mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/03/19 12:10:32
This commit is contained in:
parent
2cd3242c13
commit
affdc94564
36 changed files with 243 additions and 229 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-18T09:14:01Z",
|
||||
"updated_at": "2021-03-19T01:29:39Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"stargazers_count": 959,
|
||||
"watchers_count": 959,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 958,
|
||||
"watchers": 959,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-18T09:14:01Z",
|
||||
"updated_at": "2021-03-19T01:29:39Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"stargazers_count": 959,
|
||||
"watchers_count": 959,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 958,
|
||||
"watchers": 959,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-18T09:14:01Z",
|
||||
"updated_at": "2021-03-19T01:29:39Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"stargazers_count": 959,
|
||||
"watchers_count": 959,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 958,
|
||||
"watchers": 959,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-18T09:14:01Z",
|
||||
"updated_at": "2021-03-19T01:29:39Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"stargazers_count": 959,
|
||||
"watchers_count": 959,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 958,
|
||||
"watchers": 959,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2018-8581",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T06:08:23Z",
|
||||
"updated_at": "2021-03-15T09:54:03Z",
|
||||
"updated_at": "2021-03-19T02:20:45Z",
|
||||
"pushed_at": "2019-06-21T11:29:41Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 313,
|
||||
"watchers": 314,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 176290079,
|
||||
"name": "CVE-2019-0193",
|
||||
"full_name": "xConsoIe\/CVE-2019-0193",
|
||||
"owner": {
|
||||
"login": "xConsoIe",
|
||||
"id": 48456709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48456709?v=4",
|
||||
"html_url": "https:\/\/github.com\/xConsoIe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-03-18T13:18:01Z",
|
||||
"updated_at": "2020-11-29T10:18:07Z",
|
||||
"pushed_at": "2019-03-18T13:22:48Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 201405406,
|
||||
"name": "CVE-2019-0193",
|
||||
|
|
|
@ -1857,8 +1857,8 @@
|
|||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 286,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 349285752,
|
||||
"name": "CVE-2019-1003000-2018-1000861-jenkins-rce",
|
||||
"full_name": "PetrusViet\/CVE-2019-1003000-2018-1000861-jenkins-rce",
|
||||
"owner": {
|
||||
"login": "PetrusViet",
|
||||
"id": 63145078,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63145078?v=4",
|
||||
"html_url": "https:\/\/github.com\/PetrusViet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PetrusViet\/CVE-2019-1003000-2018-1000861-jenkins-rce",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T03:12:00Z",
|
||||
"updated_at": "2021-03-19T03:12:03Z",
|
||||
"pushed_at": "2021-03-19T03:12:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A standalone POC for CVE-2019-12840",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-09T17:48:39Z",
|
||||
"updated_at": "2020-05-18T15:37:25Z",
|
||||
"updated_at": "2021-03-19T02:36:25Z",
|
||||
"pushed_at": "2019-11-10T13:26:41Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-18T16:08:05Z",
|
||||
"updated_at": "2021-03-19T01:29:02Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2403,
|
||||
"watchers_count": 2403,
|
||||
"stargazers_count": 2404,
|
||||
"watchers_count": 2404,
|
||||
"forks_count": 693,
|
||||
"forks": 693,
|
||||
"watchers": 2403,
|
||||
"watchers": 2404,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -60,7 +60,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-01-18T13:32:21Z",
|
||||
"updated_at": "2020-03-30T03:21:39Z",
|
||||
"pushed_at": "2020-06-05T20:32:20Z",
|
||||
"pushed_at": "2021-03-18T22:48:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-18T09:14:01Z",
|
||||
"updated_at": "2021-03-19T01:29:39Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"stargazers_count": 959,
|
||||
"watchers_count": 959,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 958,
|
||||
"watchers": 959,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-2729 Exploit Script",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T03:49:51Z",
|
||||
"updated_at": "2021-03-17T03:31:59Z",
|
||||
"updated_at": "2021-03-19T02:40:30Z",
|
||||
"pushed_at": "2020-02-19T08:48:02Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-3403.json
Normal file
25
2019/CVE-2019-3403.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 349235683,
|
||||
"name": "CVE-2019-3403",
|
||||
"full_name": "davidmckennirey\/CVE-2019-3403",
|
||||
"owner": {
|
||||
"login": "davidmckennirey",
|
||||
"id": 26097321,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26097321?v=4",
|
||||
"html_url": "https:\/\/github.com\/davidmckennirey"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/davidmckennirey\/CVE-2019-3403",
|
||||
"description": "A simple python3 exploit for CVE-2019-3403",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-18T22:36:58Z",
|
||||
"updated_at": "2021-03-18T22:37:00Z",
|
||||
"pushed_at": "2021-03-18T22:36:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 172448763,
|
||||
"name": "WordPress_4.9.8_RCE_POC",
|
||||
"full_name": "brianwrf\/WordPress_4.9.8_RCE_POC",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/WordPress_4.9.8_RCE_POC",
|
||||
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-25T06:38:15Z",
|
||||
"updated_at": "2020-12-30T03:48:48Z",
|
||||
"pushed_at": "2019-03-18T01:20:52Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 184548123,
|
||||
"name": "CVE-2019-8942",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2021-03-07T08:26:37Z",
|
||||
"updated_at": "2021-03-19T00:59:43Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T21:33:17Z",
|
||||
"updated_at": "2021-01-09T11:46:42Z",
|
||||
"updated_at": "2021-03-19T03:03:06Z",
|
||||
"pushed_at": "2020-07-05T17:27:24Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,29 @@
|
|||
"watchers": 266,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 243531424,
|
||||
"name": "CVE-2020-0688_EXP",
|
||||
"full_name": "Yt1g3r\/CVE-2020-0688_EXP",
|
||||
"owner": {
|
||||
"login": "Yt1g3r",
|
||||
"id": 12625147,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yt1g3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2020-0688_EXP",
|
||||
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T13:53:46Z",
|
||||
"updated_at": "2021-03-14T05:07:44Z",
|
||||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 243640997,
|
||||
"name": "CVE-2020-0688",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-03T14:45:51Z",
|
||||
"updated_at": "2021-01-08T01:46:37Z",
|
||||
"updated_at": "2021-03-19T02:06:23Z",
|
||||
"pushed_at": "2020-09-08T20:01:05Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 28,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-18T16:08:05Z",
|
||||
"updated_at": "2021-03-19T01:29:02Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2403,
|
||||
"watchers_count": 2403,
|
||||
"stargazers_count": 2404,
|
||||
"watchers_count": 2404,
|
||||
"forks_count": 693,
|
||||
"forks": 693,
|
||||
"watchers": 2403,
|
||||
"watchers": 2404,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2021-03-12T10:10:35Z",
|
||||
"updated_at": "2021-03-19T00:13:14Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 214,
|
||||
"watchers": 216,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020–14882 by Jang",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T21:28:12Z",
|
||||
"updated_at": "2021-02-24T06:37:09Z",
|
||||
"updated_at": "2021-03-18T23:50:58Z",
|
||||
"pushed_at": "2020-10-29T03:57:09Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T13:53:31Z",
|
||||
"updated_at": "2020-10-31T13:03:28Z",
|
||||
"updated_at": "2021-03-18T23:46:12Z",
|
||||
"pushed_at": "2020-10-31T13:03:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2020-14882批量验证工具。",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-31T01:43:54Z",
|
||||
"updated_at": "2020-12-01T05:05:26Z",
|
||||
"updated_at": "2021-03-18T23:37:34Z",
|
||||
"pushed_at": "2020-12-01T05:05:24Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +243,13 @@
|
|||
"description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-01T13:12:27Z",
|
||||
"updated_at": "2020-11-24T16:16:12Z",
|
||||
"updated_at": "2021-03-18T23:50:26Z",
|
||||
"pushed_at": "2020-11-01T13:56:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,13 +289,13 @@
|
|||
"description": "CVE-2020-14882 detection script",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T11:34:38Z",
|
||||
"updated_at": "2020-11-03T11:42:04Z",
|
||||
"updated_at": "2021-03-18T23:48:22Z",
|
||||
"pushed_at": "2020-11-03T11:34:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -496,13 +496,13 @@
|
|||
"description": "CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-29T09:11:31Z",
|
||||
"updated_at": "2021-01-25T08:54:10Z",
|
||||
"updated_at": "2021-03-18T23:43:08Z",
|
||||
"pushed_at": "2021-01-25T07:54:23Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-03-18T20:54:07Z",
|
||||
"pushed_at": "2021-03-18T14:11:05Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 72,
|
||||
"updated_at": "2021-03-19T03:02:24Z",
|
||||
"pushed_at": "2021-03-19T02:03:46Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T14:42:52Z",
|
||||
"updated_at": "2021-03-12T03:42:43Z",
|
||||
"updated_at": "2021-03-19T01:24:50Z",
|
||||
"pushed_at": "2020-10-14T16:56:04Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-18T16:13:23Z",
|
||||
"updated_at": "2021-03-18T16:42:37Z",
|
||||
"updated_at": "2021-03-19T02:27:24Z",
|
||||
"pushed_at": "2021-03-18T16:41:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-18T09:14:01Z",
|
||||
"updated_at": "2021-03-19T01:29:39Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"stargazers_count": 959,
|
||||
"watchers_count": 959,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 958,
|
||||
"watchers": 959,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic coherence.jar RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T09:04:43Z",
|
||||
"updated_at": "2021-01-25T14:53:42Z",
|
||||
"updated_at": "2021-03-19T01:21:27Z",
|
||||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 167,
|
||||
"watchers": 168,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "CVE-2020-2883",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-26T14:10:25Z",
|
||||
"updated_at": "2021-02-16T15:28:51Z",
|
||||
"updated_at": "2021-03-19T02:25:20Z",
|
||||
"pushed_at": "2020-11-27T02:12:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 340126442,
|
||||
"name": "CVE-2020-3161",
|
||||
"full_name": "uromulou\/CVE-2020-3161",
|
||||
"owner": {
|
||||
"login": "uromulou",
|
||||
"id": 79270508,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79270508?v=4",
|
||||
"html_url": "https:\/\/github.com\/uromulou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uromulou\/CVE-2020-3161",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T17:30:44Z",
|
||||
"updated_at": "2021-02-18T17:31:10Z",
|
||||
"pushed_at": "2021-02-18T17:31:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-02-13T07:55:44Z",
|
||||
"updated_at": "2020-02-13T07:57:34Z",
|
||||
"pushed_at": "2021-03-04T09:23:24Z",
|
||||
"pushed_at": "2021-03-18T23:42:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T14:40:34Z",
|
||||
"updated_at": "2020-07-24T02:02:52Z",
|
||||
"updated_at": "2021-03-19T02:30:16Z",
|
||||
"pushed_at": "2020-07-13T14:47:02Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-1056, related to GPU Container Security",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-08T11:29:48Z",
|
||||
"updated_at": "2021-03-18T14:36:24Z",
|
||||
"updated_at": "2021-03-19T00:32:36Z",
|
||||
"pushed_at": "2021-01-12T09:21:02Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-03-18T20:12:39Z",
|
||||
"updated_at": "2021-03-19T02:27:51Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 250,
|
||||
"watchers": 251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-03-18T19:45:49Z",
|
||||
"updated_at": "2021-03-18T22:17:45Z",
|
||||
"pushed_at": "2021-03-10T05:01:22Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 217,
|
||||
"watchers": 218,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This is a Poc for BIGIP iControl unauth RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-17T05:02:45Z",
|
||||
"updated_at": "2021-03-17T20:06:27Z",
|
||||
"updated_at": "2021-03-19T02:07:43Z",
|
||||
"pushed_at": "2021-03-17T05:10:03Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-03-18T20:54:07Z",
|
||||
"pushed_at": "2021-03-18T14:11:05Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 72,
|
||||
"updated_at": "2021-03-19T03:02:24Z",
|
||||
"pushed_at": "2021-03-19T02:03:46Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -680,13 +680,13 @@
|
|||
"description": "ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-17T03:56:54Z",
|
||||
"updated_at": "2021-03-18T11:34:45Z",
|
||||
"updated_at": "2021-03-19T02:57:48Z",
|
||||
"pushed_at": "2021-03-17T05:06:18Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 31,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-03-18T18:44:27Z",
|
||||
"updated_at": "2021-03-19T03:01:01Z",
|
||||
"pushed_at": "2021-03-18T17:12:35Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 173,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
20
README.md
20
README.md
|
@ -171,7 +171,12 @@ Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177
|
|||
|
||||
- [fullbbadda1208/CVE-2021-3229](https://github.com/fullbbadda1208/CVE-2021-3229)
|
||||
|
||||
### CVE-2021-3327
|
||||
### CVE-2021-3327 (-)
|
||||
|
||||
<code>
|
||||
Ovation Dynamic Content 1.10.1 for Elementor allows XSS via the post_title parameter.
|
||||
</code>
|
||||
|
||||
- [IthacaLabs/CVE-2021-3327](https://github.com/IthacaLabs/CVE-2021-3327)
|
||||
|
||||
### CVE-2021-3345 (2021-01-29)
|
||||
|
@ -713,6 +718,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
|
|||
</code>
|
||||
|
||||
- [Ridter/cve-2020-0688](https://github.com/Ridter/cve-2020-0688)
|
||||
- [Yt1g3r/CVE-2020-0688_EXP](https://github.com/Yt1g3r/CVE-2020-0688_EXP)
|
||||
- [righter83/CVE-2020-0688](https://github.com/righter83/CVE-2020-0688)
|
||||
- [truongtn/cve-2020-0688](https://github.com/truongtn/cve-2020-0688)
|
||||
- [onSec-fr/CVE-2020-0688-Scanner](https://github.com/onSec-fr/CVE-2020-0688-Scanner)
|
||||
|
@ -1256,7 +1262,6 @@ A vulnerability in the web server for Cisco IP Phones could allow an unauthentic
|
|||
</code>
|
||||
|
||||
- [abood05972/CVE-2020-3161](https://github.com/abood05972/CVE-2020-3161)
|
||||
- [uromulou/CVE-2020-3161](https://github.com/uromulou/CVE-2020-3161)
|
||||
|
||||
### CVE-2020-3187 (2020-05-06)
|
||||
|
||||
|
@ -4416,7 +4421,6 @@ In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows
|
|||
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
|
||||
</code>
|
||||
|
||||
- [xConsoIe/CVE-2019-0193](https://github.com/xConsoIe/CVE-2019-0193)
|
||||
- [jas502n/CVE-2019-0193](https://github.com/jas502n/CVE-2019-0193)
|
||||
- [1135/solr_exploit](https://github.com/1135/solr_exploit)
|
||||
- [jaychouzzk/CVE-2019-0193-exp](https://github.com/jaychouzzk/CVE-2019-0193-exp)
|
||||
|
@ -5143,6 +5147,14 @@ Confluence Server and Data Center had a path traversal vulnerability in the down
|
|||
|
||||
- [superevr/cve-2019-3398](https://github.com/superevr/cve-2019-3398)
|
||||
|
||||
### CVE-2019-3403 (2019-05-22)
|
||||
|
||||
<code>
|
||||
The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
|
||||
</code>
|
||||
|
||||
- [davidmckennirey/CVE-2019-3403](https://github.com/davidmckennirey/CVE-2019-3403)
|
||||
|
||||
### CVE-2019-3663 (2019-11-13)
|
||||
|
||||
<code>
|
||||
|
@ -5717,7 +5729,6 @@ NTP through 4.2.8p12 has a NULL Pointer Dereference.
|
|||
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
|
||||
</code>
|
||||
|
||||
- [brianwrf/WordPress_4.9.8_RCE_POC](https://github.com/brianwrf/WordPress_4.9.8_RCE_POC)
|
||||
- [synacktiv/CVE-2019-8942](https://github.com/synacktiv/CVE-2019-8942)
|
||||
|
||||
### CVE-2019-8943 (2019-02-19)
|
||||
|
@ -7934,6 +7945,7 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
|
|||
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
|
||||
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
|
||||
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
|
||||
- [PetrusViet/CVE-2019-1003000-2018-1000861-jenkins-rce](https://github.com/PetrusViet/CVE-2019-1003000-2018-1000861-jenkins-rce)
|
||||
|
||||
### CVE-2019-1010054 (2019-07-18)
|
||||
|
||||
|
|
Loading…
Reference in a new issue