mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/05/01 00:11:25
This commit is contained in:
parent
f40b1a1f8b
commit
b7581dcb14
43 changed files with 201 additions and 177 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"updated_at": "2021-04-30T14:56:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"stargazers_count": 1012,
|
||||
"watchers_count": 1012,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1011,
|
||||
"watchers": 1012,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"updated_at": "2021-04-30T14:56:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"stargazers_count": 1012,
|
||||
"watchers_count": 1012,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1011,
|
||||
"watchers": 1012,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,8 +59,8 @@
|
|||
"description": "Simple detection tool for Blueborne vulnerability found on Android devices --- CVE-2017-0781. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-30T21:06:19Z",
|
||||
"updated_at": "2020-08-10T08:50:38Z",
|
||||
"pushed_at": "2020-07-31T00:24:35Z",
|
||||
"updated_at": "2021-04-30T12:44:56Z",
|
||||
"pushed_at": "2021-04-30T12:44:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-23T06:29:31Z",
|
||||
"updated_at": "2020-11-04T16:52:04Z",
|
||||
"updated_at": "2021-04-30T12:56:20Z",
|
||||
"pushed_at": "2017-10-11T17:46:21Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 16,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-10-02T10:27:06Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-11-22T03:50:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-04-10T13:11:03Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploit for CVE-2017-11826",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T17:20:53Z",
|
||||
"updated_at": "2021-02-28T21:53:00Z",
|
||||
"updated_at": "2021-04-30T12:16:19Z",
|
||||
"pushed_at": "2020-05-18T20:53:40Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"forks_count": 133,
|
||||
"forks": 133,
|
||||
"watchers": 354,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"updated_at": "2021-04-30T14:56:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"stargazers_count": 1012,
|
||||
"watchers_count": 1012,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1011,
|
||||
"watchers": 1012,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-01-04T09:29:01Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"updated_at": "2021-04-30T14:56:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"stargazers_count": 1012,
|
||||
"watchers_count": 1012,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1011,
|
||||
"watchers": 1012,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-04-30T08:01:09Z",
|
||||
"updated_at": "2021-04-30T09:47:41Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 414,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-06-17T08:10:53Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-07T03:22:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-04-27T15:30:21Z",
|
||||
"updated_at": "2021-04-30T10:10:39Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1653,
|
||||
"watchers_count": 1653,
|
||||
"forks_count": 250,
|
||||
"forks": 250,
|
||||
"watchers": 1653,
|
||||
"stargazers_count": 1652,
|
||||
"watchers_count": 1652,
|
||||
"forks_count": 249,
|
||||
"forks": 249,
|
||||
"watchers": 1652,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"updated_at": "2021-04-30T14:56:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"stargazers_count": 1012,
|
||||
"watchers_count": 1012,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1011,
|
||||
"watchers": 1012,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"forks_count": 157,
|
||||
"forks": 157,
|
||||
"forks_count": 158,
|
||||
"forks": 158,
|
||||
"watchers": 386,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T09:38:08Z",
|
||||
"updated_at": "2021-04-30T08:27:37Z",
|
||||
"updated_at": "2021-04-30T13:08:13Z",
|
||||
"pushed_at": "2021-04-29T10:46:08Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-11-06T07:26:43Z",
|
||||
"updated_at": "2019-11-06T07:27:36Z",
|
||||
"pushed_at": "2021-03-31T04:59:23Z",
|
||||
"pushed_at": "2021-04-30T12:18:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
25
2019/CVE-2019-8561.json
Normal file
25
2019/CVE-2019-8561.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 190824936,
|
||||
"name": "CVE-2019-8561",
|
||||
"full_name": "0xmachos\/CVE-2019-8561",
|
||||
"owner": {
|
||||
"login": "0xmachos",
|
||||
"id": 30755149,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30755149?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xmachos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xmachos\/CVE-2019-8561",
|
||||
"description": "Proof of concept exploit for CVE-2019-8561 discovered by @jbradley89 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-07T23:48:55Z",
|
||||
"updated_at": "2021-04-30T14:45:42Z",
|
||||
"pushed_at": "2021-04-30T13:45:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1144,8 +1144,8 @@
|
|||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 383,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-08T22:09:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-09T20:41:32Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 133,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-07-17T13:07:29Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 228,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-07-16T18:32:04Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-18T00:01:00Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-04-29T14:06:27Z",
|
||||
"updated_at": "2021-04-30T14:02:21Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 301,
|
||||
"watchers": 302,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-30T05:43:15Z",
|
||||
"updated_at": "2021-04-30T14:35:03Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 716,
|
||||
"watchers_count": 716,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 716,
|
||||
"stargazers_count": 718,
|
||||
"watchers_count": 718,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 718,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-24T09:13:14Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2021-01-04T15:01:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-26T04:21:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-02-23T17:06:06Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-29T08:55:21Z",
|
||||
"updated_at": "2021-04-30T14:56:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"stargazers_count": 1012,
|
||||
"watchers_count": 1012,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1011,
|
||||
"watchers": 1012,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -230,21 +230,44 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 363088237,
|
||||
"name": "GIT-LFS-CVE-2020-27955",
|
||||
"full_name": "DeeLMind\/GIT-LFS-CVE-2020-27955",
|
||||
"id": 363093968,
|
||||
"name": "CVE-2020-27955-LFS",
|
||||
"full_name": "DeeLMind\/CVE-2020-27955-LFS",
|
||||
"owner": {
|
||||
"login": "DeeLMind",
|
||||
"id": 18142084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18142084?v=4",
|
||||
"html_url": "https:\/\/github.com\/DeeLMind"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DeeLMind\/GIT-LFS-CVE-2020-27955",
|
||||
"description": "GIT-LFS-CVE-2020-27955",
|
||||
"html_url": "https:\/\/github.com\/DeeLMind\/CVE-2020-27955-LFS",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-30T09:15:39Z",
|
||||
"updated_at": "2021-04-30T09:15:42Z",
|
||||
"pushed_at": "2021-04-30T09:15:40Z",
|
||||
"created_at": "2021-04-30T09:38:48Z",
|
||||
"updated_at": "2021-04-30T09:43:25Z",
|
||||
"pushed_at": "2021-04-30T09:43:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 363165166,
|
||||
"name": "CVE-2020-27955",
|
||||
"full_name": "exileddb\/CVE-2020-27955",
|
||||
"owner": {
|
||||
"login": "exileddb",
|
||||
"id": 61073603,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61073603?v=4",
|
||||
"html_url": "https:\/\/github.com\/exileddb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exileddb\/CVE-2020-27955",
|
||||
"description": "CVE-2020-27955",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-30T14:25:42Z",
|
||||
"updated_at": "2021-04-30T14:29:08Z",
|
||||
"pushed_at": "2021-04-30T14:29:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-13T09:45:12Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-08-12T08:27:10Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-12-31T23:45:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 355955764,
|
||||
"name": "cve-2021-21635",
|
||||
"full_name": "kenyon-wong\/cve-2021-21635",
|
||||
"owner": {
|
||||
"login": "kenyon-wong",
|
||||
"id": 39546510,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39546510?v=4",
|
||||
"html_url": "https:\/\/github.com\/kenyon-wong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kenyon-wong\/cve-2021-21635",
|
||||
"description": "测试",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-08T15:13:28Z",
|
||||
"updated_at": "2021-04-08T15:13:28Z",
|
||||
"pushed_at": "2021-04-08T15:13:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-30T05:43:15Z",
|
||||
"updated_at": "2021-04-30T14:35:03Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 716,
|
||||
"watchers_count": 716,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 716,
|
||||
"stargazers_count": 718,
|
||||
"watchers_count": 718,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 718,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2021-03-17T11:21:52Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-16T20:41:26Z",
|
||||
"updated_at": "2021-04-18T03:06:05Z",
|
||||
"updated_at": "2021-04-30T14:20:20Z",
|
||||
"pushed_at": "2021-04-18T00:45:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T17:59:59Z",
|
||||
"updated_at": "2021-04-30T08:30:02Z",
|
||||
"pushed_at": "2021-04-30T04:57:46Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"updated_at": "2021-04-30T15:01:40Z",
|
||||
"pushed_at": "2021-04-30T15:01:38Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 703,
|
||||
"watchers_count": 703,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 703,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -864,8 +864,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T18:53:14Z",
|
||||
"updated_at": "2021-04-30T02:01:44Z",
|
||||
"pushed_at": "2021-04-30T02:01:42Z",
|
||||
"updated_at": "2021-04-30T13:20:15Z",
|
||||
"pushed_at": "2021-04-30T13:20:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
@ -1025,13 +1025,13 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-04-30T08:01:00Z",
|
||||
"updated_at": "2021-04-30T13:09:01Z",
|
||||
"pushed_at": "2021-04-29T16:26:45Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 40,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-04-30T05:04:59Z",
|
||||
"updated_at": "2021-04-30T13:40:41Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
19
README.md
19
README.md
|
@ -388,14 +388,6 @@ Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, wit
|
|||
- [somatrasss/CVE-2021-21402](https://github.com/somatrasss/CVE-2021-21402)
|
||||
- [givemefivw/CVE-2021-21402](https://github.com/givemefivw/CVE-2021-21402)
|
||||
|
||||
### CVE-2021-21635 (2021-03-30)
|
||||
|
||||
<code>
|
||||
Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
|
||||
</code>
|
||||
|
||||
- [kenyon-wong/cve-2021-21635](https://github.com/kenyon-wong/cve-2021-21635)
|
||||
|
||||
### CVE-2021-21972 (2021-02-24)
|
||||
|
||||
<code>
|
||||
|
@ -4785,7 +4777,8 @@ Git LFS 2.12.0 allows Remote Code Execution.
|
|||
- [TheTh1nk3r/cve-2020-27955](https://github.com/TheTh1nk3r/cve-2020-27955)
|
||||
- [dennyson120/CVE-2020-27955](https://github.com/dennyson120/CVE-2020-27955)
|
||||
- [NeoDarwin/CVE-2020-27955](https://github.com/NeoDarwin/CVE-2020-27955)
|
||||
- [DeeLMind/GIT-LFS-CVE-2020-27955](https://github.com/DeeLMind/GIT-LFS-CVE-2020-27955)
|
||||
- [DeeLMind/CVE-2020-27955-LFS](https://github.com/DeeLMind/CVE-2020-27955-LFS)
|
||||
- [exileddb/CVE-2020-27955](https://github.com/exileddb/CVE-2020-27955)
|
||||
|
||||
### CVE-2020-27976 (2020-10-28)
|
||||
|
||||
|
@ -6502,6 +6495,14 @@ A memory initialization issue was addressed with improved memory handling. This
|
|||
|
||||
- [maldiohead/CVE-2019-8540](https://github.com/maldiohead/CVE-2019-8540)
|
||||
|
||||
### CVE-2019-8561 (2019-12-18)
|
||||
|
||||
<code>
|
||||
A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4. A malicious application may be able to elevate privileges.
|
||||
</code>
|
||||
|
||||
- [0xmachos/CVE-2019-8561](https://github.com/0xmachos/CVE-2019-8561)
|
||||
|
||||
### CVE-2019-8565 (2019-12-18)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue