mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/10/30 18:09:11
This commit is contained in:
parent
f68054a11e
commit
beb7d19d59
17 changed files with 106 additions and 82 deletions
|
@ -151,13 +151,13 @@
|
|||
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T21:57:03Z",
|
||||
"updated_at": "2020-09-30T09:11:39Z",
|
||||
"updated_at": "2020-10-30T08:09:04Z",
|
||||
"pushed_at": "2018-01-26T14:28:58Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE 2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-06T08:32:01Z",
|
||||
"updated_at": "2020-10-03T12:54:16Z",
|
||||
"updated_at": "2020-10-30T07:21:49Z",
|
||||
"pushed_at": "2020-08-31T04:34:29Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1071,13 +1071,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-10-29T12:29:57Z",
|
||||
"updated_at": "2020-10-30T08:03:51Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1122,
|
||||
"watchers_count": 1122,
|
||||
"stargazers_count": 1123,
|
||||
"watchers_count": 1123,
|
||||
"forks_count": 378,
|
||||
"forks": 378,
|
||||
"watchers": 1122,
|
||||
"watchers": 1123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-26T06:58:56Z",
|
||||
"updated_at": "2020-07-13T06:23:56Z",
|
||||
"updated_at": "2020-10-30T06:17:29Z",
|
||||
"pushed_at": "2019-12-26T08:44:54Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CuteNews 2.1.2 - CVE-2019-11447 Proof-Of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-07T06:21:10Z",
|
||||
"updated_at": "2020-09-16T08:07:23Z",
|
||||
"updated_at": "2020-10-30T03:18:47Z",
|
||||
"pushed_at": "2020-09-07T19:44:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -44,5 +44,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 308567472,
|
||||
"name": "CVE-2019-11447-EXP",
|
||||
"full_name": "khuntor\/CVE-2019-11447-EXP",
|
||||
"owner": {
|
||||
"login": "khuntor",
|
||||
"id": 25006917,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25006917?v=4",
|
||||
"html_url": "https:\/\/github.com\/khuntor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/khuntor\/CVE-2019-11447-EXP",
|
||||
"description": "CuteNews Avatar 2.1.2 Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-30T08:21:46Z",
|
||||
"updated_at": "2020-10-30T09:03:31Z",
|
||||
"pushed_at": "2020-10-30T09:03:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2020-10-26T02:33:41Z",
|
||||
"updated_at": "2020-10-30T04:53:21Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-29T14:01:58Z",
|
||||
"updated_at": "2020-10-30T09:05:48Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 1985,
|
||||
"watchers_count": 1985,
|
||||
"forks_count": 523,
|
||||
"forks": 523,
|
||||
"watchers": 1985,
|
||||
"stargazers_count": 1987,
|
||||
"watchers_count": 1987,
|
||||
"forks_count": 525,
|
||||
"forks": 525,
|
||||
"watchers": 1987,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -707,8 +707,8 @@
|
|||
"pushed_at": "2020-03-25T05:07:43Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2020-10-29T19:29:44Z",
|
||||
"updated_at": "2020-10-30T03:44:35Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 659,
|
||||
"watchers_count": 659,
|
||||
"stargazers_count": 660,
|
||||
"watchers_count": 660,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"watchers": 659,
|
||||
"watchers": 660,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1002,13 +1002,13 @@
|
|||
"description": "该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-02T12:12:03Z",
|
||||
"updated_at": "2020-10-14T13:15:32Z",
|
||||
"updated_at": "2020-10-30T08:47:46Z",
|
||||
"pushed_at": "2020-08-28T09:21:00Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-10-29T22:18:11Z",
|
||||
"updated_at": "2020-10-30T07:53:31Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1170,
|
||||
"watchers_count": 1170,
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-10-28T19:04:28Z",
|
||||
"updated_at": "2020-10-30T07:46:07Z",
|
||||
"pushed_at": "2020-09-25T15:32:01Z",
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"stargazers_count": 684,
|
||||
"watchers_count": 684,
|
||||
"forks_count": 197,
|
||||
"forks": 197,
|
||||
"watchers": 683,
|
||||
"watchers": 684,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-10-30T03:11:06Z",
|
||||
"pushed_at": "2020-10-30T03:11:04Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 29,
|
||||
"updated_at": "2020-10-30T08:58:43Z",
|
||||
"pushed_at": "2020-10-30T08:58:41Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020–14882 by Jang",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T21:28:12Z",
|
||||
"updated_at": "2020-10-30T02:07:46Z",
|
||||
"updated_at": "2020-10-30T04:52:09Z",
|
||||
"pushed_at": "2020-10-29T03:57:09Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 15,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-14882 Weblogic-Exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T06:30:30Z",
|
||||
"updated_at": "2020-10-29T20:44:13Z",
|
||||
"updated_at": "2020-10-30T04:52:01Z",
|
||||
"pushed_at": "2020-10-29T06:36:01Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-21T15:38:22Z",
|
||||
"updated_at": "2020-10-30T03:03:05Z",
|
||||
"updated_at": "2020-10-30T08:15:45Z",
|
||||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 141,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-29T14:01:58Z",
|
||||
"updated_at": "2020-10-30T09:05:48Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 1985,
|
||||
"watchers_count": 1985,
|
||||
"forks_count": 523,
|
||||
"forks": 523,
|
||||
"watchers": 1985,
|
||||
"stargazers_count": 1987,
|
||||
"watchers_count": 1987,
|
||||
"forks_count": 525,
|
||||
"forks": 525,
|
||||
"watchers": 1987,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-29T16:54:16Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-25T15:58:02Z",
|
||||
"updated_at": "2020-10-30T01:04:00Z",
|
||||
"updated_at": "2020-10-30T07:03:53Z",
|
||||
"pushed_at": "2020-10-28T17:35:55Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -4435,6 +4435,7 @@ An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate th
|
|||
|
||||
- [CRFSlick/CVE-2019-11447-POC](https://github.com/CRFSlick/CVE-2019-11447-POC)
|
||||
- [mt-code/CVE-2019-11447](https://github.com/mt-code/CVE-2019-11447)
|
||||
- [khuntor/CVE-2019-11447-EXP](https://github.com/khuntor/CVE-2019-11447-EXP)
|
||||
|
||||
### CVE-2019-11477 (2019-06-18)
|
||||
|
||||
|
|
Loading…
Reference in a new issue