mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/02/19 18:07:43
This commit is contained in:
parent
0280ecc707
commit
eb5f8c64de
35 changed files with 214 additions and 142 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-19T01:30:17Z",
|
||||
"updated_at": "2020-02-19T08:11:12Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 55,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2015-12-15T05:42:02Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-19T01:30:17Z",
|
||||
"updated_at": "2020-02-19T08:11:12Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 55,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "ImaegMagick Code Execution (CVE-2016-3714)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-07T08:21:27Z",
|
||||
"updated_at": "2019-10-22T03:04:58Z",
|
||||
"updated_at": "2020-02-19T08:01:38Z",
|
||||
"pushed_at": "2016-05-07T17:26:47Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2020-02-16T13:43:29Z",
|
||||
"updated_at": "2020-02-19T06:24:25Z",
|
||||
"pushed_at": "2017-09-27T02:35:13Z",
|
||||
"stargazers_count": 819,
|
||||
"watchers_count": 819,
|
||||
"stargazers_count": 820,
|
||||
"watchers_count": 820,
|
||||
"forks_count": 389,
|
||||
"forks": 389,
|
||||
"watchers": 819,
|
||||
"watchers": 820,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 611,
|
||||
"watchers_count": 611,
|
||||
"forks_count": 274,
|
||||
"forks": 274,
|
||||
"forks_count": 273,
|
||||
"forks": 273,
|
||||
"watchers": 611,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-02-17T04:23:18Z",
|
||||
"updated_at": "2020-02-19T07:39:33Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-19T01:30:17Z",
|
||||
"updated_at": "2020-02-19T08:11:12Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 55,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2018-09-10T16:25:12Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"forks_count": 124,
|
||||
"forks": 124,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"watchers": 302,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-25T16:09:21Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": " An exploit for Apache Struts CVE-2018-11776",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T01:53:30Z",
|
||||
"updated_at": "2020-01-02T11:11:49Z",
|
||||
"updated_at": "2020-02-19T03:58:36Z",
|
||||
"pushed_at": "2018-08-26T02:31:39Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 285,
|
||||
"watchers": 286,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 241542443,
|
||||
"name": "CVE-2018-12613-phpMyAdmin",
|
||||
"full_name": "eastmountyxz\/CVE-2018-12613-phpMyAdmin",
|
||||
"owner": {
|
||||
"login": "eastmountyxz",
|
||||
"id": 53172375,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
|
||||
"html_url": "https:\/\/github.com\/eastmountyxz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-12613-phpMyAdmin",
|
||||
"description": "这篇文章将分享一个phpMyAdmin 4.8.1版本的文件包含漏洞,从配置到原理,再到漏洞复现进行讲解,更重要的是让大家了解这些真实漏洞背后的知识。基础性文章,希望对您有所帮助!",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T05:41:11Z",
|
||||
"updated_at": "2020-02-19T05:41:15Z",
|
||||
"pushed_at": "2020-02-19T05:41:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-08-14T08:40:25Z",
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 194,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-19T03:05:17Z",
|
||||
"updated_at": "2020-02-19T08:11:12Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 56,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2020-02-16T08:46:36Z",
|
||||
"updated_at": "2020-02-19T03:58:46Z",
|
||||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"stargazers_count": 405,
|
||||
"watchers_count": 405,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 404,
|
||||
"watchers": 405,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-8021 Proof-Of-Concept and Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-02T19:01:17Z",
|
||||
"updated_at": "2020-02-18T23:22:45Z",
|
||||
"updated_at": "2020-02-19T05:50:18Z",
|
||||
"pushed_at": "2018-12-03T21:13:00Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1029,8 +1029,8 @@
|
|||
"pushed_at": "2019-05-30T02:43:06Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1374,8 +1374,8 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"forks_count": 161,
|
||||
"forks": 161,
|
||||
"forks_count": 162,
|
||||
"forks": 162,
|
||||
"watchers": 695,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1581,8 +1581,8 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1005,
|
||||
"watchers_count": 1005,
|
||||
"forks_count": 344,
|
||||
"forks": 344,
|
||||
"forks_count": 345,
|
||||
"forks": 345,
|
||||
"watchers": 1005,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2551,5 +2551,28 @@
|
|||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 241542314,
|
||||
"name": "CVE-2019-0708-Windows",
|
||||
"full_name": "eastmountyxz\/CVE-2019-0708-Windows",
|
||||
"owner": {
|
||||
"login": "eastmountyxz",
|
||||
"id": 53172375,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
|
||||
"html_url": "https:\/\/github.com\/eastmountyxz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2019-0708-Windows",
|
||||
"description": "这篇文章将分享Windows远程桌面服务漏洞(CVE-2019-0708),并详细讲解该漏洞及防御措施。作者作为网络安全的小白,分享一些自学基础教程给大家,主要是关于安全工具和实践操作的在线笔记,希望您们喜欢。同时,更希望您能与我一起操作和进步,后续将深入学习网络安全和系统安全知识并分享相关实验。总之,希望该系列文章对博友有所帮助,写文不易,大神们不喜勿喷,谢谢!",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T05:40:22Z",
|
||||
"updated_at": "2020-02-19T05:40:26Z",
|
||||
"pushed_at": "2020-02-19T05:40:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T15:33:50Z",
|
||||
"updated_at": "2020-02-14T23:14:23Z",
|
||||
"updated_at": "2020-02-19T03:56:24Z",
|
||||
"pushed_at": "2019-06-28T03:57:26Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 188,
|
||||
"watchers": 189,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-02-17T17:14:49Z",
|
||||
"updated_at": "2020-02-19T06:52:45Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1534,
|
||||
"watchers_count": 1534,
|
||||
"stargazers_count": 1535,
|
||||
"watchers_count": 1535,
|
||||
"forks_count": 213,
|
||||
"forks": 213,
|
||||
"watchers": 1534,
|
||||
"watchers": 1535,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-17T07:54:38Z",
|
||||
"updated_at": "2019-12-31T08:21:44Z",
|
||||
"updated_at": "2020-02-19T05:46:18Z",
|
||||
"pushed_at": "2019-07-18T10:03:28Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "sploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T00:44:25Z",
|
||||
"updated_at": "2020-02-10T07:39:59Z",
|
||||
"updated_at": "2020-02-19T05:26:55Z",
|
||||
"pushed_at": "2019-12-21T00:56:27Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 62,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -266,13 +266,13 @@
|
|||
"description": "Containerized and deployable use of the CVE-2019-14287 vuln. View README.md for more.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-09T21:05:20Z",
|
||||
"updated_at": "2020-02-09T21:28:12Z",
|
||||
"updated_at": "2020-02-19T07:14:32Z",
|
||||
"pushed_at": "2020-02-09T21:28:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T02:41:44Z",
|
||||
"updated_at": "2020-02-13T15:13:49Z",
|
||||
"pushed_at": "2020-02-07T17:58:39Z",
|
||||
"updated_at": "2020-02-19T03:47:35Z",
|
||||
"pushed_at": "2020-02-19T03:47:33Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-02-19T03:05:17Z",
|
||||
"updated_at": "2020-02-19T08:11:12Z",
|
||||
"pushed_at": "2020-02-15T14:24:04Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 56,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-02-17T04:23:18Z",
|
||||
"updated_at": "2020-02-19T07:39:33Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 241526956,
|
||||
"name": "CVE-2019-2729-Exploit",
|
||||
"full_name": "ruthlezs\/CVE-2019-2729-Exploit",
|
||||
"owner": {
|
||||
"login": "ruthlezs",
|
||||
"id": 15887791,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
|
||||
"html_url": "https:\/\/github.com\/ruthlezs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ruthlezs\/CVE-2019-2729-Exploit",
|
||||
"description": "CVE-2019-2729 Exploit Script",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T03:49:51Z",
|
||||
"updated_at": "2020-02-19T08:48:05Z",
|
||||
"pushed_at": "2020-02-19T08:48:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2020-02-15T02:00:56Z",
|
||||
"updated_at": "2020-02-19T08:13:33Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 498,
|
||||
"watchers_count": 498,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 498,
|
||||
"stargazers_count": 499,
|
||||
"watchers_count": 499,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 499,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-02T16:42:32Z",
|
||||
"updated_at": "2020-02-18T06:40:00Z",
|
||||
"updated_at": "2020-02-19T03:35:54Z",
|
||||
"pushed_at": "2020-02-03T15:11:25Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -243,13 +243,13 @@
|
|||
"description": "Proof of Concept for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T23:44:37Z",
|
||||
"updated_at": "2020-02-17T07:56:24Z",
|
||||
"updated_at": "2020-02-19T07:48:56Z",
|
||||
"pushed_at": "2020-01-17T16:32:39Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -496,8 +496,8 @@
|
|||
"description": "PoC for \"CurveBall\" CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-25T03:11:36Z",
|
||||
"updated_at": "2020-02-02T02:13:37Z",
|
||||
"pushed_at": "2020-02-02T02:06:06Z",
|
||||
"updated_at": "2020-02-19T04:00:05Z",
|
||||
"pushed_at": "2020-02-19T04:00:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -680,8 +680,8 @@
|
|||
"description": "CVE-2020-0601 proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-18T16:36:49Z",
|
||||
"updated_at": "2020-02-18T18:03:05Z",
|
||||
"pushed_at": "2020-02-18T16:37:19Z",
|
||||
"updated_at": "2020-02-19T08:46:38Z",
|
||||
"pushed_at": "2020-02-19T08:46:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-02-18T13:17:17Z",
|
||||
"updated_at": "2020-02-19T03:38:41Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SQL Server Reporting Services(CVE-2020-0618)中的RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-15T06:40:23Z",
|
||||
"updated_at": "2020-02-19T03:00:51Z",
|
||||
"updated_at": "2020-02-19T08:56:59Z",
|
||||
"pushed_at": "2020-02-15T06:41:54Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 59,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-0618 Honeypot",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-18T16:17:19Z",
|
||||
"updated_at": "2020-02-18T22:50:49Z",
|
||||
"updated_at": "2020-02-19T07:57:36Z",
|
||||
"pushed_at": "2020-02-18T22:50:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2020-02-19T01:11:13Z",
|
||||
"updated_at": "2020-02-19T08:04:06Z",
|
||||
"pushed_at": "2020-02-11T21:34:28Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 148,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept code for CVE-2020-0728",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-12T22:32:28Z",
|
||||
"updated_at": "2020-02-18T02:36:26Z",
|
||||
"updated_at": "2020-02-19T06:12:01Z",
|
||||
"pushed_at": "2020-02-12T22:50:22Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T13:57:14Z",
|
||||
"updated_at": "2020-02-18T11:53:49Z",
|
||||
"updated_at": "2020-02-19T08:45:17Z",
|
||||
"pushed_at": "2020-02-13T12:56:31Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 39,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -3100,6 +3100,7 @@
|
|||
### CVE-2018-12613
|
||||
- [0x00-0x00/CVE-2018-12613](https://github.com/0x00-0x00/CVE-2018-12613)
|
||||
- [ivanitlearning/CVE-2018-12613](https://github.com/ivanitlearning/CVE-2018-12613)
|
||||
- [eastmountyxz/CVE-2018-12613-phpMyAdmin](https://github.com/eastmountyxz/CVE-2018-12613-phpMyAdmin)
|
||||
|
||||
### CVE-2018-1270
|
||||
- [CaledoniaProject/CVE-2018-1270](https://github.com/CaledoniaProject/CVE-2018-1270)
|
||||
|
@ -4339,6 +4340,7 @@
|
|||
- [ulisesrc/-2-CVE-2019-0708](https://github.com/ulisesrc/-2-CVE-2019-0708)
|
||||
- [worawit/CVE-2019-0708](https://github.com/worawit/CVE-2019-0708)
|
||||
- [cbwang505/CVE-2019-0708-EXP-Windows](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows)
|
||||
- [eastmountyxz/CVE-2019-0708-Windows](https://github.com/eastmountyxz/CVE-2019-0708-Windows)
|
||||
|
||||
### CVE-2019-0709
|
||||
- [YHZX2013/CVE-2019-0709](https://github.com/YHZX2013/CVE-2019-0709)
|
||||
|
@ -5228,6 +5230,7 @@
|
|||
|
||||
### CVE-2019-2729
|
||||
- [waffl3ss/CVE-2019-2729](https://github.com/waffl3ss/CVE-2019-2729)
|
||||
- [ruthlezs/CVE-2019-2729-Exploit](https://github.com/ruthlezs/CVE-2019-2729-Exploit)
|
||||
|
||||
### CVE-2019-2888
|
||||
- [21superman/weblogic_cve-2019-2888](https://github.com/21superman/weblogic_cve-2019-2888)
|
||||
|
|
Loading…
Reference in a new issue