mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/05/05 06:11:10
This commit is contained in:
parent
2e0466b5a3
commit
dd6c5cdc1c
34 changed files with 186 additions and 138 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-04T11:10:38Z",
|
||||
"updated_at": "2021-05-04T16:18:15Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1014,
|
||||
"watchers_count": 1014,
|
||||
"stargazers_count": 1015,
|
||||
"watchers_count": 1015,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1014,
|
||||
"watchers": 1015,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-13T07:14:01Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-04T11:10:38Z",
|
||||
"updated_at": "2021-05-04T16:18:15Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1014,
|
||||
"watchers_count": 1014,
|
||||
"stargazers_count": 1015,
|
||||
"watchers_count": 1015,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1014,
|
||||
"watchers": 1015,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2021-04-29T05:58:50Z",
|
||||
"updated_at": "2021-05-04T17:36:11Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"forks_count": 105,
|
||||
"forks": 105,
|
||||
"watchers": 220,
|
||||
"watchers": 219,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2016-10-29T08:50:34Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Jquery File Tree 1.6.6 Path Traversal exploit (CVE-2017-1000170)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T12:39:10Z",
|
||||
"updated_at": "2021-03-19T20:12:25Z",
|
||||
"pushed_at": "2021-03-19T13:01:08Z",
|
||||
"updated_at": "2021-05-04T18:21:32Z",
|
||||
"pushed_at": "2021-05-04T18:21:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -289,13 +289,13 @@
|
|||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2021-04-15T02:18:21Z",
|
||||
"updated_at": "2021-05-04T19:03:00Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2021-03-11T01:08:36Z",
|
||||
"updated_at": "2021-05-04T19:02:54Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-04T11:10:38Z",
|
||||
"updated_at": "2021-05-04T16:18:15Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1014,
|
||||
"watchers_count": 1014,
|
||||
"stargazers_count": 1015,
|
||||
"watchers_count": 1015,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1014,
|
||||
"watchers": 1015,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2021-04-15T02:18:21Z",
|
||||
"updated_at": "2021-05-04T19:03:00Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2021-03-11T01:08:36Z",
|
||||
"updated_at": "2021-05-04T19:02:54Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2021-05-01T02:27:32Z",
|
||||
"updated_at": "2021-05-04T20:55:31Z",
|
||||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 417,
|
||||
"watchers_count": 417,
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"forks_count": 399,
|
||||
"forks": 399,
|
||||
"watchers": 417,
|
||||
"watchers": 418,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-04T11:10:38Z",
|
||||
"updated_at": "2021-05-04T16:18:15Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1014,
|
||||
"watchers_count": 1014,
|
||||
"stargazers_count": 1015,
|
||||
"watchers_count": 1015,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1014,
|
||||
"watchers": 1015,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -458,5 +458,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 305114825,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "Elsfa7-110\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "Elsfa7-110",
|
||||
"id": 26175351,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26175351?v=4",
|
||||
"html_url": "https:\/\/github.com\/Elsfa7-110"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Elsfa7-110\/CVE-2018-6389",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-05-04T16:35:09Z",
|
||||
"pushed_at": "2021-05-04T16:34:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T15:33:50Z",
|
||||
"updated_at": "2021-04-19T04:43:17Z",
|
||||
"updated_at": "2021-05-04T16:11:37Z",
|
||||
"pushed_at": "2020-11-09T07:33:12Z",
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 247,
|
||||
"watchers": 246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-04-30T10:10:39Z",
|
||||
"updated_at": "2021-05-04T19:46:05Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1652,
|
||||
"watchers_count": 1652,
|
||||
"stargazers_count": 1651,
|
||||
"watchers_count": 1651,
|
||||
"forks_count": 249,
|
||||
"forks": 249,
|
||||
"watchers": 1652,
|
||||
"watchers": 1651,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2021-03-03T21:12:03Z",
|
||||
"updated_at": "2021-05-04T16:16:24Z",
|
||||
"pushed_at": "2020-05-05T23:34:04Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T20:13:23Z",
|
||||
"updated_at": "2021-03-20T12:58:59Z",
|
||||
"updated_at": "2021-05-04T20:58:41Z",
|
||||
"pushed_at": "2019-10-16T20:24:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T11:29:51Z",
|
||||
"updated_at": "2021-03-12T01:24:39Z",
|
||||
"updated_at": "2021-05-04T16:16:12Z",
|
||||
"pushed_at": "2019-09-03T11:30:26Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T06:32:08Z",
|
||||
"updated_at": "2021-04-15T09:19:58Z",
|
||||
"updated_at": "2021-05-04T20:59:30Z",
|
||||
"pushed_at": "2019-11-12T03:58:00Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-04T11:10:38Z",
|
||||
"updated_at": "2021-05-04T16:18:15Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1014,
|
||||
"watchers_count": 1014,
|
||||
"stargazers_count": 1015,
|
||||
"watchers_count": 1015,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1014,
|
||||
"watchers": 1015,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2021-03-03T21:12:03Z",
|
||||
"updated_at": "2021-05-04T16:16:24Z",
|
||||
"pushed_at": "2020-05-05T23:34:04Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-04-27T12:47:04Z",
|
||||
"updated_at": "2021-05-04T16:08:08Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"stargazers_count": 363,
|
||||
"watchers_count": 363,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 362,
|
||||
"watchers": 363,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-05-04T15:16:14Z",
|
||||
"updated_at": "2021-05-04T18:53:09Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1272,
|
||||
"watchers_count": 1272,
|
||||
"stargazers_count": 1273,
|
||||
"watchers_count": 1273,
|
||||
"forks_count": 293,
|
||||
"forks": 293,
|
||||
"watchers": 1272,
|
||||
"watchers": 1273,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-04T11:10:38Z",
|
||||
"updated_at": "2021-05-04T16:18:15Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1014,
|
||||
"watchers_count": 1014,
|
||||
"stargazers_count": 1015,
|
||||
"watchers_count": 1015,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1014,
|
||||
"watchers": 1015,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 283057472,
|
||||
"id": 283097598,
|
||||
"name": "CVE-2020-3187",
|
||||
"full_name": "pry0cc\/CVE-2020-3187",
|
||||
"full_name": "CrackerCat\/CVE-2020-3187",
|
||||
"owner": {
|
||||
"login": "pry0cc",
|
||||
"id": 4334403,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4334403?v=4",
|
||||
"html_url": "https:\/\/github.com\/pry0cc"
|
||||
"login": "CrackerCat",
|
||||
"id": 17995064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
|
||||
"html_url": "https:\/\/github.com\/CrackerCat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pry0cc\/CVE-2020-3187",
|
||||
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2020-3187",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-28T00:59:06Z",
|
||||
"updated_at": "2021-04-14T06:44:30Z",
|
||||
"pushed_at": "2020-07-28T09:45:42Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"created_at": "2020-07-28T04:20:17Z",
|
||||
"updated_at": "2021-05-04T19:34:52Z",
|
||||
"pushed_at": "2020-07-28T01:13:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2021-03-31T12:52:29Z",
|
||||
"updated_at": "2021-05-04T18:05:56Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 198,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T00:41:06Z",
|
||||
"updated_at": "2021-04-28T21:17:53Z",
|
||||
"updated_at": "2021-05-04T18:36:15Z",
|
||||
"pushed_at": "2020-05-21T10:15:35Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-04-27T10:04:05Z",
|
||||
"updated_at": "2021-05-04T17:30:05Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 107,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:48:57Z",
|
||||
"updated_at": "2021-05-04T10:19:52Z",
|
||||
"pushed_at": "2021-05-03T18:50:56Z",
|
||||
"updated_at": "2021-05-04T15:32:21Z",
|
||||
"pushed_at": "2021-05-04T15:32:18Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 9,
|
||||
|
|
|
@ -611,13 +611,13 @@
|
|||
"description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T07:31:25Z",
|
||||
"updated_at": "2021-05-01T17:20:16Z",
|
||||
"updated_at": "2021-05-04T15:17:14Z",
|
||||
"pushed_at": "2021-05-01T17:20:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "PoC for exploiting RCE in Exchange CVEs: CVE-2021-28480, CVE-2021-28481, CVE-2021-28482 and CVE-2021-28483. Achieves Domain Admin on Exchange Servers running Windows Server 2003 up to Windows Server 2019.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:50:39Z",
|
||||
"updated_at": "2021-05-04T13:13:38Z",
|
||||
"pushed_at": "2021-04-23T15:55:24Z",
|
||||
"updated_at": "2021-05-04T16:48:39Z",
|
||||
"pushed_at": "2021-05-04T16:48:36Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 364317316,
|
||||
"name": "CVE-2021-30128",
|
||||
"full_name": "r0ckysec\/CVE-2021-30128",
|
||||
"owner": {
|
||||
"login": "r0ckysec",
|
||||
"id": 44518337,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44518337?v=4",
|
||||
"html_url": "https:\/\/github.com\/r0ckysec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r0ckysec\/CVE-2021-30128",
|
||||
"description": "CVE-2021-30128 Apache OFBiz 反序列化漏洞远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-04T16:21:55Z",
|
||||
"updated_at": "2021-05-04T16:27:02Z",
|
||||
"pushed_at": "2021-05-04T16:26:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Discource POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T22:50:27Z",
|
||||
"updated_at": "2021-04-30T21:20:55Z",
|
||||
"pushed_at": "2021-04-11T23:12:36Z",
|
||||
"updated_at": "2021-05-04T19:08:13Z",
|
||||
"pushed_at": "2021-05-04T19:08:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-05-03T10:42:10Z",
|
||||
"updated_at": "2021-05-04T19:53:12Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 385,
|
||||
"watchers": 386,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-05-04T07:44:53Z",
|
||||
"updated_at": "2021-05-04T17:47:05Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 159,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -904,6 +904,7 @@ Apache OFBiz has unsafe deserialization prior to 17.12.07 version
|
|||
</code>
|
||||
|
||||
- [LioTree/CVE-2021-30128-EXP](https://github.com/LioTree/CVE-2021-30128-EXP)
|
||||
- [r0ckysec/CVE-2021-30128](https://github.com/r0ckysec/CVE-2021-30128)
|
||||
|
||||
### CVE-2021-30146 (2021-04-06)
|
||||
|
||||
|
@ -1807,7 +1808,7 @@ A vulnerability in the web server for Cisco IP Phones could allow an unauthentic
|
|||
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.
|
||||
</code>
|
||||
|
||||
- [pry0cc/CVE-2020-3187](https://github.com/pry0cc/CVE-2020-3187)
|
||||
- [CrackerCat/CVE-2020-3187](https://github.com/CrackerCat/CVE-2020-3187)
|
||||
- [Ph4nt0m-b/CVE-2020-3187](https://github.com/Ph4nt0m-b/CVE-2020-3187)
|
||||
|
||||
### CVE-2020-3433 (2020-08-17)
|
||||
|
@ -9738,6 +9739,7 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
|
|||
- [fakedob/tvsz](https://github.com/fakedob/tvsz)
|
||||
- [vineetkia/Wordpress-DOS-Attack-CVE-2018-6389](https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389)
|
||||
- [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389)
|
||||
- [Elsfa7-110/CVE-2018-6389](https://github.com/Elsfa7-110/CVE-2018-6389)
|
||||
|
||||
### CVE-2018-6396 (2018-02-17)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue