mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 02:24:09 +01:00
Auto Update 2020/04/10 00:08:14
This commit is contained in:
parent
6dcc745de7
commit
e25a0a072a
29 changed files with 143 additions and 138 deletions
2012
2014
2016
2017
2018
2019
CVE-2019-0708.jsonCVE-2019-11043.jsonCVE-2019-11580.jsonCVE-2019-1388.jsonCVE-2019-1458.jsonCVE-2019-16097.jsonCVE-2019-18426.jsonCVE-2019-2618.jsonCVE-2019-2725.jsonCVE-2019-5475.jsonCVE-2019-9787.json
2020
CVE-2020-0041.jsonCVE-2020-0601.jsonCVE-2020-0683.jsonCVE-2020-0796.jsonCVE-2020-10199.jsonCVE-2020-11650.jsonCVE-2020-1938.jsonCVE-2020-2551.json
README.md
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 245464308,
|
||||
"name": "CVE-2012-2688",
|
||||
"full_name": "hackerSMinh\/CVE-2012-2688",
|
||||
"full_name": "shelld3v\/CVE-2012-2688",
|
||||
"owner": {
|
||||
"login": "hackerSMinh",
|
||||
"login": "shelld3v",
|
||||
"id": 59408894,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/59408894?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackerSMinh"
|
||||
"html_url": "https:\/\/github.com\/shelld3v"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackerSMinh\/CVE-2012-2688",
|
||||
"html_url": "https:\/\/github.com\/shelld3v\/CVE-2012-2688",
|
||||
"description": "A CVE-2012-2688 shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:12:39Z",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-09T08:59:20Z",
|
||||
"updated_at": "2020-04-09T14:38:45Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-09T08:59:20Z",
|
||||
"updated_at": "2020-04-09T14:38:45Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-10-30T22:29:20Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-09T08:59:20Z",
|
||||
"updated_at": "2020-04-09T14:38:45Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept exploit for CVE-2017-8570",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T19:09:33Z",
|
||||
"updated_at": "2020-03-24T03:58:49Z",
|
||||
"updated_at": "2020-04-09T09:24:46Z",
|
||||
"pushed_at": "2018-01-09T19:23:43Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 171,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-25T16:09:21Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-09T08:59:20Z",
|
||||
"updated_at": "2020-04-09T14:38:45Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-04-08T10:04:52Z",
|
||||
"updated_at": "2020-04-09T14:39:11Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 225,
|
||||
"watchers": 227,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1140,13 +1140,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-04-03T04:01:02Z",
|
||||
"updated_at": "2020-04-09T14:54:16Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1095,
|
||||
"watchers_count": 1095,
|
||||
"stargazers_count": 1096,
|
||||
"watchers_count": 1096,
|
||||
"forks_count": 370,
|
||||
"forks": 370,
|
||||
"watchers": 1095,
|
||||
"watchers": 1096,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-04-09T02:41:18Z",
|
||||
"updated_at": "2020-04-09T13:44:27Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1555,
|
||||
"watchers_count": 1555,
|
||||
"stargazers_count": 1556,
|
||||
"watchers_count": 1556,
|
||||
"forks_count": 220,
|
||||
"forks": 220,
|
||||
"watchers": 1555,
|
||||
"watchers": 1556,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,14 +25,14 @@
|
|||
{
|
||||
"id": 245476096,
|
||||
"name": "CVE-2019-11580",
|
||||
"full_name": "hackerSMinh\/CVE-2019-11580",
|
||||
"full_name": "shelld3v\/CVE-2019-11580",
|
||||
"owner": {
|
||||
"login": "hackerSMinh",
|
||||
"login": "shelld3v",
|
||||
"id": 59408894,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/59408894?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackerSMinh"
|
||||
"html_url": "https:\/\/github.com\/shelld3v"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackerSMinh\/CVE-2019-11580",
|
||||
"html_url": "https:\/\/github.com\/shelld3v\/CVE-2019-11580",
|
||||
"description": "A CVE-2019-11580 shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T17:09:26Z",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2020-04-04T16:58:46Z",
|
||||
"updated_at": "2020-04-09T12:28:24Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2020-04-08T11:05:15Z",
|
||||
"updated_at": "2020-04-09T10:34:00Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 61,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-09-19T15:27:48Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-02-29T21:36:46Z",
|
||||
"updated_at": "2020-03-10T07:31:37Z",
|
||||
"updated_at": "2020-04-09T09:46:37Z",
|
||||
"pushed_at": "2020-03-05T12:29:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-09T08:59:20Z",
|
||||
"updated_at": "2020-04-09T14:38:45Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-09T08:57:42Z",
|
||||
"pushed_at": "2020-04-09T08:10:11Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 82,
|
||||
"updated_at": "2020-04-09T14:50:49Z",
|
||||
"pushed_at": "2020-04-09T10:06:05Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 129,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 140,
|
||||
"forks": 140,
|
||||
"forks_count": 141,
|
||||
"forks": 141,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-25T16:22:56Z",
|
||||
"updated_at": "2020-01-19T08:02:50Z",
|
||||
"updated_at": "2020-04-09T10:01:00Z",
|
||||
"pushed_at": "2019-09-25T16:33:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-15T03:59:44Z",
|
||||
"updated_at": "2019-07-09T11:39:30Z",
|
||||
"updated_at": "2020-04-09T12:10:47Z",
|
||||
"pushed_at": "2019-04-15T04:13:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2020-04-09T03:19:43Z",
|
||||
"updated_at": "2020-04-09T11:24:38Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 68,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-04-07T21:05:36Z",
|
||||
"updated_at": "2020-04-09T14:56:49Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 796,
|
||||
"watchers_count": 796,
|
||||
"stargazers_count": 797,
|
||||
"watchers_count": 797,
|
||||
"forks_count": 200,
|
||||
"forks": 200,
|
||||
"watchers": 796,
|
||||
"watchers": 797,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2020-04-09T02:14:56Z",
|
||||
"updated_at": "2020-04-09T11:44:31Z",
|
||||
"pushed_at": "2020-02-11T21:34:28Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 180,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -979,13 +979,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-04-09T06:23:10Z",
|
||||
"updated_at": "2020-04-09T14:57:01Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 789,
|
||||
"watchers_count": 789,
|
||||
"stargazers_count": 790,
|
||||
"watchers_count": 790,
|
||||
"forks_count": 214,
|
||||
"forks": 214,
|
||||
"watchers": 789,
|
||||
"watchers": 790,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1117,13 +1117,13 @@
|
|||
"description": "该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-02T12:12:03Z",
|
||||
"updated_at": "2020-04-09T07:28:30Z",
|
||||
"updated_at": "2020-04-09T13:42:33Z",
|
||||
"pushed_at": "2020-04-07T08:58:57Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1163,13 +1163,13 @@
|
|||
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T15:16:10Z",
|
||||
"updated_at": "2020-04-09T06:25:12Z",
|
||||
"updated_at": "2020-04-09T10:40:13Z",
|
||||
"pushed_at": "2020-04-06T15:22:01Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 37,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T13:23:12Z",
|
||||
"updated_at": "2020-04-09T08:22:15Z",
|
||||
"updated_at": "2020-04-09T14:25:22Z",
|
||||
"pushed_at": "2020-04-07T13:56:17Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -56,11 +56,11 @@
|
|||
"html_url": "https:\/\/github.com\/magicming200"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/magicming200\/CVE-2020-10199_CVE-2020-10204",
|
||||
"description": "CVE-2020-10199漏洞一键检测工具,图形化界面。CVE-2020-10199 Nexus RCE Vul POC Tool with GUI.",
|
||||
"description": "CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-08T11:08:35Z",
|
||||
"updated_at": "2020-04-09T05:50:41Z",
|
||||
"pushed_at": "2020-04-09T01:55:37Z",
|
||||
"updated_at": "2020-04-09T10:12:53Z",
|
||||
"pushed_at": "2020-04-09T10:08:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-09T06:21:35Z",
|
||||
"updated_at": "2020-04-09T06:23:51Z",
|
||||
"updated_at": "2020-04-09T09:38:46Z",
|
||||
"pushed_at": "2020-04-09T06:23:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2020-04-08T04:04:43Z",
|
||||
"updated_at": "2020-04-09T09:42:49Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,均为亲测可用的脚本文件,优先更新高危且易利用的漏洞利用脚本,最近添加CVE-2020-1938、CVE-2020-2551、CVE-2019-2618、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-04-09T08:57:42Z",
|
||||
"pushed_at": "2020-04-09T08:10:11Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 82,
|
||||
"updated_at": "2020-04-09T14:50:49Z",
|
||||
"pushed_at": "2020-04-09T10:06:05Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 129,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-04-09T08:59:20Z",
|
||||
"updated_at": "2020-04-09T14:38:45Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -56,10 +56,10 @@
|
|||
"html_url": "https:\/\/github.com\/hktalent"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hktalent\/CVE-2020-2551",
|
||||
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-04-08T05:37:28Z",
|
||||
"updated_at": "2020-04-09T09:24:40Z",
|
||||
"pushed_at": "2020-04-07T02:57:46Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-04-08T10:22:40Z",
|
||||
"updated_at": "2020-04-09T10:48:34Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -267,6 +267,11 @@ An issue was discovered in Joomla! before 3.9.16. The lack of type casting of a
|
|||
- [HoangKien1020/CVE-2020-10243](https://github.com/HoangKien1020/CVE-2020-10243)
|
||||
|
||||
### CVE-2020-10551
|
||||
|
||||
<code>
|
||||
QQBrowser before 10.5.3870.400 installs a Windows service TsService.exe. This file is writable by anyone belonging to the NT AUTHORITY\Authenticated Users group, which includes all local and remote users. This can be abused by local attackers to escalate privileges to NT AUTHORITY\SYSTEM by writing a malicious executable to the location of TsService.
|
||||
</code>
|
||||
|
||||
- [seqred-s-a/CVE-2020-10551](https://github.com/seqred-s-a/CVE-2020-10551)
|
||||
|
||||
### CVE-2020-10558
|
||||
|
@ -1324,7 +1329,7 @@ Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin inco
|
|||
</code>
|
||||
|
||||
- [jas502n/CVE-2019-11580](https://github.com/jas502n/CVE-2019-11580)
|
||||
- [hackerSMinh/CVE-2019-11580](https://github.com/hackerSMinh/CVE-2019-11580)
|
||||
- [shelld3v/CVE-2019-11580](https://github.com/shelld3v/CVE-2019-11580)
|
||||
|
||||
### CVE-2019-11581
|
||||
|
||||
|
@ -11946,7 +11951,7 @@ sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6
|
|||
Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow."
|
||||
</code>
|
||||
|
||||
- [hackerSMinh/CVE-2012-2688](https://github.com/hackerSMinh/CVE-2012-2688)
|
||||
- [shelld3v/CVE-2012-2688](https://github.com/shelld3v/CVE-2012-2688)
|
||||
|
||||
### CVE-2012-3137
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue