mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/11/05 00:09:09
This commit is contained in:
parent
3b0d0f1002
commit
c5e1467eaa
33 changed files with 171 additions and 138 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A tool i made for use in combination with hackerone.com for Bounty Hacking purposes.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T19:16:43Z",
|
||||
"updated_at": "2019-05-03T07:23:19Z",
|
||||
"updated_at": "2020-11-04T13:51:46Z",
|
||||
"pushed_at": "2018-02-10T20:07:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2000-0170",
|
||||
"fork": false,
|
||||
"created_at": "2014-11-08T15:21:30Z",
|
||||
"updated_at": "2017-07-01T19:23:55Z",
|
||||
"updated_at": "2020-11-04T13:52:06Z",
|
||||
"pushed_at": "2014-11-08T15:25:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T18:39:56Z",
|
||||
"updated_at": "2020-10-24T13:55:23Z",
|
||||
"updated_at": "2020-11-04T10:36:06Z",
|
||||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T06:39:51Z",
|
||||
"updated_at": "2020-11-04T09:27:13Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 742,
|
||||
"watchers_count": 742,
|
||||
"stargazers_count": 743,
|
||||
"watchers_count": 743,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 742,
|
||||
"watchers": 743,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T06:39:51Z",
|
||||
"updated_at": "2020-11-04T09:27:13Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 742,
|
||||
"watchers_count": 742,
|
||||
"stargazers_count": 743,
|
||||
"watchers_count": 743,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 742,
|
||||
"watchers": 743,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-26T13:39:03Z",
|
||||
"updated_at": "2020-10-28T09:08:42Z",
|
||||
"updated_at": "2020-11-04T13:57:23Z",
|
||||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"watchers": 350,
|
||||
"watchers": 352,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2020-10-28T03:06:57Z",
|
||||
"updated_at": "2020-11-04T13:57:14Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 192,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 194,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NodeJS + Postgres (Remote Code Execution) 🛰",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-27T18:09:17Z",
|
||||
"updated_at": "2020-11-04T01:21:00Z",
|
||||
"updated_at": "2020-11-04T10:34:55Z",
|
||||
"pushed_at": "2018-11-27T18:42:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T06:39:51Z",
|
||||
"updated_at": "2020-11-04T09:27:13Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 742,
|
||||
"watchers_count": 742,
|
||||
"stargazers_count": 743,
|
||||
"watchers_count": 743,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 742,
|
||||
"watchers": 743,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Test utility for cve-2018-1002105",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-05T02:51:43Z",
|
||||
"updated_at": "2020-10-21T22:16:32Z",
|
||||
"updated_at": "2020-11-04T13:06:55Z",
|
||||
"pushed_at": "2018-12-13T16:56:28Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 192,
|
||||
"watchers": 194,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -339,8 +339,8 @@
|
|||
"pushed_at": "2018-10-25T18:23:52Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T06:39:51Z",
|
||||
"updated_at": "2020-11-04T09:27:13Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 742,
|
||||
"watchers_count": 742,
|
||||
"stargazers_count": 743,
|
||||
"watchers_count": 743,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 742,
|
||||
"watchers": 743,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2020-11-03T00:00:52Z",
|
||||
"updated_at": "2020-11-04T11:35:25Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"watchers": 341,
|
||||
"watchers": 342,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2019-0808-poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-25T11:53:35Z",
|
||||
"updated_at": "2020-10-14T01:48:06Z",
|
||||
"updated_at": "2020-11-04T13:19:21Z",
|
||||
"pushed_at": "2019-03-25T12:10:40Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 41,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -266,13 +266,13 @@
|
|||
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T21:11:27Z",
|
||||
"updated_at": "2020-10-01T02:23:28Z",
|
||||
"updated_at": "2020-11-04T14:42:54Z",
|
||||
"pushed_at": "2020-04-28T04:25:33Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-04T06:48:49Z",
|
||||
"updated_at": "2020-11-04T12:36:46Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 2001,
|
||||
"watchers_count": 2001,
|
||||
"stargazers_count": 2003,
|
||||
"watchers_count": 2003,
|
||||
"forks_count": 525,
|
||||
"forks": 525,
|
||||
"watchers": 2001,
|
||||
"watchers": 2003,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2020-11-04T05:48:21Z",
|
||||
"updated_at": "2020-11-04T10:35:26Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T06:39:51Z",
|
||||
"updated_at": "2020-11-04T09:27:13Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 742,
|
||||
"watchers_count": 742,
|
||||
"stargazers_count": 743,
|
||||
"watchers_count": 743,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 742,
|
||||
"watchers": 743,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2020-10-20T10:09:08Z",
|
||||
"updated_at": "2020-11-04T11:35:01Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 135,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -864,13 +864,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-10-29T16:57:48Z",
|
||||
"updated_at": "2020-11-04T10:44:20Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 1028,
|
||||
"watchers_count": 1028,
|
||||
"stargazers_count": 1027,
|
||||
"watchers_count": 1027,
|
||||
"forks_count": 338,
|
||||
"forks": 338,
|
||||
"watchers": 1028,
|
||||
"watchers": 1027,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T23:22:15Z",
|
||||
"updated_at": "2020-10-27T19:08:30Z",
|
||||
"updated_at": "2020-11-04T10:17:33Z",
|
||||
"pushed_at": "2020-06-17T18:10:30Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2020-13277 靶场: Gitlab 越权访问漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-31T11:01:26Z",
|
||||
"updated_at": "2020-11-02T01:17:25Z",
|
||||
"pushed_at": "2020-11-02T01:17:23Z",
|
||||
"updated_at": "2020-11-04T10:41:06Z",
|
||||
"pushed_at": "2020-11-04T10:41:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-02T14:48:55Z",
|
||||
"updated_at": "2020-11-04T07:32:19Z",
|
||||
"updated_at": "2020-11-04T14:42:10Z",
|
||||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 41,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-11-04T05:30:47Z",
|
||||
"updated_at": "2020-11-04T09:29:58Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 686,
|
||||
"watchers_count": 686,
|
||||
"stargazers_count": 687,
|
||||
"watchers_count": 687,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 686,
|
||||
"watchers": 687,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2020-11-04T08:30:20Z",
|
||||
"updated_at": "2020-11-04T11:09:39Z",
|
||||
"pushed_at": "2020-11-04T02:26:59Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 117,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +243,13 @@
|
|||
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T10:49:35Z",
|
||||
"updated_at": "2020-11-04T08:43:48Z",
|
||||
"updated_at": "2020-11-04T13:44:58Z",
|
||||
"pushed_at": "2020-11-03T12:12:30Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,13 +289,13 @@
|
|||
"description": "CVE-2020-14882\/14883\/14750",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-04T03:09:13Z",
|
||||
"updated_at": "2020-11-04T08:42:36Z",
|
||||
"updated_at": "2020-11-04T13:57:35Z",
|
||||
"pushed_at": "2020-11-04T03:15:33Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-15227 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T02:38:15Z",
|
||||
"updated_at": "2020-11-04T09:08:29Z",
|
||||
"updated_at": "2020-11-04T14:30:16Z",
|
||||
"pushed_at": "2020-10-09T16:39:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-15999",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T16:16:25Z",
|
||||
"updated_at": "2020-11-04T08:33:56Z",
|
||||
"updated_at": "2020-11-04T10:32:36Z",
|
||||
"pushed_at": "2020-11-03T17:53:20Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-07T19:56:09Z",
|
||||
"updated_at": "2020-11-04T02:08:41Z",
|
||||
"updated_at": "2020-11-04T09:12:46Z",
|
||||
"pushed_at": "2020-10-26T10:15:32Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 196,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-11-04T06:39:51Z",
|
||||
"updated_at": "2020-11-04T15:10:03Z",
|
||||
"pushed_at": "2020-09-02T16:21:12Z",
|
||||
"stargazers_count": 742,
|
||||
"watchers_count": 742,
|
||||
"stargazers_count": 744,
|
||||
"watchers_count": 744,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 742,
|
||||
"watchers": 744,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-27194.json
Normal file
25
2020/CVE-2020-27194.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 309990198,
|
||||
"name": "CVE-2020-27194-exp",
|
||||
"full_name": "willinin\/CVE-2020-27194-exp",
|
||||
"owner": {
|
||||
"login": "willinin",
|
||||
"id": 13467761,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13467761?v=4",
|
||||
"html_url": "https:\/\/github.com\/willinin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/willinin\/CVE-2020-27194-exp",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-04T12:02:34Z",
|
||||
"updated_at": "2020-11-04T13:10:25Z",
|
||||
"pushed_at": "2020-11-04T13:10:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-11-04T06:48:49Z",
|
||||
"updated_at": "2020-11-04T12:36:46Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 2001,
|
||||
"watchers_count": 2001,
|
||||
"stargazers_count": 2003,
|
||||
"watchers_count": 2003,
|
||||
"forks_count": 525,
|
||||
"forks": 525,
|
||||
"watchers": 2001,
|
||||
"watchers": 2003,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/13852\/commits\/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s):\/\/IP:Port",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T18:45:53Z",
|
||||
"updated_at": "2020-10-19T10:56:00Z",
|
||||
"updated_at": "2020-11-04T10:45:28Z",
|
||||
"pushed_at": "2020-07-21T18:50:07Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2679,6 +2679,14 @@ An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-
|
|||
|
||||
- [lukaszstu/SmartAsset-CORS-CVE-2020-26527](https://github.com/lukaszstu/SmartAsset-CORS-CVE-2020-26527)
|
||||
|
||||
### CVE-2020-27194 (2020-10-16)
|
||||
|
||||
<code>
|
||||
An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.
|
||||
</code>
|
||||
|
||||
- [willinin/CVE-2020-27194-exp](https://github.com/willinin/CVE-2020-27194-exp)
|
||||
|
||||
### CVE-2020-27199
|
||||
- [9lyph/CVE-2020-27199](https://github.com/9lyph/CVE-2020-27199)
|
||||
|
||||
|
|
Loading…
Reference in a new issue