mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/01/25 18:10:12
This commit is contained in:
parent
b11e0e48e9
commit
d05a121058
21 changed files with 143 additions and 119 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-25T01:34:16Z",
|
||||
"updated_at": "2021-01-25T03:38:14Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 892,
|
||||
"watchers_count": 892,
|
||||
"stargazers_count": 893,
|
||||
"watchers_count": 893,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"watchers": 892,
|
||||
"watchers": 893,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-25T01:34:16Z",
|
||||
"updated_at": "2021-01-25T03:38:14Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 892,
|
||||
"watchers_count": 892,
|
||||
"stargazers_count": 893,
|
||||
"watchers_count": 893,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"watchers": 892,
|
||||
"watchers": 893,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-25T01:34:16Z",
|
||||
"updated_at": "2021-01-25T03:38:14Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 892,
|
||||
"watchers_count": 892,
|
||||
"stargazers_count": 893,
|
||||
"watchers_count": 893,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"watchers": 892,
|
||||
"watchers": 893,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-13T21:33:55Z",
|
||||
"updated_at": "2020-12-18T03:59:38Z",
|
||||
"updated_at": "2021-01-25T08:24:21Z",
|
||||
"pushed_at": "2017-11-14T10:26:28Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 157,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-25T01:34:16Z",
|
||||
"updated_at": "2021-01-25T03:38:14Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 892,
|
||||
"watchers_count": 892,
|
||||
"stargazers_count": 893,
|
||||
"watchers_count": 893,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"watchers": 892,
|
||||
"watchers": 893,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2021-01-22T09:15:52Z",
|
||||
"updated_at": "2021-01-25T03:33:07Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 446,
|
||||
"watchers_count": 446,
|
||||
"forks_count": 205,
|
||||
"forks": 205,
|
||||
"watchers": 446,
|
||||
"stargazers_count": 447,
|
||||
"watchers_count": 447,
|
||||
"forks_count": 206,
|
||||
"forks": 206,
|
||||
"watchers": 447,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-24T08:55:38Z",
|
||||
"updated_at": "2021-01-25T08:31:26Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2292,
|
||||
"watchers_count": 2292,
|
||||
"stargazers_count": 2294,
|
||||
"watchers_count": 2294,
|
||||
"forks_count": 643,
|
||||
"forks": 643,
|
||||
"watchers": 2292,
|
||||
"watchers": 2294,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-25T01:34:16Z",
|
||||
"updated_at": "2021-01-25T03:38:14Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 892,
|
||||
"watchers_count": 892,
|
||||
"stargazers_count": 893,
|
||||
"watchers_count": 893,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"watchers": 892,
|
||||
"watchers": 893,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -293,8 +293,8 @@
|
|||
"pushed_at": "2019-06-21T01:44:11Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2021-01-25T00:23:30Z",
|
||||
"updated_at": "2021-01-25T08:09:22Z",
|
||||
"pushed_at": "2020-02-11T21:34:28Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 239,
|
||||
"watchers": 243,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1347,13 +1347,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2021-01-20T09:04:14Z",
|
||||
"updated_at": "2021-01-25T07:50:55Z",
|
||||
"pushed_at": "2021-01-15T19:21:25Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-01-24T13:52:30Z",
|
||||
"updated_at": "2021-01-25T07:56:20Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1229,
|
||||
"watchers_count": 1229,
|
||||
"forks_count": 286,
|
||||
"forks": 286,
|
||||
"watchers": 1229,
|
||||
"stargazers_count": 1230,
|
||||
"watchers_count": 1230,
|
||||
"forks_count": 287,
|
||||
"forks": 287,
|
||||
"watchers": 1230,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-01-24T23:08:10Z",
|
||||
"updated_at": "2021-01-25T07:57:35Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 740,
|
||||
"watchers_count": 740,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 740,
|
||||
"stargazers_count": 741,
|
||||
"watchers_count": 741,
|
||||
"forks_count": 217,
|
||||
"forks": 217,
|
||||
"watchers": 741,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2021-01-23T21:18:48Z",
|
||||
"updated_at": "2021-01-25T04:55:28Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 171,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-01-22T14:50:05Z",
|
||||
"updated_at": "2021-01-25T07:56:32Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 269,
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 270,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-24T08:55:38Z",
|
||||
"updated_at": "2021-01-25T08:31:26Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2292,
|
||||
"watchers_count": 2292,
|
||||
"stargazers_count": 2294,
|
||||
"watchers_count": 2294,
|
||||
"forks_count": 643,
|
||||
"forks": 643,
|
||||
"watchers": 2292,
|
||||
"watchers": 2294,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web vulnerability scanning and verification tools,支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp,并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2021-01-25T02:44:01Z",
|
||||
"updated_at": "2021-01-25T08:38:16Z",
|
||||
"pushed_at": "2021-01-22T13:23:09Z",
|
||||
"stargazers_count": 808,
|
||||
"watchers_count": 808,
|
||||
"stargazers_count": 817,
|
||||
"watchers_count": 817,
|
||||
"forks_count": 146,
|
||||
"forks": 146,
|
||||
"watchers": 808,
|
||||
"watchers": 817,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -519,13 +519,13 @@
|
|||
"description": "CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-29T09:11:31Z",
|
||||
"updated_at": "2021-01-20T06:47:18Z",
|
||||
"pushed_at": "2021-01-20T06:47:15Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"updated_at": "2021-01-25T08:54:10Z",
|
||||
"pushed_at": "2021-01-25T07:54:23Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T09:53:08Z",
|
||||
"updated_at": "2020-12-24T03:40:47Z",
|
||||
"updated_at": "2021-01-25T08:00:46Z",
|
||||
"pushed_at": "2020-12-09T09:57:45Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T21:00:15Z",
|
||||
"updated_at": "2020-12-21T07:42:44Z",
|
||||
"updated_at": "2021-01-25T05:19:04Z",
|
||||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 208,
|
||||
"watchers": 209,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-02-21T10:19:52Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-01-25T01:34:16Z",
|
||||
"updated_at": "2021-01-25T03:38:14Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 892,
|
||||
"watchers_count": 892,
|
||||
"stargazers_count": 893,
|
||||
"watchers_count": 893,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"watchers": 892,
|
||||
"watchers": 893,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-23T19:07:18Z",
|
||||
"updated_at": "2021-01-25T01:20:53Z",
|
||||
"updated_at": "2021-01-25T08:52:41Z",
|
||||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T15:20:09Z",
|
||||
"updated_at": "2021-01-22T16:17:36Z",
|
||||
"updated_at": "2021-01-25T04:25:23Z",
|
||||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 147,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:37:11Z",
|
||||
"updated_at": "2021-01-25T03:06:19Z",
|
||||
"updated_at": "2021-01-25T08:24:38Z",
|
||||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-01-22T03:18:07Z",
|
||||
"updated_at": "2021-01-25T06:00:00Z",
|
||||
"pushed_at": "2021-01-13T13:25:10Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,36 @@
|
|||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-01-25T00:21:53Z",
|
||||
"updated_at": "2021-01-25T08:37:10Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 31,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 332682252,
|
||||
"name": "laravel-CVE-2021-3129-EXP",
|
||||
"full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP",
|
||||
"owner": {
|
||||
"login": "SecPros-Team",
|
||||
"id": 77960183,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecPros-Team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T08:42:28Z",
|
||||
"updated_at": "2021-01-25T09:02:05Z",
|
||||
"pushed_at": "2021-01-25T08:49:59Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,6 +44,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
|||
|
||||
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
|
||||
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
|
||||
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
|
||||
|
||||
### CVE-2021-3130 (2021-01-20)
|
||||
|
||||
|
|
Loading…
Reference in a new issue