mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2019/12/30 00:30:01
This commit is contained in:
parent
46d5697e6b
commit
d8d39f2d92
22 changed files with 103 additions and 80 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2019-12-28T14:57:04Z",
|
||||
"updated_at": "2019-12-29T12:11:33Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2230,
|
||||
"watchers_count": 2230,
|
||||
"stargazers_count": 2231,
|
||||
"watchers_count": 2231,
|
||||
"forks_count": 482,
|
||||
"forks": 482,
|
||||
"watchers": 2230,
|
||||
"watchers": 2231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Takedown WordPress sites using long passwords (CVE-2014-9016)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-20T18:47:36Z",
|
||||
"updated_at": "2019-12-20T18:51:42Z",
|
||||
"updated_at": "2019-12-29T10:26:37Z",
|
||||
"pushed_at": "2019-12-20T18:51:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-04-07T00:30:52Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-08T18:12:03Z",
|
||||
"updated_at": "2019-08-21T02:53:43Z",
|
||||
"updated_at": "2019-12-29T13:20:57Z",
|
||||
"pushed_at": "2018-10-09T16:44:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-06-11T17:08:51Z",
|
||||
"stargazers_count": 377,
|
||||
"watchers_count": 377,
|
||||
"forks_count": 105,
|
||||
"forks": 105,
|
||||
"forks_count": 106,
|
||||
"forks": 106,
|
||||
"watchers": 377,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2019-12-29T04:12:41Z",
|
||||
"updated_at": "2019-12-29T11:31:46Z",
|
||||
"pushed_at": "2019-12-26T22:21:12Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"forks_count": 114,
|
||||
"forks": 114,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-12-13T02:24:39Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "exploit camera with vuln cve-2018-9995 ( Novo, CeNova, QSee, Pulnix, XVR 5 in 1 (title: \"XVR Login\"), Securus, - Security. Never Compromise !! - Night OWL, DVR Login, HVR Login, MDVR Login )",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-30T10:54:40Z",
|
||||
"updated_at": "2018-06-30T10:57:12Z",
|
||||
"updated_at": "2019-12-29T09:58:07Z",
|
||||
"pushed_at": "2018-06-30T10:55:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-23T20:58:40Z",
|
||||
"updated_at": "2019-11-15T06:28:44Z",
|
||||
"updated_at": "2019-12-29T09:54:57Z",
|
||||
"pushed_at": "2018-10-11T16:54:31Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-26T06:58:56Z",
|
||||
"updated_at": "2019-12-29T04:58:52Z",
|
||||
"updated_at": "2019-12-29T13:49:28Z",
|
||||
"pushed_at": "2019-12-26T08:44:54Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2019-12-28T18:24:00Z",
|
||||
"updated_at": "2019-12-29T10:54:09Z",
|
||||
"pushed_at": "2019-12-28T18:23:58Z",
|
||||
"stargazers_count": 534,
|
||||
"watchers_count": 534,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2019-12-23T15:18:53Z",
|
||||
"updated_at": "2019-12-29T10:01:50Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 619,
|
||||
"watchers_count": 619,
|
||||
"stargazers_count": 620,
|
||||
"watchers_count": 620,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 619,
|
||||
"watchers": 620,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "sploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T00:44:25Z",
|
||||
"updated_at": "2019-12-28T18:40:42Z",
|
||||
"updated_at": "2019-12-29T14:57:31Z",
|
||||
"pushed_at": "2019-12-21T00:56:27Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2019-12-28T02:10:54Z",
|
||||
"updated_at": "2019-12-29T09:29:26Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 202,
|
||||
"watchers": 203,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -178,9 +178,32 @@
|
|||
"pushed_at": "2019-12-25T13:48:27Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 230738228,
|
||||
"name": "webmin_CVE-2019-15107",
|
||||
"full_name": "ChakoMoonFish\/webmin_CVE-2019-15107",
|
||||
"owner": {
|
||||
"login": "ChakoMoonFish",
|
||||
"id": 5085275,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5085275?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChakoMoonFish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChakoMoonFish\/webmin_CVE-2019-15107",
|
||||
"description": "webmin_CVE-2019-15107",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-29T11:02:35Z",
|
||||
"updated_at": "2019-12-29T11:03:18Z",
|
||||
"pushed_at": "2019-12-29T11:03:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-12-21T17:31:56Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-25T16:46:11Z",
|
||||
"updated_at": "2019-12-29T08:56:13Z",
|
||||
"updated_at": "2019-12-29T13:49:01Z",
|
||||
"pushed_at": "2019-12-25T16:48:41Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2019-12-28T02:18:53Z",
|
||||
"updated_at": "2019-12-29T10:51:35Z",
|
||||
"pushed_at": "2019-12-18T15:32:15Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "FreeFTPd 1.0.8 Post-Authentication Buffer Overflow via SIZE",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-28T18:24:02Z",
|
||||
"updated_at": "2019-12-29T01:28:17Z",
|
||||
"updated_at": "2019-12-29T14:47:34Z",
|
||||
"pushed_at": "2019-12-20T09:44:06Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-08T10:44:51Z",
|
||||
"updated_at": "2019-12-28T07:15:14Z",
|
||||
"updated_at": "2019-12-29T14:59:09Z",
|
||||
"pushed_at": "2019-12-08T17:55:01Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T04:30:34Z",
|
||||
"updated_at": "2019-12-28T01:55:01Z",
|
||||
"updated_at": "2019-12-29T11:18:12Z",
|
||||
"pushed_at": "2019-12-24T12:31:47Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1987",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-17T10:22:01Z",
|
||||
"updated_at": "2019-11-23T05:18:10Z",
|
||||
"updated_at": "2019-12-29T12:35:16Z",
|
||||
"pushed_at": "2019-03-02T19:54:06Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Reference in a new issue