mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/02/05 00:09:50
This commit is contained in:
parent
ef70af28ed
commit
ae295234c3
25 changed files with 118 additions and 94 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2021-02-03T08:18:36Z",
|
||||
"updated_at": "2021-02-04T09:46:22Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2249,
|
||||
"watchers_count": 2249,
|
||||
"stargazers_count": 2250,
|
||||
"watchers_count": 2250,
|
||||
"forks_count": 484,
|
||||
"forks": 484,
|
||||
"watchers": 2249,
|
||||
"watchers": 2250,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-04T08:26:34Z",
|
||||
"updated_at": "2021-02-04T12:17:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 914,
|
||||
"watchers": 913,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-04T08:26:34Z",
|
||||
"updated_at": "2021-02-04T12:17:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 914,
|
||||
"watchers": 913,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit of the CVE-2016-1494 allowing to forge signatures of RSA keys with low exponents",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-02T09:32:02Z",
|
||||
"updated_at": "2018-03-12T19:45:06Z",
|
||||
"updated_at": "2021-02-04T13:48:18Z",
|
||||
"pushed_at": "2017-01-28T13:31:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2021-02-01T07:49:02Z",
|
||||
"updated_at": "2021-02-04T13:06:31Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 481,
|
||||
"watchers_count": 481,
|
||||
"stargazers_count": 482,
|
||||
"watchers_count": 482,
|
||||
"forks_count": 244,
|
||||
"forks": 244,
|
||||
"watchers": 481,
|
||||
"watchers": 482,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-04T08:26:34Z",
|
||||
"updated_at": "2021-02-04T12:17:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 914,
|
||||
"watchers": 913,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2018-08-29T00:03:56Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-04T08:26:34Z",
|
||||
"updated_at": "2021-02-04T12:17:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 914,
|
||||
"watchers": 913,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-02-02T01:58:40Z",
|
||||
"updated_at": "2021-02-04T09:45:34Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 359,
|
||||
"watchers": 358,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2021-01-17T19:02:17Z",
|
||||
"updated_at": "2021-02-04T13:30:58Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 246,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2326,
|
||||
"watchers_count": 2326,
|
||||
"forks_count": 652,
|
||||
"forks": 652,
|
||||
"forks_count": 654,
|
||||
"forks": 654,
|
||||
"watchers": 2326,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2021-02-01T05:23:39Z",
|
||||
"updated_at": "2021-02-04T11:07:15Z",
|
||||
"pushed_at": "2020-06-04T13:17:10Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-04T08:26:34Z",
|
||||
"updated_at": "2021-02-04T12:17:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 914,
|
||||
"watchers": 913,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,8 +59,8 @@
|
|||
"description": "CVE-2019-5475 靶场: RCE 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-16T14:03:16Z",
|
||||
"updated_at": "2021-01-12T07:44:38Z",
|
||||
"pushed_at": "2020-12-23T04:36:33Z",
|
||||
"updated_at": "2021-02-04T10:58:37Z",
|
||||
"pushed_at": "2021-02-04T10:58:35Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-02-04T05:42:50Z",
|
||||
"updated_at": "2021-02-04T13:12:45Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1068,
|
||||
"watchers_count": 1068,
|
||||
"stargazers_count": 1069,
|
||||
"watchers_count": 1069,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1068,
|
||||
"watchers": 1069,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-11651: Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T11:47:56Z",
|
||||
"updated_at": "2020-11-06T13:17:26Z",
|
||||
"updated_at": "2021-02-04T13:14:12Z",
|
||||
"pushed_at": "2020-05-05T03:27:11Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2326,
|
||||
"watchers_count": 2326,
|
||||
"forks_count": 652,
|
||||
"forks": 652,
|
||||
"forks_count": 654,
|
||||
"forks": 654,
|
||||
"watchers": 2326,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-26T10:15:32Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-06T23:51:32Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-04T08:26:34Z",
|
||||
"updated_at": "2021-02-04T12:17:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 914,
|
||||
"watchers": 913,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2020-05-17T12:07:01Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 143,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335952760,
|
||||
"name": "CVE-2021-25646-GUI",
|
||||
"full_name": "AirEvan\/CVE-2021-25646-GUI",
|
||||
"owner": {
|
||||
"login": "AirEvan",
|
||||
"id": 26640179,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26640179?v=4",
|
||||
"html_url": "https:\/\/github.com\/AirEvan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AirEvan\/CVE-2021-25646-GUI",
|
||||
"description": "CSharp CVE-2021-25646-GUI",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T12:51:01Z",
|
||||
"updated_at": "2021-02-04T13:05:02Z",
|
||||
"pushed_at": "2021-02-04T13:08:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2021-3019 lanproxy目录遍历任意文件读取漏洞探测POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T04:18:44Z",
|
||||
"updated_at": "2021-01-27T06:18:26Z",
|
||||
"updated_at": "2021-02-04T10:42:15Z",
|
||||
"pushed_at": "2021-01-13T07:29:01Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-02-04T07:53:39Z",
|
||||
"updated_at": "2021-02-04T14:47:32Z",
|
||||
"pushed_at": "2021-01-30T04:30:24Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 273,
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-02-04T09:00:43Z",
|
||||
"updated_at": "2021-02-04T13:20:48Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 494,
|
||||
"stargazers_count": 503,
|
||||
"watchers_count": 503,
|
||||
"forks_count": 138,
|
||||
"forks": 138,
|
||||
"watchers": 503,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -634,13 +634,13 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-02-03T23:30:21Z",
|
||||
"updated_at": "2021-02-04T13:35:06Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -131,6 +131,7 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
|
|||
|
||||
- [yaunsky/cve-2021-25646](https://github.com/yaunsky/cve-2021-25646)
|
||||
- [lp008/CVE-2021-25646](https://github.com/lp008/CVE-2021-25646)
|
||||
- [AirEvan/CVE-2021-25646-GUI](https://github.com/AirEvan/CVE-2021-25646-GUI)
|
||||
|
||||
|
||||
## 2020
|
||||
|
|
Loading…
Reference in a new issue