mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/05/11 18:11:30
This commit is contained in:
parent
ba555d10fd
commit
ee63a7c351
57 changed files with 218 additions and 323 deletions
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 79179589,
|
||||
"name": "ms09050",
|
||||
"full_name": "mazding\/ms09050",
|
||||
"full_name": "sooklalad\/ms09050",
|
||||
"owner": {
|
||||
"login": "mazding",
|
||||
"login": "sooklalad",
|
||||
"id": 16028654,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16028654?v=4",
|
||||
"html_url": "https:\/\/github.com\/mazding"
|
||||
"html_url": "https:\/\/github.com\/sooklalad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mazding\/ms09050",
|
||||
"html_url": "https:\/\/github.com\/sooklalad\/ms09050",
|
||||
"description": "cve-2009-3103",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-17T02:24:40Z",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-10T16:23:45Z",
|
||||
"updated_at": "2021-05-11T08:58:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1022,
|
||||
"watchers_count": 1022,
|
||||
"stargazers_count": 1024,
|
||||
"watchers_count": 1024,
|
||||
"forks_count": 231,
|
||||
"forks": 231,
|
||||
"watchers": 1022,
|
||||
"watchers": 1024,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-10T16:23:45Z",
|
||||
"updated_at": "2021-05-11T08:58:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1022,
|
||||
"watchers_count": 1022,
|
||||
"stargazers_count": 1024,
|
||||
"watchers_count": 1024,
|
||||
"forks_count": 231,
|
||||
"forks": 231,
|
||||
"watchers": 1022,
|
||||
"watchers": 1024,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -611,7 +611,7 @@
|
|||
"description": "CVE-2017-10271",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-18T02:31:18Z",
|
||||
"updated_at": "2020-11-18T02:31:51Z",
|
||||
"updated_at": "2021-05-11T07:36:14Z",
|
||||
"pushed_at": "2020-11-18T02:31:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -1,73 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 80148945,
|
||||
"name": "extra_recipe",
|
||||
"full_name": "maximehip\/extra_recipe",
|
||||
"owner": {
|
||||
"login": "maximehip",
|
||||
"id": 6273425,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6273425?v=4",
|
||||
"html_url": "https:\/\/github.com\/maximehip"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maximehip\/extra_recipe",
|
||||
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-26T19:47:43Z",
|
||||
"updated_at": "2017-01-26T19:48:19Z",
|
||||
"pushed_at": "2017-01-26T19:48:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 80717942,
|
||||
"name": "extra_recipe",
|
||||
"full_name": "JackBro\/extra_recipe",
|
||||
"owner": {
|
||||
"login": "JackBro",
|
||||
"id": 21210712,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4",
|
||||
"html_url": "https:\/\/github.com\/JackBro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
|
||||
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-02T11:16:38Z",
|
||||
"updated_at": "2017-10-14T08:34:32Z",
|
||||
"pushed_at": "2017-01-27T17:44:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 81874110,
|
||||
"name": "extra_recipe-iOS-10.2",
|
||||
"full_name": "Rootkitsmm-zz\/extra_recipe-iOS-10.2",
|
||||
"owner": {
|
||||
"login": "Rootkitsmm-zz",
|
||||
"id": 5567904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5567904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm-zz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm-zz\/extra_recipe-iOS-10.2",
|
||||
"description": "CVE-2017-2370",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-13T21:32:40Z",
|
||||
"updated_at": "2019-01-03T05:45:15Z",
|
||||
"pushed_at": "2017-02-01T11:36:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 142854846,
|
||||
"name": "CVE-2017-2370",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-10T16:23:45Z",
|
||||
"updated_at": "2021-05-11T08:58:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1022,
|
||||
"watchers_count": 1022,
|
||||
"stargazers_count": 1024,
|
||||
"watchers_count": 1024,
|
||||
"forks_count": 231,
|
||||
"forks": 231,
|
||||
"watchers": 1022,
|
||||
"watchers": 1024,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,7 +36,7 @@
|
|||
"description": "CVE-2017-3506",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-18T01:50:47Z",
|
||||
"updated_at": "2021-03-27T20:09:54Z",
|
||||
"updated_at": "2021-05-11T07:36:55Z",
|
||||
"pushed_at": "2020-11-18T01:52:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 79682713,
|
||||
"name": "CVE-2017-3730",
|
||||
"full_name": "guidovranken\/CVE-2017-3730",
|
||||
"owner": {
|
||||
"login": "guidovranken",
|
||||
"id": 6846644,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6846644?v=4",
|
||||
"html_url": "https:\/\/github.com\/guidovranken"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
|
||||
"description": "OpenSSL CVE-2017-3730 proof-of-concept",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-22T00:40:34Z",
|
||||
"updated_at": "2018-12-04T20:01:55Z",
|
||||
"pushed_at": "2017-01-26T01:30:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 84158718,
|
||||
"name": "S2-045",
|
||||
"full_name": "PolarisLab\/S2-045",
|
||||
"owner": {
|
||||
"login": "PolarisLab",
|
||||
"id": 25890110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
|
||||
"html_url": "https:\/\/github.com\/PolarisLab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
|
||||
"description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-07T05:30:30Z",
|
||||
"updated_at": "2020-09-22T06:33:06Z",
|
||||
"pushed_at": "2017-03-07T05:37:55Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84186490,
|
||||
"name": "Struts2-045-Exp",
|
||||
|
@ -45,29 +22,6 @@
|
|||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84277596,
|
||||
"name": "cve-2017-5638",
|
||||
"full_name": "bongbongco\/cve-2017-5638",
|
||||
"owner": {
|
||||
"login": "bongbongco",
|
||||
"id": 3170006,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4",
|
||||
"html_url": "https:\/\/github.com\/bongbongco"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-08T04:17:33Z",
|
||||
"updated_at": "2017-03-08T04:31:28Z",
|
||||
"pushed_at": "2017-03-08T04:31:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84481525,
|
||||
"name": "S2-045-EXP-POC-TOOLS",
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-10T16:23:45Z",
|
||||
"updated_at": "2021-05-11T08:58:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1022,
|
||||
"watchers_count": 1022,
|
||||
"stargazers_count": 1024,
|
||||
"watchers_count": 1024,
|
||||
"forks_count": 231,
|
||||
"forks": 231,
|
||||
"watchers": 1022,
|
||||
"watchers": 1024,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,7 +82,7 @@
|
|||
"description": "S2-059(CVE-2019-0230)",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-11T03:40:04Z",
|
||||
"updated_at": "2020-12-17T08:18:30Z",
|
||||
"updated_at": "2021-05-11T07:34:58Z",
|
||||
"pushed_at": "2020-12-11T04:28:10Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2019-12814:Jackson JDOM XSLTransformer Gadget",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T04:33:55Z",
|
||||
"updated_at": "2020-06-03T03:48:54Z",
|
||||
"updated_at": "2021-05-11T07:30:27Z",
|
||||
"pushed_at": "2021-01-21T01:14:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 3,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 280048798,
|
||||
"name": "CVE-2019-17571",
|
||||
"full_name": "Al1ex\/CVE-2019-17571",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2019-17571",
|
||||
"description": "Environment for CVE_2019_17571",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-16T04:01:40Z",
|
||||
"updated_at": "2021-05-11T07:38:51Z",
|
||||
"pushed_at": "2020-10-13T23:36:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2021-03-06T21:28:58Z",
|
||||
"updated_at": "2021-05-11T08:06:29Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 138,
|
||||
"watchers": 139,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2021-04-22T07:54:16Z",
|
||||
"updated_at": "2021-05-11T03:33:29Z",
|
||||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 357,
|
||||
"watchers_count": 357,
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"watchers": 357,
|
||||
"watchers": 358,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2021-05-09T13:17:53Z",
|
||||
"updated_at": "2021-05-11T08:09:33Z",
|
||||
"pushed_at": "2021-01-24T20:18:04Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 118,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2021-05-07T06:35:42Z",
|
||||
"updated_at": "2021-05-11T06:57:19Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 759,
|
||||
"watchers_count": 759,
|
||||
"stargazers_count": 760,
|
||||
"watchers_count": 760,
|
||||
"forks_count": 160,
|
||||
"forks": 160,
|
||||
"watchers": 759,
|
||||
"watchers": 760,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-10T16:23:45Z",
|
||||
"updated_at": "2021-05-11T08:58:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1022,
|
||||
"watchers_count": 1022,
|
||||
"stargazers_count": 1024,
|
||||
"watchers_count": 1024,
|
||||
"forks_count": 231,
|
||||
"forks": 231,
|
||||
"watchers": 1022,
|
||||
"watchers": 1024,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-11-06T07:26:43Z",
|
||||
"updated_at": "2019-11-06T07:27:36Z",
|
||||
"pushed_at": "2021-05-10T18:40:32Z",
|
||||
"pushed_at": "2021-05-11T07:06:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-05-08T18:53:06Z",
|
||||
"updated_at": "2021-05-11T07:53:35Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 563,
|
||||
"watchers_count": 563,
|
||||
"stargazers_count": 564,
|
||||
"watchers_count": 564,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 563,
|
||||
"watchers": 564,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -358,13 +358,13 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2021-04-24T12:01:28Z",
|
||||
"updated_at": "2021-05-11T07:06:07Z",
|
||||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"watchers": 268,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1117,13 +1117,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2021-05-05T14:47:37Z",
|
||||
"updated_at": "2021-05-11T07:27:52Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 382,
|
||||
"watchers_count": 382,
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 382,
|
||||
"watchers": 383,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "CVE-2020-10673:jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T14:56:30Z",
|
||||
"updated_at": "2020-06-03T03:48:47Z",
|
||||
"updated_at": "2021-05-11T07:30:47Z",
|
||||
"pushed_at": "2021-01-21T01:14:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T15:40:03Z",
|
||||
"updated_at": "2021-05-03T22:23:07Z",
|
||||
"updated_at": "2021-05-11T09:13:10Z",
|
||||
"pushed_at": "2021-04-23T19:21:16Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 37,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2020-11113:Jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-21T14:00:33Z",
|
||||
"updated_at": "2020-05-21T14:01:23Z",
|
||||
"updated_at": "2021-05-11T07:39:13Z",
|
||||
"pushed_at": "2020-10-13T22:10:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "Apache Kylin API Unauthorized Access",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T06:53:34Z",
|
||||
"updated_at": "2021-02-05T15:36:58Z",
|
||||
"updated_at": "2021-05-11T07:27:46Z",
|
||||
"pushed_at": "2021-01-22T07:00:37Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "This is a simple test for FasterXML jackson-databind",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-26T15:11:03Z",
|
||||
"updated_at": "2020-09-16T15:17:13Z",
|
||||
"updated_at": "2021-05-11T07:30:05Z",
|
||||
"pushed_at": "2021-01-21T01:18:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:52:37Z",
|
||||
"updated_at": "2021-04-08T01:07:35Z",
|
||||
"updated_at": "2021-05-11T07:26:43Z",
|
||||
"pushed_at": "2020-09-14T16:53:07Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 31,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-05-11T02:40:33Z",
|
||||
"updated_at": "2021-05-11T07:46:55Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 788,
|
||||
"watchers_count": 788,
|
||||
"stargazers_count": 789,
|
||||
"watchers_count": 789,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 788,
|
||||
"watchers": 789,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -460,26 +460,26 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 325240057,
|
||||
"id": 325429279,
|
||||
"name": "CodeTest",
|
||||
"full_name": "xkx518\/CodeTest",
|
||||
"full_name": "adm1in\/CodeTest",
|
||||
"owner": {
|
||||
"login": "xkx518",
|
||||
"id": 49984697,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49984697?v=4",
|
||||
"html_url": "https:\/\/github.com\/xkx518"
|
||||
"login": "adm1in",
|
||||
"id": 37677854,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37677854?v=4",
|
||||
"html_url": "https:\/\/github.com\/adm1in"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xkx518\/CodeTest",
|
||||
"html_url": "https:\/\/github.com\/adm1in\/CodeTest",
|
||||
"description": "CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-29T09:11:31Z",
|
||||
"updated_at": "2021-03-18T23:43:08Z",
|
||||
"pushed_at": "2021-01-25T07:54:23Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"created_at": "2020-12-30T01:55:52Z",
|
||||
"updated_at": "2021-05-11T04:04:34Z",
|
||||
"pushed_at": "2020-12-29T10:47:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-10T14:05:09Z",
|
||||
"updated_at": "2021-05-11T08:27:25Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 740,
|
||||
"watchers_count": 740,
|
||||
"stargazers_count": 743,
|
||||
"watchers_count": 743,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"watchers": 740,
|
||||
"watchers": 743,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2020-17456 & Seowon SLC 130 Router RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T06:16:40Z",
|
||||
"updated_at": "2021-01-21T06:48:06Z",
|
||||
"updated_at": "2021-05-11T07:29:23Z",
|
||||
"pushed_at": "2021-01-21T06:17:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -59,7 +59,7 @@
|
|||
"description": "S2-061 CVE-2020-17530",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-13T11:02:15Z",
|
||||
"updated_at": "2021-02-01T05:08:55Z",
|
||||
"updated_at": "2021-05-11T07:34:31Z",
|
||||
"pushed_at": "2020-12-22T15:27:51Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-10T16:23:45Z",
|
||||
"updated_at": "2021-05-11T08:58:22Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1022,
|
||||
"watchers_count": 1022,
|
||||
"stargazers_count": 1024,
|
||||
"watchers_count": 1024,
|
||||
"forks_count": 231,
|
||||
"forks": 231,
|
||||
"watchers": 1022,
|
||||
"watchers": 1024,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "CVE-2020-26217 && XStream RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T09:56:11Z",
|
||||
"updated_at": "2021-01-22T09:56:32Z",
|
||||
"updated_at": "2021-05-11T07:26:20Z",
|
||||
"pushed_at": "2021-01-22T09:56:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2020-26258 && XStream SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T08:44:24Z",
|
||||
"updated_at": "2021-01-22T08:45:00Z",
|
||||
"updated_at": "2021-05-11T07:27:11Z",
|
||||
"pushed_at": "2021-01-22T08:44:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "CVE-2020-26259 &&XStream Arbitrary File Delete",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T09:23:28Z",
|
||||
"updated_at": "2021-01-22T09:23:56Z",
|
||||
"updated_at": "2021-05-11T07:26:46Z",
|
||||
"pushed_at": "2021-01-22T09:23:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T09:11:29Z",
|
||||
"updated_at": "2021-05-11T01:46:43Z",
|
||||
"updated_at": "2021-05-11T04:22:01Z",
|
||||
"pushed_at": "2021-04-29T07:14:33Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 52,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,7 +128,7 @@
|
|||
"description": "CVE-2020-2883",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-26T14:10:25Z",
|
||||
"updated_at": "2021-03-19T02:25:20Z",
|
||||
"updated_at": "2021-05-11T07:13:57Z",
|
||||
"pushed_at": "2020-11-27T02:12:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2020-35713",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T06:39:58Z",
|
||||
"updated_at": "2021-01-21T10:20:49Z",
|
||||
"updated_at": "2021-05-11T07:29:00Z",
|
||||
"pushed_at": "2021-01-21T06:40:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": " CVE-2020-35728 & Jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T01:55:39Z",
|
||||
"updated_at": "2021-05-06T06:26:34Z",
|
||||
"updated_at": "2021-05-11T07:32:04Z",
|
||||
"pushed_at": "2020-12-31T01:56:18Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2020-35729",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T07:59:43Z",
|
||||
"updated_at": "2021-04-09T09:37:11Z",
|
||||
"updated_at": "2021-05-11T07:21:25Z",
|
||||
"pushed_at": "2021-04-09T08:00:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-10T06:47:49Z",
|
||||
"updated_at": "2021-04-28T12:30:47Z",
|
||||
"updated_at": "2021-05-11T07:31:38Z",
|
||||
"pushed_at": "2021-01-10T06:48:53Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2020-36188 &&Jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T06:29:38Z",
|
||||
"updated_at": "2021-01-12T11:01:10Z",
|
||||
"updated_at": "2021-05-11T07:31:11Z",
|
||||
"pushed_at": "2021-01-11T06:29:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
|
|
|
@ -933,7 +933,7 @@
|
|||
"description": "CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-11T14:01:08Z",
|
||||
"updated_at": "2020-09-24T16:10:11Z",
|
||||
"updated_at": "2021-05-11T07:44:17Z",
|
||||
"pushed_at": "2020-07-11T14:12:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-15T16:25:19Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Wing FTP Server 6.2.5 - Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-25T01:53:45Z",
|
||||
"updated_at": "2020-12-25T01:54:31Z",
|
||||
"updated_at": "2021-05-11T07:34:05Z",
|
||||
"pushed_at": "2020-12-25T01:54:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:37:11Z",
|
||||
"updated_at": "2021-04-16T08:32:19Z",
|
||||
"updated_at": "2021-05-11T08:02:06Z",
|
||||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-05-08T10:46:07Z",
|
||||
"updated_at": "2021-05-11T07:41:56Z",
|
||||
"pushed_at": "2021-03-10T05:01:22Z",
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 247,
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 250,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "CVE-2021-21975 vRealize Operations Manager SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T15:40:09Z",
|
||||
"updated_at": "2021-04-25T02:04:41Z",
|
||||
"updated_at": "2021-05-11T07:23:30Z",
|
||||
"pushed_at": "2021-03-31T15:50:27Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-10T14:05:09Z",
|
||||
"updated_at": "2021-05-11T08:27:25Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 740,
|
||||
"watchers_count": 740,
|
||||
"stargazers_count": 743,
|
||||
"watchers_count": 743,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"watchers": 740,
|
||||
"watchers": 743,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -431,8 +431,8 @@
|
|||
"pushed_at": "2021-03-14T23:51:37Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T06:40:49Z",
|
||||
"updated_at": "2021-04-26T02:33:35Z",
|
||||
"updated_at": "2021-05-11T07:19:39Z",
|
||||
"pushed_at": "2021-04-15T06:41:20Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC from TestANull for CVE-2021-28482 on Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-03T13:54:36Z",
|
||||
"updated_at": "2021-05-11T02:43:26Z",
|
||||
"updated_at": "2021-05-11T06:45:53Z",
|
||||
"pushed_at": "2021-05-03T14:29:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 366251440,
|
||||
"name": "CVE-2021-30461",
|
||||
"full_name": "Al1ex\/CVE-2021-30461",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-30461",
|
||||
"description": "CVE-2021-30461",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T04:09:04Z",
|
||||
"updated_at": "2021-05-11T08:15:49Z",
|
||||
"pushed_at": "2021-05-11T04:14:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-04-28T23:24:28Z",
|
||||
"updated_at": "2021-05-11T05:44:28Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T16:03:34Z",
|
||||
"updated_at": "2021-04-21T12:21:38Z",
|
||||
"updated_at": "2021-05-11T08:30:07Z",
|
||||
"pushed_at": "2021-01-31T04:56:56Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-05-10T12:48:05Z",
|
||||
"updated_at": "2021-05-11T08:03:38Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 709,
|
||||
"watchers": 710,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -661,8 +661,8 @@
|
|||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-05-11T00:02:39Z",
|
||||
"updated_at": "2021-05-11T08:15:07Z",
|
||||
"pushed_at": "2021-03-30T14:44:38Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 305,
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2021-3317",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T07:36:46Z",
|
||||
"updated_at": "2021-04-09T07:38:09Z",
|
||||
"updated_at": "2021-05-11T07:21:49Z",
|
||||
"pushed_at": "2021-04-09T07:37:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-05-10T04:23:29Z",
|
||||
"updated_at": "2021-05-11T07:16:38Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 172,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
19
README.md
19
README.md
|
@ -1018,6 +1018,7 @@ The default administrator account & password of the EDIMAX wireless network
|
|||
### CVE-2021-30461
|
||||
- [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
|
||||
- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
|
||||
- [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461)
|
||||
|
||||
### CVE-2021-30481 (2021-04-10)
|
||||
|
||||
|
@ -3948,7 +3949,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
- [corelight/CVE-2020-14882-weblogicRCE](https://github.com/corelight/CVE-2020-14882-weblogicRCE)
|
||||
- [x51/CVE-2020-14882](https://github.com/x51/CVE-2020-14882)
|
||||
- [BabyTeam1024/CVE-2020-14882](https://github.com/BabyTeam1024/CVE-2020-14882)
|
||||
- [xkx518/CodeTest](https://github.com/xkx518/CodeTest)
|
||||
- [adm1in/CodeTest](https://github.com/adm1in/CodeTest)
|
||||
- [securitysqs/poc](https://github.com/securitysqs/poc)
|
||||
- [ShmilySec/CVE-2020-14882](https://github.com/ShmilySec/CVE-2020-14882)
|
||||
- [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic)
|
||||
|
@ -8607,6 +8608,7 @@ Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserializat
|
|||
</code>
|
||||
|
||||
- [shadow-horse/CVE-2019-17571](https://github.com/shadow-horse/CVE-2019-17571)
|
||||
- [Al1ex/CVE-2019-17571](https://github.com/Al1ex/CVE-2019-17571)
|
||||
|
||||
### CVE-2019-17596 (2019-10-24)
|
||||
|
||||
|
@ -12494,9 +12496,6 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
|
|||
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app.
|
||||
</code>
|
||||
|
||||
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
|
||||
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
|
||||
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
|
||||
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
|
||||
|
||||
### CVE-2017-2388 (2017-04-01)
|
||||
|
@ -12614,14 +12613,6 @@ Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Serve
|
|||
|
||||
- [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599)
|
||||
|
||||
### CVE-2017-3730 (2017-05-04)
|
||||
|
||||
<code>
|
||||
In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
|
||||
</code>
|
||||
|
||||
- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730)
|
||||
|
||||
### CVE-2017-3881 (2017-03-17)
|
||||
|
||||
<code>
|
||||
|
@ -12721,9 +12712,7 @@ Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524
|
|||
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
|
||||
</code>
|
||||
|
||||
- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045)
|
||||
- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp)
|
||||
- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638)
|
||||
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
|
||||
- [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro)
|
||||
- [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638)
|
||||
|
@ -18345,7 +18334,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
|
|||
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
|
||||
</code>
|
||||
|
||||
- [mazding/ms09050](https://github.com/mazding/ms09050)
|
||||
- [sooklalad/ms09050](https://github.com/sooklalad/ms09050)
|
||||
|
||||
### CVE-2009-4092 (2009-11-27)
|
||||
|
||||
|
|
Loading…
Reference in a new issue