mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2020/04/09 00:08:02
This commit is contained in:
parent
87b6c8bef4
commit
b76741cae9
23 changed files with 208 additions and 156 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2020-03-30T05:28:53Z",
|
||||
"updated_at": "2020-04-08T14:06:22Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2243,
|
||||
"watchers_count": 2243,
|
||||
"stargazers_count": 2244,
|
||||
"watchers_count": 2244,
|
||||
"forks_count": 485,
|
||||
"forks": 485,
|
||||
"watchers": 2243,
|
||||
"watchers": 2244,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-08T09:01:20Z",
|
||||
"updated_at": "2020-04-08T14:50:24Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-08T09:01:20Z",
|
||||
"updated_at": "2020-04-08T14:50:24Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-03-13T08:57:50Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-08T09:01:20Z",
|
||||
"updated_at": "2020-04-08T14:50:24Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-08T09:01:20Z",
|
||||
"updated_at": "2020-04-08T14:50:24Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-04-08T05:24:32Z",
|
||||
"updated_at": "2020-04-08T10:04:52Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 224,
|
||||
"watchers": 225,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2018-12-25T07:40:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -688,5 +688,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 254069736,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "Eugene24\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "Eugene24",
|
||||
"id": 5593797,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5593797?v=4",
|
||||
"html_url": "https:\/\/github.com\/Eugene24"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Eugene24\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-08T11:33:46Z",
|
||||
"updated_at": "2020-04-08T11:45:31Z",
|
||||
"pushed_at": "2020-04-08T11:45:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T14:23:18Z",
|
||||
"updated_at": "2020-04-07T01:28:40Z",
|
||||
"updated_at": "2020-04-08T14:12:02Z",
|
||||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"forks_count": 112,
|
||||
"forks": 112,
|
||||
"watchers": 326,
|
||||
"watchers": 327,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1347,13 +1347,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-04-08T01:40:57Z",
|
||||
"updated_at": "2020-04-08T10:31:46Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"forks_count": 165,
|
||||
"forks": 165,
|
||||
"watchers": 704,
|
||||
"watchers": 705,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2020-04-08T04:51:02Z",
|
||||
"updated_at": "2020-04-08T11:05:15Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-04-08T05:57:03Z",
|
||||
"updated_at": "2020-04-08T13:08:10Z",
|
||||
"pushed_at": "2019-06-24T06:06:48Z",
|
||||
"stargazers_count": 512,
|
||||
"watchers_count": 512,
|
||||
"stargazers_count": 513,
|
||||
"watchers_count": 513,
|
||||
"forks_count": 114,
|
||||
"forks": 114,
|
||||
"watchers": 512,
|
||||
"watchers": 513,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-08T09:01:20Z",
|
||||
"updated_at": "2020-04-08T14:50:24Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-08T08:48:44Z",
|
||||
"updated_at": "2020-04-08T13:27:11Z",
|
||||
"pushed_at": "2020-04-08T08:19:12Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 47,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T08:33:07Z",
|
||||
"updated_at": "2020-03-06T04:18:50Z",
|
||||
"updated_at": "2020-04-08T10:00:01Z",
|
||||
"pushed_at": "2019-07-15T06:03:15Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T13:16:02Z",
|
||||
"updated_at": "2020-04-03T03:50:12Z",
|
||||
"updated_at": "2020-04-08T13:18:40Z",
|
||||
"pushed_at": "2019-08-19T17:33:56Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2020-04-08T08:55:32Z",
|
||||
"updated_at": "2020-04-08T09:30:17Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T16:04:30Z",
|
||||
"updated_at": "2020-03-31T20:35:42Z",
|
||||
"updated_at": "2020-04-08T09:10:41Z",
|
||||
"pushed_at": "2020-02-28T16:47:24Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-04-07T17:00:12Z",
|
||||
"updated_at": "2020-04-08T09:26:33Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 419,
|
||||
"watchers_count": 419,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 419,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -427,13 +427,13 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2020-04-07T08:53:44Z",
|
||||
"updated_at": "2020-04-08T12:37:47Z",
|
||||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -749,13 +749,13 @@
|
|||
"description": "基于asyncio(协程)的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-14T23:39:25Z",
|
||||
"updated_at": "2020-04-06T07:37:13Z",
|
||||
"updated_at": "2020-04-08T13:58:53Z",
|
||||
"pushed_at": "2020-03-18T04:48:23Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 12,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -979,13 +979,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-04-08T03:31:15Z",
|
||||
"updated_at": "2020-04-08T14:32:41Z",
|
||||
"pushed_at": "2020-04-03T13:31:54Z",
|
||||
"stargazers_count": 782,
|
||||
"watchers_count": 782,
|
||||
"forks_count": 211,
|
||||
"forks": 211,
|
||||
"watchers": 782,
|
||||
"stargazers_count": 785,
|
||||
"watchers_count": 785,
|
||||
"forks_count": 213,
|
||||
"forks": 213,
|
||||
"watchers": 785,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1163,13 +1163,13 @@
|
|||
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T15:16:10Z",
|
||||
"updated_at": "2020-04-08T06:57:57Z",
|
||||
"updated_at": "2020-04-08T11:28:40Z",
|
||||
"pushed_at": "2020-04-06T15:22:01Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 27,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 253735011,
|
||||
"name": "CVE-2020-10199",
|
||||
"full_name": "fairyming\/CVE-2020-10199",
|
||||
"owner": {
|
||||
"login": "fairyming",
|
||||
"id": 44915879,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/44915879?v=4",
|
||||
"html_url": "https:\/\/github.com\/fairyming"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fairyming\/CVE-2020-10199",
|
||||
"description": "Nexus Repository Manager远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T08:37:51Z",
|
||||
"updated_at": "2020-04-07T08:37:51Z",
|
||||
"pushed_at": "2020-04-07T08:37:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 253799743,
|
||||
"name": "CVE-2020-10199-10204",
|
||||
|
@ -36,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T13:23:12Z",
|
||||
"updated_at": "2020-04-08T05:38:35Z",
|
||||
"updated_at": "2020-04-08T13:10:21Z",
|
||||
"pushed_at": "2020-04-07T13:56:17Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +36,36 @@
|
|||
"description": "CVE-2020-10199、CVE-2020-10204、CVE-2020-11444",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-08T07:36:30Z",
|
||||
"updated_at": "2020-04-08T08:48:22Z",
|
||||
"updated_at": "2020-04-08T13:07:10Z",
|
||||
"pushed_at": "2020-04-08T07:52:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 254064445,
|
||||
"name": "CVE-2020-10199-Nexus-RCE",
|
||||
"full_name": "magicming200\/CVE-2020-10199-Nexus-RCE",
|
||||
"owner": {
|
||||
"login": "magicming200",
|
||||
"id": 23466759,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23466759?v=4",
|
||||
"html_url": "https:\/\/github.com\/magicming200"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/magicming200\/CVE-2020-10199-Nexus-RCE",
|
||||
"description": "CVE-2020-10199漏洞一键检测工具,图形化界面。CVE-2020-10199 Nexus RCE Vul POC Tool with GUI.",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-08T11:08:35Z",
|
||||
"updated_at": "2020-04-08T11:43:03Z",
|
||||
"pushed_at": "2020-04-08T11:38:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-10551.json
Normal file
25
2020/CVE-2020-10551.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 254115906,
|
||||
"name": "CVE-2020-10551",
|
||||
"full_name": "seqred-s-a\/CVE-2020-10551",
|
||||
"owner": {
|
||||
"login": "seqred-s-a",
|
||||
"id": 49437606,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/49437606?v=4",
|
||||
"html_url": "https:\/\/github.com\/seqred-s-a"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/seqred-s-a\/CVE-2020-10551",
|
||||
"description": "Privilege escalation in QQBrowser",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-08T14:46:33Z",
|
||||
"updated_at": "2020-04-08T14:53:00Z",
|
||||
"pushed_at": "2020-04-08T14:50:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-04-07T02:23:32Z",
|
||||
"updated_at": "2020-04-08T10:27:24Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 147,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-08T08:48:44Z",
|
||||
"updated_at": "2020-04-08T13:27:11Z",
|
||||
"pushed_at": "2020-04-08T08:19:12Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 47,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-08T09:01:20Z",
|
||||
"updated_at": "2020-04-08T14:50:24Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-04-07T08:08:43Z",
|
||||
"updated_at": "2020-04-08T10:22:40Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "nmap script to detect CVE-2020-8515 on Draytek Devices",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T05:40:11Z",
|
||||
"updated_at": "2020-04-02T18:23:10Z",
|
||||
"pushed_at": "2020-04-02T18:23:08Z",
|
||||
"updated_at": "2020-04-08T13:37:20Z",
|
||||
"pushed_at": "2020-04-08T13:37:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -238,9 +238,9 @@ An elevation of privilege vulnerability exists in Windows Installer because of t
|
|||
Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
|
||||
</code>
|
||||
|
||||
- [fairyming/CVE-2020-10199](https://github.com/fairyming/CVE-2020-10199)
|
||||
- [wsfengfan/CVE-2020-10199-10204](https://github.com/wsfengfan/CVE-2020-10199-10204)
|
||||
- [jas502n/CVE-2020-10199](https://github.com/jas502n/CVE-2020-10199)
|
||||
- [magicming200/CVE-2020-10199-Nexus-RCE](https://github.com/magicming200/CVE-2020-10199-Nexus-RCE)
|
||||
|
||||
### CVE-2020-10238
|
||||
|
||||
|
@ -266,6 +266,9 @@ An issue was discovered in Joomla! before 3.9.16. The lack of type casting of a
|
|||
|
||||
- [HoangKien1020/CVE-2020-10243](https://github.com/HoangKien1020/CVE-2020-10243)
|
||||
|
||||
### CVE-2020-10551
|
||||
- [seqred-s-a/CVE-2020-10551](https://github.com/seqred-s-a/CVE-2020-10551)
|
||||
|
||||
### CVE-2020-10558
|
||||
|
||||
<code>
|
||||
|
@ -6200,6 +6203,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [AdriVillaB/CVE-2018-6574](https://github.com/AdriVillaB/CVE-2018-6574)
|
||||
- [yitingfan/CVE-2018-6574_demo](https://github.com/yitingfan/CVE-2018-6574_demo)
|
||||
- [mhamed366/CVE-2018-6574](https://github.com/mhamed366/CVE-2018-6574)
|
||||
- [Eugene24/CVE-2018-6574](https://github.com/Eugene24/CVE-2018-6574)
|
||||
|
||||
### CVE-2018-6622
|
||||
|
||||
|
|
Loading…
Reference in a new issue