mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/04/07 12:34:48
This commit is contained in:
parent
1deb0913c0
commit
aeb9617ece
34 changed files with 280 additions and 122 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-04-06T09:44:43Z",
|
||||
"updated_at": "2023-04-07T08:48:08Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1659,
|
||||
"watchers_count": 1659,
|
||||
"stargazers_count": 1660,
|
||||
"watchers_count": 1660,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1659,
|
||||
"watchers": 1660,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -438,7 +438,7 @@
|
|||
"stargazers_count": 721,
|
||||
"watchers_count": 721,
|
||||
"has_discussions": false,
|
||||
"forks_count": 428,
|
||||
"forks_count": 429,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -448,7 +448,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 428,
|
||||
"forks": 429,
|
||||
"watchers": 721,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -785,10 +785,10 @@
|
|||
"description": "编译好的脏牛漏洞(CVE-2016-5195)EXP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-27T08:06:50Z",
|
||||
"updated_at": "2023-04-04T10:17:59Z",
|
||||
"updated_at": "2023-04-07T08:01:05Z",
|
||||
"pushed_at": "2018-05-27T08:24:17Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -797,7 +797,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -459,10 +459,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2023-03-30T06:27:52Z",
|
||||
"updated_at": "2023-04-07T11:44:04Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -471,7 +471,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 381,
|
||||
"watchers": 383,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-04-06T09:44:43Z",
|
||||
"updated_at": "2023-04-07T08:48:08Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1659,
|
||||
"watchers_count": 1659,
|
||||
"stargazers_count": 1660,
|
||||
"watchers_count": 1660,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1659,
|
||||
"watchers": 1660,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -559,19 +559,19 @@
|
|||
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-29T17:36:11Z",
|
||||
"updated_at": "2023-01-20T05:37:20Z",
|
||||
"updated_at": "2023-04-07T11:55:49Z",
|
||||
"pushed_at": "2020-11-29T17:48:55Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"forks": 9,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -568,10 +568,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-04-06T09:44:43Z",
|
||||
"updated_at": "2023-04-07T08:48:08Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1659,
|
||||
"watchers_count": 1659,
|
||||
"stargazers_count": 1660,
|
||||
"watchers_count": 1660,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -601,7 +601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1659,
|
||||
"watchers": 1660,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-04-06T03:26:14Z",
|
||||
"updated_at": "2023-04-07T08:05:40Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3713,
|
||||
"watchers_count": 3713,
|
||||
"stargazers_count": 3714,
|
||||
"watchers_count": 3714,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1072,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1072,
|
||||
"watchers": 3713,
|
||||
"watchers": 3714,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-04-06T09:44:43Z",
|
||||
"updated_at": "2023-04-07T08:48:08Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1659,
|
||||
"watchers_count": 1659,
|
||||
"stargazers_count": 1660,
|
||||
"watchers_count": 1660,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1659,
|
||||
"watchers": 1660,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-04-06T03:26:14Z",
|
||||
"updated_at": "2023-04-07T08:05:40Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3713,
|
||||
"watchers_count": 3713,
|
||||
"stargazers_count": 3714,
|
||||
"watchers_count": 3714,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1072,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1072,
|
||||
"watchers": 3713,
|
||||
"watchers": 3714,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -889,10 +889,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2023-04-06T02:08:12Z",
|
||||
"updated_at": "2023-04-07T07:32:16Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -901,7 +901,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-04-06T09:44:43Z",
|
||||
"updated_at": "2023-04-07T08:48:08Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1659,
|
||||
"watchers_count": 1659,
|
||||
"stargazers_count": 1660,
|
||||
"watchers_count": 1660,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1659,
|
||||
"watchers": 1660,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -183,10 +183,10 @@
|
|||
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-16T03:01:32Z",
|
||||
"updated_at": "2023-03-25T07:00:23Z",
|
||||
"updated_at": "2023-04-07T11:31:00Z",
|
||||
"pushed_at": "2022-08-07T06:36:30Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -195,7 +195,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -143,5 +143,34 @@
|
|||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 624776221,
|
||||
"name": "SAP_CVE-2020-6287_find_mandate",
|
||||
"full_name": "qmakake\/SAP_CVE-2020-6287_find_mandate",
|
||||
"owner": {
|
||||
"login": "qmakake",
|
||||
"id": 80854804,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80854804?v=4",
|
||||
"html_url": "https:\/\/github.com\/qmakake"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qmakake\/SAP_CVE-2020-6287_find_mandate",
|
||||
"description": "Checker help to verify created account or find it's mandat",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-07T08:24:12Z",
|
||||
"updated_at": "2023-04-07T08:28:52Z",
|
||||
"pushed_at": "2023-04-07T11:08:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 1677,
|
||||
"watchers_count": 1677,
|
||||
"has_discussions": false,
|
||||
"forks_count": 583,
|
||||
"forks_count": 582,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 583,
|
||||
"forks": 582,
|
||||
"watchers": 1677,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -216,10 +216,10 @@
|
|||
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T09:50:26Z",
|
||||
"updated_at": "2023-04-04T14:09:51Z",
|
||||
"updated_at": "2023-04-07T07:45:47Z",
|
||||
"pushed_at": "2022-02-10T11:38:46Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -228,7 +228,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1039,10 +1039,10 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2023-04-01T14:07:26Z",
|
||||
"updated_at": "2023-04-07T06:50:01Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 581,
|
||||
"watchers_count": 581,
|
||||
"stargazers_count": 582,
|
||||
"watchers_count": 582,
|
||||
"has_discussions": false,
|
||||
"forks_count": 159,
|
||||
"allow_forking": true,
|
||||
|
@ -1051,7 +1051,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 159,
|
||||
"watchers": 581,
|
||||
"watchers": 582,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2023-03-29T11:33:24Z",
|
||||
"updated_at": "2023-04-07T08:25:46Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1197,
|
||||
"watchers_count": 1197,
|
||||
"stargazers_count": 1198,
|
||||
"watchers_count": 1198,
|
||||
"has_discussions": false,
|
||||
"forks_count": 306,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 1197,
|
||||
"forks": 307,
|
||||
"watchers": 1198,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -4122,10 +4122,10 @@
|
|||
"description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T11:06:46Z",
|
||||
"updated_at": "2023-01-10T09:11:07Z",
|
||||
"updated_at": "2023-04-07T08:10:34Z",
|
||||
"pushed_at": "2021-12-26T09:58:06Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -4134,7 +4134,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8989,10 +8989,10 @@
|
|||
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T15:22:50Z",
|
||||
"updated_at": "2023-03-20T01:26:01Z",
|
||||
"updated_at": "2023-04-07T10:34:26Z",
|
||||
"pushed_at": "2022-12-30T12:32:05Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -9001,7 +9001,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-12-10T12:38:08Z",
|
||||
"updated_at": "2023-03-01T08:14:01Z",
|
||||
"pushed_at": "2023-04-06T20:32:04Z",
|
||||
"pushed_at": "2023-04-07T11:06:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -856,10 +856,10 @@
|
|||
"description": "spring-cloud-gateway-rce CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-13T10:00:21Z",
|
||||
"updated_at": "2023-02-13T04:35:29Z",
|
||||
"updated_at": "2023-04-07T08:23:17Z",
|
||||
"pushed_at": "2022-07-13T02:38:10Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -868,7 +868,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2055,10 +2055,10 @@
|
|||
"description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-28T04:50:16Z",
|
||||
"updated_at": "2023-03-27T03:25:14Z",
|
||||
"updated_at": "2023-04-07T07:40:47Z",
|
||||
"pushed_at": "2022-12-29T03:32:45Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -2067,7 +2067,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-27666",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T22:54:28Z",
|
||||
"updated_at": "2023-02-02T00:58:48Z",
|
||||
"updated_at": "2023-04-07T08:16:11Z",
|
||||
"pushed_at": "2022-03-28T18:21:00Z",
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 194,
|
||||
"watchers": 195,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T03:48:11Z",
|
||||
"updated_at": "2023-03-22T13:11:20Z",
|
||||
"updated_at": "2023-04-07T09:47:07Z",
|
||||
"pushed_at": "2023-01-17T12:27:08Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -169,10 +169,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T17:33:26Z",
|
||||
"updated_at": "2022-12-09T17:21:25Z",
|
||||
"updated_at": "2023-04-07T08:25:52Z",
|
||||
"pushed_at": "2022-11-02T17:33:46Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
52
2022/CVE-2022-38604.json
Normal file
52
2022/CVE-2022-38604.json
Normal file
|
@ -0,0 +1,52 @@
|
|||
[
|
||||
{
|
||||
"id": 520518592,
|
||||
"name": "CVE-2022-38604",
|
||||
"full_name": "LucaBarile\/CVE-2022-38604",
|
||||
"owner": {
|
||||
"login": "LucaBarile",
|
||||
"id": 74877659,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74877659?v=4",
|
||||
"html_url": "https:\/\/github.com\/LucaBarile"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LucaBarile\/CVE-2022-38604",
|
||||
"description": "Exploit for CVE-2022-0003",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-02T13:53:18Z",
|
||||
"updated_at": "2023-04-07T12:24:29Z",
|
||||
"pushed_at": "2023-04-05T13:35:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0-day",
|
||||
"arbitrary-file-deletion",
|
||||
"denial-of-service",
|
||||
"disclosure",
|
||||
"elevation-of-privilege",
|
||||
"exploit",
|
||||
"impersonation",
|
||||
"link-following",
|
||||
"link-following-attack",
|
||||
"local-privilege-escalation",
|
||||
"mount-point",
|
||||
"poc",
|
||||
"proof-of-concept",
|
||||
"symbolic-link",
|
||||
"vulnerability",
|
||||
"wacom",
|
||||
"wacom-vulnerability",
|
||||
"windows-denial-of-service",
|
||||
"write-up",
|
||||
"zero-day"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -228,10 +228,10 @@
|
|||
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-20T03:11:03Z",
|
||||
"updated_at": "2023-03-28T10:27:50Z",
|
||||
"updated_at": "2023-04-07T07:43:04Z",
|
||||
"pushed_at": "2022-10-20T06:36:42Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -240,7 +240,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T21:26:28Z",
|
||||
"updated_at": "2023-04-04T06:28:03Z",
|
||||
"updated_at": "2023-04-07T08:29:19Z",
|
||||
"pushed_at": "2023-01-19T13:10:07Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2023/CVE-2023-21389.json
Normal file
31
2023/CVE-2023-21389.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 624796659,
|
||||
"name": "Weblogic_CVE-2023-21389",
|
||||
"full_name": "sxsuperxuan\/Weblogic_CVE-2023-21389",
|
||||
"owner": {
|
||||
"login": "sxsuperxuan",
|
||||
"id": 103333386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103333386?v=4",
|
||||
"html_url": "https:\/\/github.com\/sxsuperxuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sxsuperxuan\/Weblogic_CVE-2023-21389",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-04-07T09:25:09Z",
|
||||
"updated_at": "2023-04-07T09:39:05Z",
|
||||
"pushed_at": "2023-04-07T09:53:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T15:19:23Z",
|
||||
"updated_at": "2023-04-06T15:12:04Z",
|
||||
"updated_at": "2023-04-07T08:27:05Z",
|
||||
"pushed_at": "2023-02-15T18:10:53Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 92,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -80,10 +80,10 @@
|
|||
"description": "CVE-2023-22809 Linux Sudo",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-06T03:11:48Z",
|
||||
"updated_at": "2023-04-06T17:24:14Z",
|
||||
"updated_at": "2023-04-07T08:15:59Z",
|
||||
"pushed_at": "2023-04-06T03:17:33Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -92,7 +92,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-03-16T17:28:27Z",
|
||||
"updated_at": "2023-03-18T14:00:07Z",
|
||||
"pushed_at": "2023-03-16T17:38:37Z",
|
||||
"pushed_at": "2023-04-07T12:03:14Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -173,13 +173,13 @@
|
|||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"forks": 48,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
|
|
31
2023/CVE-2023-27100.json
Normal file
31
2023/CVE-2023-27100.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 624761642,
|
||||
"name": "CVE-2023-27100",
|
||||
"full_name": "DarokNET\/CVE-2023-27100",
|
||||
"owner": {
|
||||
"login": "DarokNET",
|
||||
"id": 61823580,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61823580?v=4",
|
||||
"html_url": "https:\/\/github.com\/DarokNET"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DarokNET\/CVE-2023-27100",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-04-07T07:38:48Z",
|
||||
"updated_at": "2023-04-07T09:13:53Z",
|
||||
"pushed_at": "2023-04-07T09:14:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T16:27:47Z",
|
||||
"updated_at": "2023-03-30T02:02:10Z",
|
||||
"updated_at": "2023-04-07T07:08:47Z",
|
||||
"pushed_at": "2023-03-24T02:27:36Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
15
README.md
15
README.md
|
@ -184,6 +184,9 @@ In BitmapExport.java, there is a possible failure to truncate images due to a lo
|
|||
- [schdork/acropolypse-bot](https://github.com/schdork/acropolypse-bot)
|
||||
- [lordofpipes/acropadetect](https://github.com/lordofpipes/acropadetect)
|
||||
|
||||
### CVE-2023-21389
|
||||
- [sxsuperxuan/Weblogic_CVE-2023-21389](https://github.com/sxsuperxuan/Weblogic_CVE-2023-21389)
|
||||
|
||||
### CVE-2023-21608 (2023-01-18)
|
||||
|
||||
<code>
|
||||
|
@ -604,6 +607,14 @@ An issue in the password reset function of Peppermint v0.2.4 allows attackers to
|
|||
### CVE-2023-27053
|
||||
- [d3fudd/XSS-HGJ310](https://github.com/d3fudd/XSS-HGJ310)
|
||||
|
||||
### CVE-2023-27100 (2023-03-22)
|
||||
|
||||
<code>
|
||||
Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests.
|
||||
</code>
|
||||
|
||||
- [DarokNET/CVE-2023-27100](https://github.com/DarokNET/CVE-2023-27100)
|
||||
|
||||
### CVE-2023-27326
|
||||
- [Impalabs/CVE-2023-27326](https://github.com/Impalabs/CVE-2023-27326)
|
||||
|
||||
|
@ -5528,6 +5539,9 @@ ProcessMaker before v3.5.4 was discovered to contain insecure permissions in the
|
|||
|
||||
- [sornram9254/CVE-2022-38577-Processmaker](https://github.com/sornram9254/CVE-2022-38577-Processmaker)
|
||||
|
||||
### CVE-2022-38604
|
||||
- [LucaBarile/CVE-2022-38604](https://github.com/LucaBarile/CVE-2022-38604)
|
||||
|
||||
### CVE-2022-38766 (2023-01-03)
|
||||
|
||||
<code>
|
||||
|
@ -15253,6 +15267,7 @@ SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.
|
|||
- [Onapsis/CVE-2020-6287_RECON-scanner](https://github.com/Onapsis/CVE-2020-6287_RECON-scanner)
|
||||
- [ynsmroztas/CVE-2020-6287-Sap-Add-User](https://github.com/ynsmroztas/CVE-2020-6287-Sap-Add-User)
|
||||
- [murataydemir/CVE-2020-6287](https://github.com/murataydemir/CVE-2020-6287)
|
||||
- [qmakake/SAP_CVE-2020-6287_find_mandate](https://github.com/qmakake/SAP_CVE-2020-6287_find_mandate)
|
||||
|
||||
### CVE-2020-6308 (2020-10-20)
|
||||
|
||||
|
|
Loading…
Reference in a new issue