mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2020/09/23 12:08:45
This commit is contained in:
parent
4c5ff01557
commit
e71a6b606e
27 changed files with 321 additions and 89 deletions
25
2006/CVE-2006-0450.json
Normal file
25
2006/CVE-2006-0450.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 289235311,
|
||||
"name": "CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities",
|
||||
"full_name": "Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities",
|
||||
"owner": {
|
||||
"login": "Parcer0",
|
||||
"id": 70012338,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/70012338?v=4",
|
||||
"html_url": "https:\/\/github.com\/Parcer0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities",
|
||||
"description": "CVE-2006-0450. phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-21T09:50:57Z",
|
||||
"updated_at": "2020-08-28T14:58:56Z",
|
||||
"pushed_at": "2020-08-28T14:58:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2006/CVE-2006-1236.json
Normal file
25
2006/CVE-2006-1236.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 168247796,
|
||||
"name": "CVE-2006-1236",
|
||||
"full_name": "Axua\/CVE-2006-1236",
|
||||
"owner": {
|
||||
"login": "Axua",
|
||||
"id": 28788087,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
|
||||
"html_url": "https:\/\/github.com\/Axua"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236",
|
||||
"description": "Exploit script for Crossfire 1.9.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-29T23:46:59Z",
|
||||
"updated_at": "2019-01-29T23:50:30Z",
|
||||
"pushed_at": "2019-01-29T23:50:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2006/CVE-2006-3392.json
Normal file
48
2006/CVE-2006-3392.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 276101400,
|
||||
"name": "CVE-2006-3392",
|
||||
"full_name": "Ziani52\/CVE-2006-3392",
|
||||
"owner": {
|
||||
"login": "Ziani52",
|
||||
"id": 53442065,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53442065?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ziani52"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ziani52\/CVE-2006-3392",
|
||||
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-30T13:07:31Z",
|
||||
"updated_at": "2020-08-05T16:17:06Z",
|
||||
"pushed_at": "2020-06-30T22:21:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 293079568,
|
||||
"name": "cve-2006-3392",
|
||||
"full_name": "notclement\/cve-2006-3392",
|
||||
"owner": {
|
||||
"login": "notclement",
|
||||
"id": 19283318,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19283318?v=4",
|
||||
"html_url": "https:\/\/github.com\/notclement"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/notclement\/cve-2006-3392",
|
||||
"description": "Read arbitrary files for servers running Webmin before 1.290 and Usermin before 1.220.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-05T13:17:44Z",
|
||||
"updated_at": "2020-09-05T13:22:15Z",
|
||||
"pushed_at": "2020-09-05T13:22:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2006/CVE-2006-6184.json
Normal file
48
2006/CVE-2006-6184.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 63907042,
|
||||
"name": "cve-2006-6184",
|
||||
"full_name": "shauntdergrigorian\/cve-2006-6184",
|
||||
"owner": {
|
||||
"login": "shauntdergrigorian",
|
||||
"id": 7718028,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7718028?v=4",
|
||||
"html_url": "https:\/\/github.com\/shauntdergrigorian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
|
||||
"description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-21T22:43:43Z",
|
||||
"updated_at": "2020-09-12T20:22:08Z",
|
||||
"pushed_at": "2020-09-08T22:13:47Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 205628184,
|
||||
"name": "CVE-2006-6184",
|
||||
"full_name": "b03902043\/CVE-2006-6184",
|
||||
"owner": {
|
||||
"login": "b03902043",
|
||||
"id": 9023845,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9023845?v=4",
|
||||
"html_url": "https:\/\/github.com\/b03902043"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184",
|
||||
"description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-01T04:18:53Z",
|
||||
"updated_at": "2019-09-01T04:23:25Z",
|
||||
"pushed_at": "2019-09-01T04:23:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-05-03T07:41:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Spring Data Commons RCE 远程命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-29T03:43:15Z",
|
||||
"updated_at": "2020-09-17T09:32:43Z",
|
||||
"updated_at": "2020-09-23T02:08:56Z",
|
||||
"pushed_at": "2019-04-29T04:25:35Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"forks_count": 345,
|
||||
"forks": 345,
|
||||
"forks_count": 346,
|
||||
"forks": 346,
|
||||
"watchers": 385,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exp of CVE-2018-15982",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-10T04:53:31Z",
|
||||
"updated_at": "2020-09-11T14:55:29Z",
|
||||
"updated_at": "2020-09-23T00:49:51Z",
|
||||
"pushed_at": "2019-01-04T09:29:01Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 174,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-09-22T04:48:10Z",
|
||||
"updated_at": "2020-09-23T02:27:42Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 308,
|
||||
"watchers": 309,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The SSC REST API contains Insecure Direct Object Reference (IDOR) vulnerabilities in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-26T13:54:08Z",
|
||||
"updated_at": "2018-12-15T11:18:55Z",
|
||||
"updated_at": "2020-09-22T21:17:40Z",
|
||||
"pushed_at": "2018-12-15T11:18:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1094,13 +1094,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-09-22T01:54:44Z",
|
||||
"updated_at": "2020-09-23T01:07:43Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1116,
|
||||
"watchers_count": 1116,
|
||||
"stargazers_count": 1115,
|
||||
"watchers_count": 1115,
|
||||
"forks_count": 379,
|
||||
"forks": 379,
|
||||
"watchers": 1116,
|
||||
"watchers": 1115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1577,13 +1577,13 @@
|
|||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2020-09-17T15:50:38Z",
|
||||
"updated_at": "2020-09-23T01:05:32Z",
|
||||
"pushed_at": "2020-05-09T09:49:14Z",
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 334,
|
||||
"watchers": 335,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T13:45:44Z",
|
||||
"updated_at": "2020-09-22T01:28:11Z",
|
||||
"updated_at": "2020-09-23T00:03:11Z",
|
||||
"pushed_at": "2019-12-13T19:07:53Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 70,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-22T13:15:29Z",
|
||||
"updated_at": "2020-09-23T01:01:28Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1881,
|
||||
"watchers_count": 1881,
|
||||
"stargazers_count": 1882,
|
||||
"watchers_count": 1882,
|
||||
"forks_count": 483,
|
||||
"forks": 483,
|
||||
"watchers": 1881,
|
||||
"watchers": 1882,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "CVE-2019-2729 Exploit Script",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T03:49:51Z",
|
||||
"updated_at": "2020-09-22T11:29:02Z",
|
||||
"updated_at": "2020-09-23T01:49:27Z",
|
||||
"pushed_at": "2020-02-19T08:48:02Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-01-19T10:49:21Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1094,13 +1094,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-09-21T10:04:50Z",
|
||||
"updated_at": "2020-09-22T23:50:36Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 318,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T08:01:37Z",
|
||||
"updated_at": "2020-09-04T14:43:05Z",
|
||||
"updated_at": "2020-09-23T02:18:07Z",
|
||||
"pushed_at": "2020-05-04T08:11:21Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T15:52:43Z",
|
||||
"updated_at": "2020-09-09T14:06:59Z",
|
||||
"updated_at": "2020-09-22T23:50:21Z",
|
||||
"pushed_at": "2020-06-09T20:41:32Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 119,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2020-13162",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-02T17:58:32Z",
|
||||
"updated_at": "2020-09-15T14:51:56Z",
|
||||
"updated_at": "2020-09-22T21:14:36Z",
|
||||
"pushed_at": "2020-09-02T19:14:21Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 297823317,
|
||||
"name": "cve-2020-13933",
|
||||
"full_name": "Kamimuka\/cve-2020-13933",
|
||||
"owner": {
|
||||
"login": "Kamimuka",
|
||||
"id": 19571618,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19571618?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kamimuka"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kamimuka\/cve-2020-13933",
|
||||
"description": "cve-2020-13933 apache shiro权限绕过漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T01:55:46Z",
|
||||
"updated_at": "2020-09-23T02:00:15Z",
|
||||
"pushed_at": "2020-09-23T02:00:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T21:25:18Z",
|
||||
"updated_at": "2020-09-22T12:35:05Z",
|
||||
"updated_at": "2020-09-23T00:10:46Z",
|
||||
"pushed_at": "2020-09-18T00:01:00Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-22T15:45:47Z",
|
||||
"updated_at": "2020-09-23T01:44:51Z",
|
||||
"pushed_at": "2020-09-17T08:18:25Z",
|
||||
"stargazers_count": 1019,
|
||||
"watchers_count": 1019,
|
||||
"forks_count": 197,
|
||||
"forks": 197,
|
||||
"watchers": 1019,
|
||||
"stargazers_count": 1021,
|
||||
"watchers_count": 1021,
|
||||
"forks_count": 200,
|
||||
"forks": 200,
|
||||
"watchers": 1021,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-09-22T19:05:58Z",
|
||||
"updated_at": "2020-09-23T01:18:45Z",
|
||||
"pushed_at": "2020-09-15T15:50:03Z",
|
||||
"stargazers_count": 552,
|
||||
"watchers_count": 552,
|
||||
"stargazers_count": 554,
|
||||
"watchers_count": 554,
|
||||
"forks_count": 149,
|
||||
"forks": 149,
|
||||
"watchers": 552,
|
||||
"watchers": 554,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:27:14Z",
|
||||
"updated_at": "2020-09-22T09:01:51Z",
|
||||
"updated_at": "2020-09-23T01:54:05Z",
|
||||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 91,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -519,13 +519,13 @@
|
|||
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T16:53:17Z",
|
||||
"updated_at": "2020-09-22T15:09:12Z",
|
||||
"updated_at": "2020-09-22T21:33:33Z",
|
||||
"pushed_at": "2020-09-19T09:46:30Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "几条关于CVE-2020-15148(yii2反序列化)的绕过",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-21T03:55:55Z",
|
||||
"updated_at": "2020-09-22T17:32:57Z",
|
||||
"updated_at": "2020-09-23T02:41:34Z",
|
||||
"pushed_at": "2020-09-21T04:04:39Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 37,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-17382.json
Normal file
25
2020/CVE-2020-17382.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 297681106,
|
||||
"name": "CVE-2020-17382",
|
||||
"full_name": "fdiskyou\/CVE-2020-17382",
|
||||
"owner": {
|
||||
"login": "fdiskyou",
|
||||
"id": 6840612,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6840612?v=4",
|
||||
"html_url": "https:\/\/github.com\/fdiskyou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fdiskyou\/CVE-2020-17382",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-22T14:50:14Z",
|
||||
"updated_at": "2020-09-22T23:30:19Z",
|
||||
"pushed_at": "2020-09-22T14:52:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-09-21T19:23:19Z",
|
||||
"updated_at": "2020-09-23T02:09:24Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 196,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-09-22T13:15:29Z",
|
||||
"updated_at": "2020-09-23T01:01:28Z",
|
||||
"pushed_at": "2020-08-03T04:37:30Z",
|
||||
"stargazers_count": 1881,
|
||||
"watchers_count": 1881,
|
||||
"stargazers_count": 1882,
|
||||
"watchers_count": 1882,
|
||||
"forks_count": 483,
|
||||
"forks": 483,
|
||||
"watchers": 1881,
|
||||
"watchers": 1882,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
38
README.md
38
README.md
|
@ -1969,6 +1969,7 @@ Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP req
|
|||
</code>
|
||||
|
||||
- [lyy289065406/CVE-2020-13933](https://github.com/lyy289065406/CVE-2020-13933)
|
||||
- [Kamimuka/cve-2020-13933](https://github.com/Kamimuka/cve-2020-13933)
|
||||
|
||||
### CVE-2020-13996
|
||||
|
||||
|
@ -2152,6 +2153,9 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
|
|||
### CVE-2020-16152
|
||||
- [eriknl/CVE-2020-16152](https://github.com/eriknl/CVE-2020-16152)
|
||||
|
||||
### CVE-2020-17382
|
||||
- [fdiskyou/CVE-2020-17382](https://github.com/fdiskyou/CVE-2020-17382)
|
||||
|
||||
### CVE-2020-17496
|
||||
|
||||
<code>
|
||||
|
@ -15091,6 +15095,31 @@ March Networks DVR 3204 stores sensitive information under the web root with ins
|
|||
|
||||
|
||||
## 2006
|
||||
### CVE-2006-0450
|
||||
|
||||
<code>
|
||||
phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.
|
||||
</code>
|
||||
|
||||
- [Parcer0/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities](https://github.com/Parcer0/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities)
|
||||
|
||||
### CVE-2006-1236
|
||||
|
||||
<code>
|
||||
Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 allows remote attackers to execute arbitrary code via a long setup sound command, a different vulnerability than CVE-2006-1010.
|
||||
</code>
|
||||
|
||||
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
|
||||
|
||||
### CVE-2006-3392
|
||||
|
||||
<code>
|
||||
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
|
||||
</code>
|
||||
|
||||
- [Ziani52/CVE-2006-3392](https://github.com/Ziani52/CVE-2006-3392)
|
||||
- [notclement/cve-2006-3392](https://github.com/notclement/cve-2006-3392)
|
||||
|
||||
### CVE-2006-3592
|
||||
|
||||
<code>
|
||||
|
@ -15123,6 +15152,15 @@ The mincore function in the Linux kernel before 2.4.33.6 does not properly lock
|
|||
|
||||
- [tagatac/linux-CVE-2006-4814](https://github.com/tagatac/linux-CVE-2006-4814)
|
||||
|
||||
### CVE-2006-6184
|
||||
|
||||
<code>
|
||||
Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
|
||||
</code>
|
||||
|
||||
- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184)
|
||||
- [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184)
|
||||
|
||||
|
||||
## 2005
|
||||
### CVE-2005-0603
|
||||
|
|
Loading…
Add table
Reference in a new issue