mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/07/12 00:11:25
This commit is contained in:
parent
469762d01d
commit
d00dac1248
34 changed files with 129 additions and 387 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-28T10:28:16Z",
|
||||
"updated_at": "2021-07-03T11:20:31Z",
|
||||
"updated_at": "2021-07-11T09:25:13Z",
|
||||
"pushed_at": "2019-01-30T21:36:22Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 28126641,
|
||||
"name": "CVE-2014-0196",
|
||||
"full_name": "tempbottle\/CVE-2014-0196",
|
||||
"owner": {
|
||||
"login": "tempbottle",
|
||||
"id": 1203820,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1203820?v=4",
|
||||
"html_url": "https:\/\/github.com\/tempbottle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tempbottle\/CVE-2014-0196",
|
||||
"description": "CVE-2014-0196: Linux kernel pty layer race condition memory corruption",
|
||||
"fork": false,
|
||||
"created_at": "2014-12-17T07:39:00Z",
|
||||
"updated_at": "2015-10-24T13:32:06Z",
|
||||
"pushed_at": "2014-05-13T04:53:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,52 +22,6 @@
|
|||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 21604310,
|
||||
"name": "CVE-2014-0224",
|
||||
"full_name": "iph0n3\/CVE-2014-0224",
|
||||
"owner": {
|
||||
"login": "iph0n3",
|
||||
"id": 1528152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1528152?v=4",
|
||||
"html_url": "https:\/\/github.com\/iph0n3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iph0n3\/CVE-2014-0224",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2014-07-08T08:08:00Z",
|
||||
"updated_at": "2015-08-10T05:31:12Z",
|
||||
"pushed_at": "2014-06-06T08:33:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 21711116,
|
||||
"name": "ccs-eval",
|
||||
"full_name": "droptables\/ccs-eval",
|
||||
"owner": {
|
||||
"login": "droptables",
|
||||
"id": 5084547,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5084547?v=4",
|
||||
"html_url": "https:\/\/github.com\/droptables"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/droptables\/ccs-eval",
|
||||
"description": "Used for evaluating hosts for CVE-2014-0224",
|
||||
"fork": false,
|
||||
"created_at": "2014-07-10T21:32:28Z",
|
||||
"updated_at": "2015-04-07T04:27:18Z",
|
||||
"pushed_at": "2014-07-10T21:41:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 21854976,
|
||||
"name": "openssl-ccs-cve-2014-0224",
|
||||
|
@ -90,28 +44,5 @@
|
|||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 21900951,
|
||||
"name": "CVE-2014-0224",
|
||||
"full_name": "secretnonempty\/CVE-2014-0224",
|
||||
"owner": {
|
||||
"login": "secretnonempty",
|
||||
"id": 1168808,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1168808?v=4",
|
||||
"html_url": "https:\/\/github.com\/secretnonempty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/secretnonempty\/CVE-2014-0224",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2014-07-16T13:09:41Z",
|
||||
"updated_at": "2021-03-26T12:43:40Z",
|
||||
"pushed_at": "2014-07-18T06:53:23Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 23252947,
|
||||
"name": "cve-2014-0521",
|
||||
"full_name": "molnarg\/cve-2014-0521",
|
||||
"owner": {
|
||||
"login": "molnarg",
|
||||
"id": 894421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/894421?v=4",
|
||||
"html_url": "https:\/\/github.com\/molnarg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/molnarg\/cve-2014-0521",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2014-08-23T09:54:18Z",
|
||||
"updated_at": "2021-02-15T11:51:51Z",
|
||||
"pushed_at": "2014-08-25T06:41:02Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 22477484,
|
||||
"name": "freePW_tc7200Eploit",
|
||||
"full_name": "tihmstar\/freePW_tc7200Eploit",
|
||||
"owner": {
|
||||
"login": "tihmstar",
|
||||
"id": 1363935,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1363935?v=4",
|
||||
"html_url": "https:\/\/github.com\/tihmstar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tihmstar\/freePW_tc7200Eploit",
|
||||
"description": "Technicolor TC7200 - Credentials Disclosure CVE : CVE-2014-1677",
|
||||
"fork": false,
|
||||
"created_at": "2014-07-31T17:01:29Z",
|
||||
"updated_at": "2019-10-08T13:33:12Z",
|
||||
"pushed_at": "2014-07-31T17:07:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 21585576,
|
||||
"name": "ElasticSearch-CVE-2014-3120",
|
||||
"full_name": "echohtp\/ElasticSearch-CVE-2014-3120",
|
||||
"owner": {
|
||||
"login": "echohtp",
|
||||
"id": 313060,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/313060?v=4",
|
||||
"html_url": "https:\/\/github.com\/echohtp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/echohtp\/ElasticSearch-CVE-2014-3120",
|
||||
"description": "POC Code to exploite CVE-2014-3120",
|
||||
"fork": false,
|
||||
"created_at": "2014-07-07T20:28:34Z",
|
||||
"updated_at": "2021-05-06T08:08:37Z",
|
||||
"pushed_at": "2014-07-07T20:35:30Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-10T17:17:21Z",
|
||||
"updated_at": "2021-07-11T14:27:04Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1103,
|
||||
"watchers_count": 1103,
|
||||
"stargazers_count": 1104,
|
||||
"watchers_count": 1104,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 1103,
|
||||
"watchers": 1104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 24422837,
|
||||
"name": "bash-cve-2014-6271-fixes",
|
||||
"full_name": "dlitz\/bash-cve-2014-6271-fixes",
|
||||
"owner": {
|
||||
"login": "dlitz",
|
||||
"id": 99377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99377?v=4",
|
||||
"html_url": "https:\/\/github.com\/dlitz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dlitz\/bash-cve-2014-6271-fixes",
|
||||
"description": "Collected fixes for bash CVE-2014-6271",
|
||||
"fork": false,
|
||||
"created_at": "2014-09-24T16:26:17Z",
|
||||
"updated_at": "2014-09-24T16:26:17Z",
|
||||
"pushed_at": "2014-09-24T17:38:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 24427252,
|
||||
"name": "ansible-bashpocalypse",
|
||||
"full_name": "npm\/ansible-bashpocalypse",
|
||||
"owner": {
|
||||
"login": "npm",
|
||||
"id": 6078720,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6078720?v=4",
|
||||
"html_url": "https:\/\/github.com\/npm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/npm\/ansible-bashpocalypse",
|
||||
"description": "Patch for CVE-2014-6271",
|
||||
"fork": false,
|
||||
"created_at": "2014-09-24T18:27:03Z",
|
||||
"updated_at": "2019-11-15T20:59:42Z",
|
||||
"pushed_at": "2014-09-24T19:03:14Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 24433228,
|
||||
"name": "patched-bash-4.3",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-10T17:17:21Z",
|
||||
"updated_at": "2021-07-11T14:27:04Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1103,
|
||||
"watchers_count": 1103,
|
||||
"stargazers_count": 1104,
|
||||
"watchers_count": 1104,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 1103,
|
||||
"watchers": 1104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 329959230,
|
||||
"name": "poc_CVE-2016-6210",
|
||||
"full_name": "ubrito\/poc_CVE-2016-6210",
|
||||
"owner": {
|
||||
"login": "ubrito",
|
||||
"id": 13032912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13032912?v=4",
|
||||
"html_url": "https:\/\/github.com\/ubrito"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ubrito\/poc_CVE-2016-6210",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T16:05:09Z",
|
||||
"updated_at": "2021-01-15T16:41:05Z",
|
||||
"pushed_at": "2021-01-15T16:41:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-10T17:17:21Z",
|
||||
"updated_at": "2021-07-11T14:27:04Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1103,
|
||||
"watchers_count": 1103,
|
||||
"stargazers_count": 1104,
|
||||
"watchers_count": 1104,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 1103,
|
||||
"watchers": 1104,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T14:14:12Z",
|
||||
"updated_at": "2021-06-14T16:47:22Z",
|
||||
"updated_at": "2021-07-11T13:49:13Z",
|
||||
"pushed_at": "2021-03-14T10:52:28Z",
|
||||
"stargazers_count": 470,
|
||||
"watchers_count": 470,
|
||||
"stargazers_count": 471,
|
||||
"watchers_count": 471,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 470,
|
||||
"watchers": 471,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-10T17:17:21Z",
|
||||
"updated_at": "2021-07-11T14:27:04Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1103,
|
||||
"watchers_count": 1103,
|
||||
"stargazers_count": 1104,
|
||||
"watchers_count": 1104,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 1103,
|
||||
"watchers": 1104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2021-07-05T06:50:32Z",
|
||||
"updated_at": "2021-07-11T12:17:25Z",
|
||||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 136,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-10T17:17:21Z",
|
||||
"updated_at": "2021-07-11T14:27:04Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1103,
|
||||
"watchers_count": 1103,
|
||||
"stargazers_count": 1104,
|
||||
"watchers_count": 1104,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 1103,
|
||||
"watchers": 1104,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 518,
|
||||
"watchers_count": 518,
|
||||
"forks_count": 137,
|
||||
"forks": 137,
|
||||
"forks_count": 138,
|
||||
"forks": 138,
|
||||
"watchers": 518,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-07-08T03:26:07Z",
|
||||
"updated_at": "2021-07-11T10:11:01Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 582,
|
||||
"watchers_count": 582,
|
||||
"stargazers_count": 583,
|
||||
"watchers_count": 583,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"watchers": 582,
|
||||
"watchers": 583,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-17T17:59:26Z",
|
||||
"updated_at": "2021-07-08T09:10:43Z",
|
||||
"updated_at": "2021-07-11T10:08:25Z",
|
||||
"pushed_at": "2019-10-15T17:05:38Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 282,
|
||||
"watchers": 284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -841,13 +841,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-07-11T02:54:54Z",
|
||||
"updated_at": "2021-07-11T12:24:33Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1133,
|
||||
"watchers_count": 1133,
|
||||
"stargazers_count": 1134,
|
||||
"watchers_count": 1134,
|
||||
"forks_count": 357,
|
||||
"forks": 357,
|
||||
"watchers": 1133,
|
||||
"watchers": 1134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-07-08T15:33:32Z",
|
||||
"updated_at": "2021-07-11T12:35:00Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 368,
|
||||
"watchers_count": 368,
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 368,
|
||||
"watchers": 369,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Experimenting with the CVE-2020-14343 PyYAML vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-27T06:56:15Z",
|
||||
"updated_at": "2021-07-11T04:20:46Z",
|
||||
"pushed_at": "2021-07-11T04:20:44Z",
|
||||
"updated_at": "2021-07-11T12:54:08Z",
|
||||
"pushed_at": "2021-07-11T12:54:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-07-10T12:13:49Z",
|
||||
"updated_at": "2021-07-11T14:23:02Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 330,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"forks_count": 103,
|
||||
"forks": 103,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-07-11T04:43:40Z",
|
||||
"updated_at": "2021-07-11T11:28:47Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 800,
|
||||
"watchers_count": 800,
|
||||
"stargazers_count": 801,
|
||||
"watchers_count": 801,
|
||||
"forks_count": 253,
|
||||
"forks": 253,
|
||||
"watchers": 800,
|
||||
"watchers": 801,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -596,5 +596,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384971364,
|
||||
"name": "CVE-2020-1938",
|
||||
"full_name": "yukiNeko114514\/CVE-2020-1938",
|
||||
"owner": {
|
||||
"login": "yukiNeko114514",
|
||||
"id": 83222283,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83222283?v=4",
|
||||
"html_url": "https:\/\/github.com\/yukiNeko114514"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yukiNeko114514\/CVE-2020-1938",
|
||||
"description": "Scanner for CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-11T14:38:21Z",
|
||||
"updated_at": "2021-07-11T14:41:14Z",
|
||||
"pushed_at": "2021-07-11T14:41:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-10T17:17:21Z",
|
||||
"updated_at": "2021-07-11T14:27:04Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1103,
|
||||
"watchers_count": 1103,
|
||||
"stargazers_count": 1104,
|
||||
"watchers_count": 1104,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 1103,
|
||||
"watchers": 1104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-28T06:51:26Z",
|
||||
"updated_at": "2021-07-10T12:42:26Z",
|
||||
"updated_at": "2021-07-11T12:14:30Z",
|
||||
"pushed_at": "2021-07-10T12:42:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-07-11T08:55:53Z",
|
||||
"updated_at": "2021-07-11T14:10:40Z",
|
||||
"pushed_at": "2021-07-08T11:10:36Z",
|
||||
"stargazers_count": 1156,
|
||||
"watchers_count": 1156,
|
||||
"stargazers_count": 1159,
|
||||
"watchers_count": 1159,
|
||||
"forks_count": 413,
|
||||
"forks": 413,
|
||||
"watchers": 1156,
|
||||
"watchers": 1159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-07-11T07:31:11Z",
|
||||
"updated_at": "2021-07-11T10:41:35Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 469,
|
||||
"watchers_count": 469,
|
||||
"stargazers_count": 470,
|
||||
"watchers_count": 470,
|
||||
"forks_count": 122,
|
||||
"forks": 122,
|
||||
"watchers": 469,
|
||||
"watchers": 470,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -519,13 +519,13 @@
|
|||
"description": "CVE-2021-1675 (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T14:17:03Z",
|
||||
"updated_at": "2021-07-10T16:56:40Z",
|
||||
"updated_at": "2021-07-11T10:41:15Z",
|
||||
"pushed_at": "2021-07-05T14:34:34Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2021-06-30T13:31:11Z",
|
||||
"updated_at": "2021-07-11T14:27:07Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-07-05T16:10:41Z",
|
||||
"updated_at": "2021-07-11T14:34:58Z",
|
||||
"pushed_at": "2021-03-10T05:01:22Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 268,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2021-07-08T10:34:46Z",
|
||||
"updated_at": "2021-07-11T13:56:45Z",
|
||||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 181,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-07-11T04:43:40Z",
|
||||
"updated_at": "2021-07-11T11:28:47Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 800,
|
||||
"watchers_count": 800,
|
||||
"stargazers_count": 801,
|
||||
"watchers_count": 801,
|
||||
"forks_count": 253,
|
||||
"forks": 253,
|
||||
"watchers": 800,
|
||||
"watchers": 801,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-07-11T08:26:09Z",
|
||||
"updated_at": "2021-07-11T11:42:02Z",
|
||||
"pushed_at": "2021-07-05T13:29:56Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 329,
|
||||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1080,29 +1080,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 378544483,
|
||||
"name": "docker-cve-2021-3156",
|
||||
"full_name": "mrofisr\/docker-cve-2021-3156",
|
||||
"owner": {
|
||||
"login": "mrofisr",
|
||||
"id": 31870041,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31870041?v=4",
|
||||
"html_url": "https:\/\/github.com\/mrofisr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mrofisr\/docker-cve-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-20T02:47:02Z",
|
||||
"updated_at": "2021-06-20T02:47:02Z",
|
||||
"pushed_at": "2021-06-20T02:47:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 380136612,
|
||||
"name": "CVE-2021-3156",
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2021-07-11T08:50:45Z",
|
||||
"updated_at": "2021-07-11T12:46:50Z",
|
||||
"pushed_at": "2021-07-09T15:49:23Z",
|
||||
"stargazers_count": 517,
|
||||
"watchers_count": 517,
|
||||
"stargazers_count": 519,
|
||||
"watchers_count": 519,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 517,
|
||||
"watchers": 519,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
26
README.md
26
README.md
|
@ -253,7 +253,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [LiveOverflow/pwnedit](https://github.com/LiveOverflow/pwnedit)
|
||||
- [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build)
|
||||
- [wuuconix/CVE-2021-3156-Dockerfile-not-succeed](https://github.com/wuuconix/CVE-2021-3156-Dockerfile-not-succeed)
|
||||
- [mrofisr/docker-cve-2021-3156](https://github.com/mrofisr/docker-cve-2021-3156)
|
||||
- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
|
||||
- [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156)
|
||||
|
||||
|
@ -2242,6 +2241,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
|||
- [YU5Z8X2CvH1fv4ep/CVE-2020-1938-MSF-MODULE](https://github.com/YU5Z8X2CvH1fv4ep/CVE-2020-1938-MSF-MODULE)
|
||||
- [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat)
|
||||
- [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938)
|
||||
- [yukiNeko114514/CVE-2020-1938](https://github.com/yukiNeko114514/CVE-2020-1938)
|
||||
|
||||
### CVE-2020-1947 (2020-03-11)
|
||||
|
||||
|
@ -15927,7 +15927,6 @@ sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password has
|
|||
</code>
|
||||
|
||||
- [justlce/CVE-2016-6210-Exploit](https://github.com/justlce/CVE-2016-6210-Exploit)
|
||||
- [ubrito/poc_CVE-2016-6210](https://github.com/ubrito/poc_CVE-2016-6210)
|
||||
|
||||
### CVE-2016-6271 (2017-01-18)
|
||||
|
||||
|
@ -17322,7 +17321,6 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
|
|||
</code>
|
||||
|
||||
- [SunRain/CVE-2014-0196](https://github.com/SunRain/CVE-2014-0196)
|
||||
- [tempbottle/CVE-2014-0196](https://github.com/tempbottle/CVE-2014-0196)
|
||||
|
||||
### CVE-2014-0224 (2014-06-05)
|
||||
|
||||
|
@ -17331,10 +17329,7 @@ OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not pr
|
|||
</code>
|
||||
|
||||
- [Tripwire/OpenSSL-CCS-Inject-Test](https://github.com/Tripwire/OpenSSL-CCS-Inject-Test)
|
||||
- [iph0n3/CVE-2014-0224](https://github.com/iph0n3/CVE-2014-0224)
|
||||
- [droptables/ccs-eval](https://github.com/droptables/ccs-eval)
|
||||
- [ssllabs/openssl-ccs-cve-2014-0224](https://github.com/ssllabs/openssl-ccs-cve-2014-0224)
|
||||
- [secretnonempty/CVE-2014-0224](https://github.com/secretnonempty/CVE-2014-0224)
|
||||
|
||||
### CVE-2014-0226 (2014-07-20)
|
||||
|
||||
|
@ -17363,14 +17358,6 @@ The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x bef
|
|||
|
||||
- [christasa/CVE-2014-0472](https://github.com/christasa/CVE-2014-0472)
|
||||
|
||||
### CVE-2014-0521 (2014-05-14)
|
||||
|
||||
<code>
|
||||
Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X do not properly implement JavaScript APIs, which allows remote attackers to obtain sensitive information via a crafted PDF document.
|
||||
</code>
|
||||
|
||||
- [molnarg/cve-2014-0521](https://github.com/molnarg/cve-2014-0521)
|
||||
|
||||
### CVE-2014-0816 (2014-02-26)
|
||||
|
||||
<code>
|
||||
|
@ -17425,14 +17412,6 @@ Race condition in the virNetServerClientStartKeepAlive function in libvirt befor
|
|||
|
||||
- [tagatac/libvirt-CVE-2014-1447](https://github.com/tagatac/libvirt-CVE-2014-1447)
|
||||
|
||||
### CVE-2014-1677 (2017-04-03)
|
||||
|
||||
<code>
|
||||
Technicolor TC7200 with firmware STD6.01.12 could allow remote attackers to obtain sensitive information.
|
||||
</code>
|
||||
|
||||
- [tihmstar/freePW_tc7200Eploit](https://github.com/tihmstar/freePW_tc7200Eploit)
|
||||
|
||||
### CVE-2014-1773 (2014-06-10)
|
||||
|
||||
<code>
|
||||
|
@ -17497,7 +17476,6 @@ The default configuration in Elasticsearch before 1.2 enables dynamic scripting,
|
|||
</code>
|
||||
|
||||
- [jeffgeiger/es_inject](https://github.com/jeffgeiger/es_inject)
|
||||
- [echohtp/ElasticSearch-CVE-2014-3120](https://github.com/echohtp/ElasticSearch-CVE-2014-3120)
|
||||
|
||||
### CVE-2014-3153 (2014-06-07)
|
||||
|
||||
|
@ -17729,8 +17707,6 @@ host-deny.sh in OSSEC before 2.8.1 writes to temporary files with predictable fi
|
|||
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
|
||||
</code>
|
||||
|
||||
- [dlitz/bash-cve-2014-6271-fixes](https://github.com/dlitz/bash-cve-2014-6271-fixes)
|
||||
- [npm/ansible-bashpocalypse](https://github.com/npm/ansible-bashpocalypse)
|
||||
- [ryancnelson/patched-bash-4.3](https://github.com/ryancnelson/patched-bash-4.3)
|
||||
- [jblaine/cookbook-bash-CVE-2014-6271](https://github.com/jblaine/cookbook-bash-CVE-2014-6271)
|
||||
- [rrreeeyyy/cve-2014-6271-spec](https://github.com/rrreeeyyy/cve-2014-6271-spec)
|
||||
|
|
Loading…
Reference in a new issue