
"updated_at": "2019-10-26T03:49:46Z",
|
||||
"updated_at": "2020-12-17T10:26:55Z",
|
||||
"pushed_at": "2017-08-11T10:45:56Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-07-02T08:48:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "None",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-09T06:03:37Z",
|
||||
"updated_at": "2019-12-16T05:30:33Z",
|
||||
"updated_at": "2020-12-17T09:33:33Z",
|
||||
"pushed_at": "2018-08-25T16:09:21Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 19,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-10-02T09:03:37Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -473,8 +473,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2020-12-17T06:50:16Z",
|
||||
"pushed_at": "2020-12-17T06:50:13Z",
|
||||
"updated_at": "2020-12-17T11:42:56Z",
|
||||
"pushed_at": "2020-12-17T11:42:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T14:23:18Z",
|
||||
"updated_at": "2020-12-03T00:51:46Z",
|
||||
"updated_at": "2020-12-17T09:40:02Z",
|
||||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 112,
|
||||
"forks": 112,
|
||||
"watchers": 330,
|
||||
"watchers": 329,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +243,13 @@
|
|||
"description": "CVE-2018-7600 - Drupal 7.x RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-16T20:16:21Z",
|
||||
"updated_at": "2020-04-13T06:38:38Z",
|
||||
"updated_at": "2020-12-17T09:40:30Z",
|
||||
"pushed_at": "2018-04-18T20:34:19Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 69,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1278,13 +1278,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-12-09T09:45:10Z",
|
||||
"updated_at": "2020-12-17T11:13:28Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 781,
|
||||
"watchers_count": 781,
|
||||
"stargazers_count": 782,
|
||||
"watchers_count": 782,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 781,
|
||||
"watchers": 782,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-17T08:08:25Z",
|
||||
"updated_at": "2020-12-17T10:36:46Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2172,
|
||||
"watchers_count": 2172,
|
||||
"forks_count": 608,
|
||||
"forks": 608,
|
||||
"watchers": 2172,
|
||||
"stargazers_count": 2174,
|
||||
"watchers_count": 2174,
|
||||
"forks_count": 609,
|
||||
"forks": 609,
|
||||
"watchers": 2174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-2107",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T14:18:33Z",
|
||||
"updated_at": "2020-12-15T22:49:30Z",
|
||||
"updated_at": "2020-12-17T10:16:56Z",
|
||||
"pushed_at": "2020-11-02T06:43:15Z",
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 309,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T06:32:08Z",
|
||||
"updated_at": "2020-09-28T11:10:48Z",
|
||||
"updated_at": "2020-12-17T10:54:34Z",
|
||||
"pushed_at": "2019-11-12T03:58:00Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-12-17T02:54:09Z",
|
||||
"updated_at": "2020-12-17T10:20:26Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"stargazers_count": 684,
|
||||
"watchers_count": 684,
|
||||
"forks_count": 143,
|
||||
"forks": 143,
|
||||
"watchers": 683,
|
||||
"watchers": 684,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,8 +59,8 @@
|
|||
"description": "CVE-2019-5475 靶场",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-16T14:03:16Z",
|
||||
"updated_at": "2020-12-16T16:16:48Z",
|
||||
"pushed_at": "2020-12-16T16:16:46Z",
|
||||
"updated_at": "2020-12-17T14:56:40Z",
|
||||
"pushed_at": "2020-12-17T14:56:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T02:20:07Z",
|
||||
"updated_at": "2020-06-07T15:07:56Z",
|
||||
"updated_at": "2020-12-17T12:43:21Z",
|
||||
"pushed_at": "2020-03-12T02:49:10Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-12-17T00:50:47Z",
|
||||
"updated_at": "2020-12-17T14:56:06Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1210,
|
||||
"watchers_count": 1210,
|
||||
"stargazers_count": 1211,
|
||||
"watchers_count": 1211,
|
||||
"forks_count": 277,
|
||||
"forks": 277,
|
||||
"watchers": 1210,
|
||||
"watchers": 1211,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-12-17T09:07:48Z",
|
||||
"updated_at": "2020-12-17T13:36:06Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 721,
|
||||
"watchers_count": 721,
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"forks_count": 208,
|
||||
"forks": 208,
|
||||
"watchers": 721,
|
||||
"watchers": 722,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-12-16T15:35:38Z",
|
||||
"updated_at": "2020-12-17T11:24:58Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 246,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-17T08:08:25Z",
|
||||
"updated_at": "2020-12-17T10:36:46Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2172,
|
||||
"watchers_count": 2172,
|
||||
"forks_count": 608,
|
||||
"forks": 608,
|
||||
"watchers": 2172,
|
||||
"stargazers_count": 2174,
|
||||
"watchers_count": 2174,
|
||||
"forks_count": 609,
|
||||
"forks": 609,
|
||||
"watchers": 2174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2020-12-17T05:52:41Z",
|
||||
"updated_at": "2020-12-17T13:38:58Z",
|
||||
"pushed_at": "2020-12-15T02:33:45Z",
|
||||
"stargazers_count": 454,
|
||||
"watchers_count": 454,
|
||||
"stargazers_count": 456,
|
||||
"watchers_count": 456,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 454,
|
||||
"watchers": 456,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Collect S2-061 payloads",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-10T17:42:37Z",
|
||||
"updated_at": "2020-12-17T05:17:45Z",
|
||||
"updated_at": "2020-12-17T10:53:06Z",
|
||||
"pushed_at": "2020-12-15T16:43:15Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 26,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T03:10:34Z",
|
||||
"updated_at": "2020-11-11T15:08:37Z",
|
||||
"updated_at": "2020-12-17T14:18:09Z",
|
||||
"pushed_at": "2020-10-25T22:54:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-28647.json
Normal file
25
2020/CVE-2020-28647.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 322287030,
|
||||
"name": "Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647",
|
||||
"full_name": "SECFORCE\/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647",
|
||||
"owner": {
|
||||
"login": "SECFORCE",
|
||||
"id": 8157384,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
|
||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SECFORCE\/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647",
|
||||
"description": "MOVEit Transfer 2020 web application Stored Cross-Site Scripting (XSS)",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-17T12:23:18Z",
|
||||
"updated_at": "2020-12-17T12:33:47Z",
|
||||
"pushed_at": "2020-12-17T12:31:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-35488.json
Normal file
25
2020/CVE-2020-35488.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 321746763,
|
||||
"name": "CVE-2020-35488",
|
||||
"full_name": "GuillaumePetit84\/CVE-2020-35488",
|
||||
"owner": {
|
||||
"login": "GuillaumePetit84",
|
||||
"id": 66068507,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/66068507?v=4",
|
||||
"html_url": "https:\/\/github.com\/GuillaumePetit84"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GuillaumePetit84\/CVE-2020-35488",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-15T17:55:07Z",
|
||||
"updated_at": "2020-12-17T15:03:01Z",
|
||||
"pushed_at": "2020-12-17T15:02:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -3252,6 +3252,14 @@ A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Pay
|
|||
|
||||
- [jet-pentest/CVE-2020-28415](https://github.com/jet-pentest/CVE-2020-28415)
|
||||
|
||||
### CVE-2020-28647 (2020-11-17)
|
||||
|
||||
<code>
|
||||
In Progress MOVEit Transfer before 2020.1, a malicious user could craft and store a payload within the application. If a victim within the MOVEit Transfer instance interacts with the stored payload, it could invoke and execute arbitrary code within the context of the victim's browser (XSS).
|
||||
</code>
|
||||
|
||||
- [SECFORCE/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647](https://github.com/SECFORCE/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647)
|
||||
|
||||
### CVE-2020-28948 (2020-11-19)
|
||||
|
||||
<code>
|
||||
|
@ -3311,6 +3319,9 @@ In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is
|
|||
|
||||
- [code-byter/CVE-2020-29669](https://github.com/code-byter/CVE-2020-29669)
|
||||
|
||||
### CVE-2020-35488
|
||||
- [GuillaumePetit84/CVE-2020-35488](https://github.com/GuillaumePetit84/CVE-2020-35488)
|
||||
|
||||
### CVE-2020-72381
|
||||
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue