mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/09/18 18:08:57
This commit is contained in:
parent
bdeef06f64
commit
b58c21fb4c
40 changed files with 528 additions and 164 deletions
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 114424141,
|
||||
"name": "privesc-CVE-2010-0426",
|
||||
"full_name": "t0kx\/privesc-CVE-2010-0426",
|
||||
"owner": {
|
||||
"login": "t0kx",
|
||||
"id": 24924517,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24924517?v=4",
|
||||
"html_url": "https:\/\/github.com\/t0kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/t0kx\/privesc-CVE-2010-0426",
|
||||
"description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-16T01:16:44Z",
|
||||
"updated_at": "2020-04-20T12:29:23Z",
|
||||
"pushed_at": "2017-12-16T01:19:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 164330369,
|
||||
"name": "cve-2010-0426",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 29914821,
|
||||
"name": "jboss-autopwn",
|
||||
"full_name": "ChristianPapathanasiou\/jboss-autopwn",
|
||||
"owner": {
|
||||
"login": "ChristianPapathanasiou",
|
||||
"id": 5354349,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5354349?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou\/jboss-autopwn",
|
||||
"description": "JBoss Autopwn as featured at BlackHat Europe 2010 - this version incorporates CVE-2010-0738 the JBoss authentication bypass VERB manipulation vulnerability as discovered by Minded Security",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T13:16:45Z",
|
||||
"updated_at": "2020-07-02T11:52:16Z",
|
||||
"pushed_at": "2015-01-27T13:23:18Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 62456741,
|
||||
"name": "jboss-autopwn",
|
||||
|
|
25
2010/CVE-2010-1205.json
Normal file
25
2010/CVE-2010-1205.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 911174,
|
||||
"name": "CVE-2010-1205",
|
||||
"full_name": "mk219533\/CVE-2010-1205",
|
||||
"owner": {
|
||||
"login": "mk219533",
|
||||
"id": 91629,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/91629?v=4",
|
||||
"html_url": "https:\/\/github.com\/mk219533"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mk219533\/CVE-2010-1205",
|
||||
"description": "sample exploit of buffer overflow in libpng ",
|
||||
"fork": false,
|
||||
"created_at": "2010-09-14T22:16:11Z",
|
||||
"updated_at": "2020-05-07T01:35:39Z",
|
||||
"pushed_at": "2010-10-03T14:06:12Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-15606.json
Normal file
25
2010/CVE-2010-15606.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 282739625,
|
||||
"name": "CVE-2010-15606",
|
||||
"full_name": "Babs84\/CVE-2010-15606",
|
||||
"owner": {
|
||||
"login": "Babs84",
|
||||
"id": 18121247,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18121247?v=4",
|
||||
"html_url": "https:\/\/github.com\/Babs84"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Babs84\/CVE-2010-15606",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-26T21:54:27Z",
|
||||
"updated_at": "2020-07-26T21:54:27Z",
|
||||
"pushed_at": "2020-07-26T21:54:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-2075.json
Normal file
25
2010/CVE-2010-2075.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 183259128,
|
||||
"name": "UnrealIRCd-3.2.8.1-RCE",
|
||||
"full_name": "M4LV0\/UnrealIRCd-3.2.8.1-RCE",
|
||||
"owner": {
|
||||
"login": "M4LV0",
|
||||
"id": 40957476,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40957476?v=4",
|
||||
"html_url": "https:\/\/github.com\/M4LV0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M4LV0\/UnrealIRCd-3.2.8.1-RCE",
|
||||
"description": "cve-2010-2075 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-24T15:41:22Z",
|
||||
"updated_at": "2020-05-01T17:43:33Z",
|
||||
"pushed_at": "2019-04-24T15:44:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-3437.json
Normal file
25
2010/CVE-2010-3437.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 222810581,
|
||||
"name": "CVE-2010-3437",
|
||||
"full_name": "huang-emily\/CVE-2010-3437",
|
||||
"owner": {
|
||||
"login": "huang-emily",
|
||||
"id": 25013982,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25013982?v=4",
|
||||
"html_url": "https:\/\/github.com\/huang-emily"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huang-emily\/CVE-2010-3437",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-11-19T23:35:57Z",
|
||||
"updated_at": "2019-11-19T23:36:01Z",
|
||||
"pushed_at": "2019-11-19T23:35:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-3490.json
Normal file
25
2010/CVE-2010-3490.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 226908489,
|
||||
"name": "CVE-2010-3490",
|
||||
"full_name": "moayadalmalat\/CVE-2010-3490",
|
||||
"owner": {
|
||||
"login": "moayadalmalat",
|
||||
"id": 42471675,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42471675?v=4",
|
||||
"html_url": "https:\/\/github.com\/moayadalmalat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/moayadalmalat\/CVE-2010-3490",
|
||||
"description": "FreePBX exploit <= 2.8.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-09T15:49:21Z",
|
||||
"updated_at": "2019-12-09T15:57:52Z",
|
||||
"pushed_at": "2019-12-09T15:57:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-3600.json
Normal file
25
2010/CVE-2010-3600.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 141728676,
|
||||
"name": "CVE-2010-3600-PythonHackOracle11gR2",
|
||||
"full_name": "LAITRUNGMINHDUC\/CVE-2010-3600-PythonHackOracle11gR2",
|
||||
"owner": {
|
||||
"login": "LAITRUNGMINHDUC",
|
||||
"id": 10572765,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10572765?v=4",
|
||||
"html_url": "https:\/\/github.com\/LAITRUNGMINHDUC"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LAITRUNGMINHDUC\/CVE-2010-3600-PythonHackOracle11gR2",
|
||||
"description": "This Python 3 script is for uploading shell (and other files) to Windows Server \/ Linux via Oracle 11g R2 (CVE-2010-3600).",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-20T15:27:54Z",
|
||||
"updated_at": "2018-07-20T16:45:11Z",
|
||||
"pushed_at": "2018-07-20T16:45:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-4221.json
Normal file
25
2010/CVE-2010-4221.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 108682441,
|
||||
"name": "cve-2010-4221",
|
||||
"full_name": "M31MOTH\/cve-2010-4221",
|
||||
"owner": {
|
||||
"login": "M31MOTH",
|
||||
"id": 10201432,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10201432?v=4",
|
||||
"html_url": "https:\/\/github.com\/M31MOTH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M31MOTH\/cve-2010-4221",
|
||||
"description": "This exploit was written to study some concepts, enjoy!",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-28T20:37:26Z",
|
||||
"updated_at": "2020-03-26T15:45:57Z",
|
||||
"pushed_at": "2017-10-22T19:46:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-4258.json
Normal file
25
2010/CVE-2010-4258.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 30897048,
|
||||
"name": "CVE-2010-4258",
|
||||
"full_name": "johnreginald\/CVE-2010-4258",
|
||||
"owner": {
|
||||
"login": "johnreginald",
|
||||
"id": 8102802,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8102802?v=4",
|
||||
"html_url": "https:\/\/github.com\/johnreginald"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/johnreginald\/CVE-2010-4258",
|
||||
"description": "Exploit based on a faulty clone(2) implementation in Linux < 2.6.36.2 that allows overwrite of arbitrary kernel word with NULL. Research and personal-security use only. Not malicious.",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-17T01:12:55Z",
|
||||
"updated_at": "2016-09-04T16:50:03Z",
|
||||
"pushed_at": "2012-07-12T18:58:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-5327.json
Normal file
25
2010/CVE-2010-5327.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 155039044,
|
||||
"name": "CVE-2010-5327",
|
||||
"full_name": "Michael-Main\/CVE-2010-5327",
|
||||
"owner": {
|
||||
"login": "Michael-Main",
|
||||
"id": 44539668,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44539668?v=4",
|
||||
"html_url": "https:\/\/github.com\/Michael-Main"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Michael-Main\/CVE-2010-5327",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-28T05:37:23Z",
|
||||
"updated_at": "2018-10-28T05:37:23Z",
|
||||
"pushed_at": "2018-10-28T05:37:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-17T08:26:03Z",
|
||||
"updated_at": "2020-09-18T08:35:55Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 690,
|
||||
"watchers_count": 690,
|
||||
"stargazers_count": 693,
|
||||
"watchers_count": 693,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"watchers": 690,
|
||||
"watchers": 693,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2015-6086",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-18T11:32:41Z",
|
||||
"updated_at": "2020-03-27T02:44:00Z",
|
||||
"updated_at": "2020-09-18T08:40:38Z",
|
||||
"pushed_at": "2016-04-22T06:43:00Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-17T08:26:03Z",
|
||||
"updated_at": "2020-09-18T08:35:55Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 690,
|
||||
"watchers_count": 690,
|
||||
"stargazers_count": 693,
|
||||
"watchers_count": 693,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"watchers": 690,
|
||||
"watchers": 693,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Public repository for improvements to the EXTRABACON exploit",
|
||||
"fork": false,
|
||||
"created_at": "2016-09-20T23:19:02Z",
|
||||
"updated_at": "2020-08-27T17:36:39Z",
|
||||
"updated_at": "2020-09-18T06:43:34Z",
|
||||
"pushed_at": "2016-11-02T03:11:27Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-09-07T01:13:15Z",
|
||||
"updated_at": "2020-09-18T05:13:46Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T02:50:37Z",
|
||||
"updated_at": "2020-07-19T18:32:57Z",
|
||||
"updated_at": "2020-09-18T08:05:21Z",
|
||||
"pushed_at": "2017-09-08T11:59:20Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-17T08:26:03Z",
|
||||
"updated_at": "2020-09-18T08:35:55Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 690,
|
||||
"watchers_count": 690,
|
||||
"stargazers_count": 693,
|
||||
"watchers_count": 693,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"watchers": 690,
|
||||
"watchers": 693,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2020-09-14T02:17:18Z",
|
||||
"updated_at": "2020-09-18T07:52:29Z",
|
||||
"pushed_at": "2020-08-18T00:00:15Z",
|
||||
"stargazers_count": 419,
|
||||
"watchers_count": 419,
|
||||
"stargazers_count": 420,
|
||||
"watchers_count": 420,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 419,
|
||||
"watchers": 420,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-17T08:26:03Z",
|
||||
"updated_at": "2020-09-18T08:35:55Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 690,
|
||||
"watchers_count": 690,
|
||||
"stargazers_count": 693,
|
||||
"watchers_count": 693,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"watchers": 690,
|
||||
"watchers": 693,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-09-17T09:46:27Z",
|
||||
"updated_at": "2020-09-18T07:46:34Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 305,
|
||||
"watchers": 307,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2020-09-18T02:21:45Z",
|
||||
"updated_at": "2020-09-18T08:43:33Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 318,
|
||||
"watchers": 321,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1945,13 +1945,13 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2020-09-02T19:36:28Z",
|
||||
"updated_at": "2020-09-18T06:43:55Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 275,
|
||||
"watchers": 276,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-17T07:54:38Z",
|
||||
"updated_at": "2020-07-30T17:54:29Z",
|
||||
"updated_at": "2020-09-18T05:55:25Z",
|
||||
"pushed_at": "2019-07-18T10:03:28Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -435,5 +435,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296529902,
|
||||
"name": "Sudo-CVE-2019-14287",
|
||||
"full_name": "M108Falcon\/Sudo-CVE-2019-14287",
|
||||
"owner": {
|
||||
"login": "M108Falcon",
|
||||
"id": 56510580,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/56510580?v=4",
|
||||
"html_url": "https:\/\/github.com\/M108Falcon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M108Falcon\/Sudo-CVE-2019-14287",
|
||||
"description": "Scripts to verify and execute CVE-2019-14287 as part of Research",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-18T06:10:35Z",
|
||||
"updated_at": "2020-09-18T06:11:44Z",
|
||||
"pushed_at": "2020-09-18T06:11:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-18T02:26:29Z",
|
||||
"updated_at": "2020-09-18T08:07:17Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1849,
|
||||
"watchers_count": 1849,
|
||||
"forks_count": 477,
|
||||
"forks": 477,
|
||||
"watchers": 1849,
|
||||
"stargazers_count": 1858,
|
||||
"watchers_count": 1858,
|
||||
"forks_count": 479,
|
||||
"forks": 479,
|
||||
"watchers": 1858,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-09-07T01:13:15Z",
|
||||
"updated_at": "2020-09-18T05:13:46Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"forks_count": 112,
|
||||
"forks": 112,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 346,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-09-14T07:38:21Z",
|
||||
"updated_at": "2020-09-18T06:21:07Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"stargazers_count": 632,
|
||||
"watchers_count": 632,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"watchers": 630,
|
||||
"watchers": 632,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-17T08:26:03Z",
|
||||
"updated_at": "2020-09-18T08:35:55Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 690,
|
||||
"watchers_count": 690,
|
||||
"stargazers_count": 693,
|
||||
"watchers_count": 693,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"watchers": 690,
|
||||
"watchers": 693,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "poc for cve-2020-0022",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-15T16:55:44Z",
|
||||
"updated_at": "2020-09-14T08:47:32Z",
|
||||
"updated_at": "2020-09-18T04:30:13Z",
|
||||
"pushed_at": "2020-07-16T06:51:16Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 45,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SQL Server Reporting Services(CVE-2020-0618)中的RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-15T06:40:23Z",
|
||||
"updated_at": "2020-09-05T11:53:56Z",
|
||||
"updated_at": "2020-09-18T07:29:34Z",
|
||||
"pushed_at": "2020-02-15T06:41:54Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 182,
|
||||
"watchers": 187,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-0618 Honeypot",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-18T16:17:19Z",
|
||||
"updated_at": "2020-07-10T18:18:48Z",
|
||||
"updated_at": "2020-09-18T07:55:29Z",
|
||||
"pushed_at": "2020-03-03T17:21:54Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-09-14T13:54:49Z",
|
||||
"updated_at": "2020-09-18T06:46:17Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 414,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1439,13 +1439,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T01:48:37Z",
|
||||
"updated_at": "2020-09-18T02:34:30Z",
|
||||
"updated_at": "2020-09-18T07:24:09Z",
|
||||
"pushed_at": "2020-09-17T01:55:48Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-29T00:01:41Z",
|
||||
"updated_at": "2020-09-12T11:44:20Z",
|
||||
"updated_at": "2020-09-18T07:26:46Z",
|
||||
"pushed_at": "2020-08-24T23:16:38Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T21:25:18Z",
|
||||
"updated_at": "2020-09-18T02:54:43Z",
|
||||
"updated_at": "2020-09-18T03:52:05Z",
|
||||
"pushed_at": "2020-09-18T00:01:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-18T02:57:31Z",
|
||||
"updated_at": "2020-09-18T08:51:59Z",
|
||||
"pushed_at": "2020-09-17T08:18:25Z",
|
||||
"stargazers_count": 895,
|
||||
"watchers_count": 895,
|
||||
"forks_count": 170,
|
||||
"forks": 170,
|
||||
"watchers": 895,
|
||||
"stargazers_count": 910,
|
||||
"watchers_count": 910,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 910,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-09-18T02:54:08Z",
|
||||
"updated_at": "2020-09-18T08:59:51Z",
|
||||
"pushed_at": "2020-09-15T15:50:03Z",
|
||||
"stargazers_count": 463,
|
||||
"watchers_count": 463,
|
||||
"forks_count": 122,
|
||||
"forks": 122,
|
||||
"watchers": 463,
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"forks_count": 126,
|
||||
"forks": 126,
|
||||
"watchers": 472,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2020-09-18T03:04:58Z",
|
||||
"updated_at": "2020-09-18T05:00:40Z",
|
||||
"pushed_at": "2020-09-17T07:26:50Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 73,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-09-18T02:39:37Z",
|
||||
"updated_at": "2020-09-18T08:13:26Z",
|
||||
"pushed_at": "2020-09-17T18:06:57Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 81,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:27:14Z",
|
||||
"updated_at": "2020-09-18T03:04:51Z",
|
||||
"updated_at": "2020-09-18T04:11:04Z",
|
||||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T02:37:52Z",
|
||||
"updated_at": "2020-09-16T02:47:42Z",
|
||||
"updated_at": "2020-09-18T08:26:25Z",
|
||||
"pushed_at": "2020-09-16T02:47:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -339,8 +339,8 @@
|
|||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -519,13 +519,13 @@
|
|||
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T16:53:17Z",
|
||||
"updated_at": "2020-09-18T00:23:30Z",
|
||||
"updated_at": "2020-09-18T08:40:04Z",
|
||||
"pushed_at": "2020-09-17T17:03:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -542,13 +542,13 @@
|
|||
"description": " CVE-2020-1472复现时使用的py文件整理打包",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-18T00:02:26Z",
|
||||
"updated_at": "2020-09-18T03:03:40Z",
|
||||
"updated_at": "2020-09-18T05:00:23Z",
|
||||
"pushed_at": "2020-09-18T00:20:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -404,13 +404,13 @@
|
|||
"description": "批量检测幽灵猫漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-20T09:29:18Z",
|
||||
"updated_at": "2020-06-29T03:29:06Z",
|
||||
"updated_at": "2020-09-18T05:13:11Z",
|
||||
"pushed_at": "2020-03-20T09:37:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-09-17T08:26:03Z",
|
||||
"updated_at": "2020-09-18T08:35:55Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 690,
|
||||
"watchers_count": 690,
|
||||
"stargazers_count": 693,
|
||||
"watchers_count": 693,
|
||||
"forks_count": 171,
|
||||
"forks": 171,
|
||||
"watchers": 690,
|
||||
"watchers": 693,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-05-17T12:07:01Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-18T03:11:01Z",
|
||||
"updated_at": "2020-09-18T09:10:11Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1850,
|
||||
"watchers_count": 1850,
|
||||
"forks_count": 477,
|
||||
"forks": 477,
|
||||
"watchers": 1850,
|
||||
"stargazers_count": 1858,
|
||||
"watchers_count": 1858,
|
||||
"forks_count": 479,
|
||||
"forks": 479,
|
||||
"watchers": 1858,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1117,13 +1117,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T19:10:09Z",
|
||||
"updated_at": "2020-08-25T11:14:07Z",
|
||||
"updated_at": "2020-09-18T06:11:34Z",
|
||||
"pushed_at": "2020-08-24T03:44:29Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-05T20:40:28Z",
|
||||
"updated_at": "2020-09-18T01:52:10Z",
|
||||
"updated_at": "2020-09-18T05:20:07Z",
|
||||
"pushed_at": "2020-06-05T21:04:43Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
70
README.md
70
README.md
|
@ -4628,6 +4628,7 @@ In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can
|
|||
- [thinuri99/Sudo-Security-Bypass-Vulnerability-CVE-2019-14287-](https://github.com/thinuri99/Sudo-Security-Bypass-Vulnerability-CVE-2019-14287-)
|
||||
- [janod313/-CVE-2019-14287-SUDO-bypass-vulnerability](https://github.com/janod313/-CVE-2019-14287-SUDO-bypass-vulnerability)
|
||||
- [DewmiApsara/CVE-2019-14287](https://github.com/DewmiApsara/CVE-2019-14287)
|
||||
- [M108Falcon/Sudo-CVE-2019-14287](https://github.com/M108Falcon/Sudo-CVE-2019-14287)
|
||||
|
||||
### CVE-2019-14314
|
||||
|
||||
|
@ -14502,6 +14503,7 @@ mpack 1.6 has information disclosure via eavesdropping on mails sent by other us
|
|||
sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
|
||||
</code>
|
||||
|
||||
- [t0kx/privesc-CVE-2010-0426](https://github.com/t0kx/privesc-CVE-2010-0426)
|
||||
- [cved-sources/cve-2010-0426](https://github.com/cved-sources/cve-2010-0426)
|
||||
|
||||
### CVE-2010-0738
|
||||
|
@ -14510,8 +14512,17 @@ sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is en
|
|||
The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
|
||||
</code>
|
||||
|
||||
- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn)
|
||||
- [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn)
|
||||
|
||||
### CVE-2010-1205
|
||||
|
||||
<code>
|
||||
Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
|
||||
</code>
|
||||
|
||||
- [mk219533/CVE-2010-1205](https://github.com/mk219533/CVE-2010-1205)
|
||||
|
||||
### CVE-2010-1411
|
||||
|
||||
<code>
|
||||
|
@ -14520,6 +14531,14 @@ Multiple integer overflows in the Fax3SetupState function in tif_fax3.c in the F
|
|||
|
||||
- [MAVProxyUser/httpfuzz-robomiller](https://github.com/MAVProxyUser/httpfuzz-robomiller)
|
||||
|
||||
### CVE-2010-2075
|
||||
|
||||
<code>
|
||||
UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
|
||||
</code>
|
||||
|
||||
- [M4LV0/UnrealIRCd-3.2.8.1-RCE](https://github.com/M4LV0/UnrealIRCd-3.2.8.1-RCE)
|
||||
|
||||
### CVE-2010-3332
|
||||
|
||||
<code>
|
||||
|
@ -14536,6 +14555,30 @@ Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office
|
|||
|
||||
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
|
||||
|
||||
### CVE-2010-3437
|
||||
|
||||
<code>
|
||||
Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
|
||||
</code>
|
||||
|
||||
- [huang-emily/CVE-2010-3437](https://github.com/huang-emily/CVE-2010-3437)
|
||||
|
||||
### CVE-2010-3490
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in page.recordings.php in the System Recordings component in the configuration interface in FreePBX 2.8.0 and earlier allows remote authenticated administrators to create arbitrary files via a .. (dot dot) in the usersnum parameter to admin/config.php, as demonstrated by creating a .php file under the web root.
|
||||
</code>
|
||||
|
||||
- [moayadalmalat/CVE-2010-3490](https://github.com/moayadalmalat/CVE-2010-3490)
|
||||
|
||||
### CVE-2010-3600
|
||||
|
||||
<code>
|
||||
Unspecified vulnerability in the Client System Analyzer component in Oracle Database Server 11.1.0.7 and 11.2.0.1 and Enterprise Manager Grid Control 10.2.0.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that this issue involves an exposed JSP script that accepts XML uploads in conjunction with NULL bytes in an unspecified parameter that allow execution of arbitrary code.
|
||||
</code>
|
||||
|
||||
- [LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2](https://github.com/LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2)
|
||||
|
||||
### CVE-2010-3847
|
||||
|
||||
<code>
|
||||
|
@ -14560,6 +14603,22 @@ Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Ca
|
|||
|
||||
- [nektra/CVE-2010-3971-hotpatch](https://github.com/nektra/CVE-2010-3971-hotpatch)
|
||||
|
||||
### CVE-2010-4221
|
||||
|
||||
<code>
|
||||
Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
|
||||
</code>
|
||||
|
||||
- [M31MOTH/cve-2010-4221](https://github.com/M31MOTH/cve-2010-4221)
|
||||
|
||||
### CVE-2010-4258
|
||||
|
||||
<code>
|
||||
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
|
||||
</code>
|
||||
|
||||
- [johnreginald/CVE-2010-4258](https://github.com/johnreginald/CVE-2010-4258)
|
||||
|
||||
### CVE-2010-4476
|
||||
|
||||
<code>
|
||||
|
@ -14584,6 +14643,17 @@ The Android browser in Android before 2.3.4 allows remote attackers to obtain SD
|
|||
|
||||
- [thomascannon/android-cve-2010-4804](https://github.com/thomascannon/android-cve-2010-4804)
|
||||
|
||||
### CVE-2010-5327
|
||||
|
||||
<code>
|
||||
Liferay Portal through 6.2.10 allows remote authenticated users to execute arbitrary shell commands via a crafted Velocity template.
|
||||
</code>
|
||||
|
||||
- [Michael-Main/CVE-2010-5327](https://github.com/Michael-Main/CVE-2010-5327)
|
||||
|
||||
### CVE-2010-15606
|
||||
- [Babs84/CVE-2010-15606](https://github.com/Babs84/CVE-2010-15606)
|
||||
|
||||
|
||||
## 2009
|
||||
### CVE-2009-0229
|
||||
|
|
Loading…
Reference in a new issue