mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/10/20 00:10:34
This commit is contained in:
parent
0a54a70e4e
commit
f0dcc28a24
34 changed files with 194 additions and 161 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-04T21:12:56Z",
|
||||
"updated_at": "2019-05-28T14:22:07Z",
|
||||
"updated_at": "2020-10-19T12:46:43Z",
|
||||
"pushed_at": "2019-05-28T14:21:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OpenSSH remote DOS exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-09T15:22:38Z",
|
||||
"updated_at": "2020-08-19T13:21:14Z",
|
||||
"updated_at": "2020-10-19T12:52:58Z",
|
||||
"pushed_at": "2017-10-30T22:29:20Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-10-19T02:24:24Z",
|
||||
"updated_at": "2020-10-19T13:32:57Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 230,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-18T20:53:40Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-12T16:44:12Z",
|
||||
"updated_at": "2020-08-21T01:49:06Z",
|
||||
"updated_at": "2020-10-19T15:05:03Z",
|
||||
"pushed_at": "2018-03-12T16:50:20Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1213,8 +1213,8 @@
|
|||
"pushed_at": "2020-09-29T05:21:44Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 137,
|
||||
"forks": 137,
|
||||
"forks_count": 138,
|
||||
"forks": 138,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T04:11:45Z",
|
||||
"updated_at": "2020-10-15T06:41:19Z",
|
||||
"updated_at": "2020-10-19T13:28:13Z",
|
||||
"pushed_at": "2018-04-28T04:47:05Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-08-18T00:00:15Z",
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"forks_count": 139,
|
||||
"forks": 139,
|
||||
"forks_count": 140,
|
||||
"forks": 140,
|
||||
"watchers": 423,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2018-10-27T01:07:49Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2019-01-23T07:30:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2018-10-11T16:54:31Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2020-10-13T07:38:43Z",
|
||||
"updated_at": "2020-10-19T10:59:35Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"forks_count": 189,
|
||||
"forks": 189,
|
||||
"watchers": 339,
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"watchers": 340,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -23,26 +23,26 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 203567273,
|
||||
"id": 203575464,
|
||||
"name": "Pulse",
|
||||
"full_name": "ladyleet1337\/Pulse",
|
||||
"full_name": "nuc13us\/Pulse",
|
||||
"owner": {
|
||||
"login": "ladyleet1337",
|
||||
"id": 26109832,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26109832?v=4",
|
||||
"html_url": "https:\/\/github.com\/ladyleet1337"
|
||||
"login": "nuc13us",
|
||||
"id": 22916937,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22916937?v=4",
|
||||
"html_url": "https:\/\/github.com\/nuc13us"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ladyleet1337\/Pulse",
|
||||
"html_url": "https:\/\/github.com\/nuc13us\/Pulse",
|
||||
"description": "Pulse Secure VPN CVE-2019-11510",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-21T11:08:48Z",
|
||||
"updated_at": "2020-07-13T08:26:29Z",
|
||||
"pushed_at": "2020-07-13T08:26:27Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"created_at": "2019-08-21T12:03:14Z",
|
||||
"updated_at": "2020-10-19T12:40:24Z",
|
||||
"pushed_at": "2019-08-21T12:03:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2020-10-15T16:01:26Z",
|
||||
"updated_at": "2020-10-19T10:47:17Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2020-09-21T12:48:50Z",
|
||||
"updated_at": "2020-10-19T11:46:02Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 578,
|
||||
"watchers_count": 578,
|
||||
"stargazers_count": 577,
|
||||
"watchers_count": 577,
|
||||
"forks_count": 79,
|
||||
"forks": 79,
|
||||
"watchers": 578,
|
||||
"watchers": 577,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2020-10-12T07:34:06Z",
|
||||
"updated_at": "2020-10-19T09:28:08Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 174,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-19T04:33:59Z",
|
||||
"updated_at": "2020-10-19T13:28:23Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 1946,
|
||||
"watchers_count": 1946,
|
||||
"stargazers_count": 1947,
|
||||
"watchers_count": 1947,
|
||||
"forks_count": 511,
|
||||
"forks": 511,
|
||||
"watchers": 1946,
|
||||
"watchers": 1947,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2020-10-16T07:14:47Z",
|
||||
"updated_at": "2020-10-19T10:55:50Z",
|
||||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"watchers": 347,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2020-10-16T13:51:37Z",
|
||||
"updated_at": "2020-10-19T10:47:11Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"stargazers_count": 503,
|
||||
"watchers_count": 503,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"watchers": 502,
|
||||
"watchers": 503,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-10-19T02:24:24Z",
|
||||
"updated_at": "2020-10-19T13:32:57Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 230,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-24T23:09:43Z",
|
||||
"updated_at": "2020-09-30T20:37:18Z",
|
||||
"updated_at": "2020-10-19T09:12:35Z",
|
||||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T09:19:10Z",
|
||||
"updated_at": "2020-09-01T11:22:35Z",
|
||||
"updated_at": "2020-10-19T09:12:25Z",
|
||||
"pushed_at": "2020-01-15T08:36:05Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 432,
|
||||
"watchers_count": 432,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 432,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -864,13 +864,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-10-19T06:26:04Z",
|
||||
"updated_at": "2020-10-19T09:27:57Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 1020,
|
||||
"watchers_count": 1020,
|
||||
"stargazers_count": 1019,
|
||||
"watchers_count": 1019,
|
||||
"forks_count": 333,
|
||||
"forks": 333,
|
||||
"watchers": 1020,
|
||||
"watchers": 1019,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1094,13 +1094,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-10-19T06:32:20Z",
|
||||
"updated_at": "2020-10-19T11:54:32Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 325,
|
||||
"watchers": 326,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-07T19:56:09Z",
|
||||
"updated_at": "2020-10-19T05:24:19Z",
|
||||
"pushed_at": "2020-10-15T02:57:22Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"updated_at": "2020-10-19T13:57:40Z",
|
||||
"pushed_at": "2020-10-19T13:57:36Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 188,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-16T23:03:15Z",
|
||||
"updated_at": "2020-10-18T19:51:57Z",
|
||||
"updated_at": "2020-10-19T11:47:27Z",
|
||||
"pushed_at": "2020-10-16T23:12:52Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "PoC BSOD for CVE-2020-16898",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-17T04:32:11Z",
|
||||
"updated_at": "2020-10-19T09:05:12Z",
|
||||
"updated_at": "2020-10-19T14:27:59Z",
|
||||
"pushed_at": "2020-10-17T04:32:19Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-12T20:59:03Z",
|
||||
"updated_at": "2020-10-17T11:39:36Z",
|
||||
"pushed_at": "2020-10-15T02:58:42Z",
|
||||
"updated_at": "2020-10-19T13:58:48Z",
|
||||
"pushed_at": "2020-10-19T13:58:46Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 6,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-15T14:57:31Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T21:00:15Z",
|
||||
"updated_at": "2020-10-16T22:53:25Z",
|
||||
"updated_at": "2020-10-19T14:07:51Z",
|
||||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 197,
|
||||
"watchers": 198,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T17:50:01Z",
|
||||
"updated_at": "2020-10-18T21:52:06Z",
|
||||
"updated_at": "2020-10-19T14:25:17Z",
|
||||
"pushed_at": "2020-10-12T09:57:28Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-25540.json
Normal file
25
2020/CVE-2020-25540.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 305338473,
|
||||
"name": "CVE-2020-25540",
|
||||
"full_name": "ChaoYangDongYongGuaiGe\/CVE-2020-25540",
|
||||
"owner": {
|
||||
"login": "ChaoYangDongYongGuaiGe",
|
||||
"id": 57404930,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/57404930?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChaoYangDongYongGuaiGe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChaoYangDongYongGuaiGe\/CVE-2020-25540",
|
||||
"description": "ThinkAdmin CVE-2020-25540 poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-19T09:56:20Z",
|
||||
"updated_at": "2020-10-19T10:16:49Z",
|
||||
"pushed_at": "2020-10-19T10:16:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-24T15:04:45Z",
|
||||
"updated_at": "2020-10-08T15:24:21Z",
|
||||
"updated_at": "2020-10-19T10:47:24Z",
|
||||
"pushed_at": "2020-08-30T21:34:41Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-10-19T03:58:51Z",
|
||||
"updated_at": "2020-10-19T12:39:12Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 211,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-19T04:33:59Z",
|
||||
"updated_at": "2020-10-19T13:28:23Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 1946,
|
||||
"watchers_count": 1946,
|
||||
"stargazers_count": 1947,
|
||||
"watchers_count": 1947,
|
||||
"forks_count": 511,
|
||||
"forks": 511,
|
||||
"watchers": 1946,
|
||||
"watchers": 1947,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -289,13 +289,13 @@
|
|||
"description": "Python script to exploit F5 Big-IP CVE-2020-5902 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T04:03:58Z",
|
||||
"updated_at": "2020-10-13T11:11:34Z",
|
||||
"updated_at": "2020-10-19T10:55:32Z",
|
||||
"pushed_at": "2020-07-28T08:43:11Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/13852\/commits\/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s):\/\/IP:Port",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T18:45:53Z",
|
||||
"updated_at": "2020-08-31T12:12:01Z",
|
||||
"updated_at": "2020-10-19T10:56:00Z",
|
||||
"pushed_at": "2020-07-21T18:50:07Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Citrix ADC Vulns",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T20:00:17Z",
|
||||
"updated_at": "2020-09-09T02:51:05Z",
|
||||
"updated_at": "2020-10-19T10:55:24Z",
|
||||
"pushed_at": "2020-07-10T21:03:20Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
10
README.md
10
README.md
|
@ -2462,6 +2462,14 @@ Sourcecodester Simple Library Management System 1.0 is affected by Insecure Perm
|
|||
### CVE-2020-25518
|
||||
- [g-rubert/wordpress_DoS](https://github.com/g-rubert/wordpress_DoS)
|
||||
|
||||
### CVE-2020-25540
|
||||
|
||||
<code>
|
||||
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
|
||||
</code>
|
||||
|
||||
- [ChaoYangDongYongGuaiGe/CVE-2020-25540](https://github.com/ChaoYangDongYongGuaiGe/CVE-2020-25540)
|
||||
|
||||
### CVE-2020-25747
|
||||
|
||||
<code>
|
||||
|
@ -4308,7 +4316,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7
|
|||
</code>
|
||||
|
||||
- [projectzeroindia/CVE-2019-11510](https://github.com/projectzeroindia/CVE-2019-11510)
|
||||
- [ladyleet1337/Pulse](https://github.com/ladyleet1337/Pulse)
|
||||
- [nuc13us/Pulse](https://github.com/nuc13us/Pulse)
|
||||
- [imjdl/CVE-2019-11510-poc](https://github.com/imjdl/CVE-2019-11510-poc)
|
||||
- [es0/CVE-2019-11510_poc](https://github.com/es0/CVE-2019-11510_poc)
|
||||
- [r00tpgp/http-pulse_ssl_vpn.nse](https://github.com/r00tpgp/http-pulse_ssl_vpn.nse)
|
||||
|
|
Loading…
Reference in a new issue