Update CVE sources 2024-08-12 19:01

This commit is contained in:
0xMarcio 2024-08-12 19:01:27 +00:00
parent a417c53201
commit 66773275a6
190 changed files with 1139 additions and 15 deletions

View File

@ -10,6 +10,7 @@ Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to
### POC
#### Reference
- https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf
- https://hackerone.com/reports/145463
#### Github

View File

@ -109,6 +109,7 @@ In Jboss Application Server as shipped with Red Hat Enterprise Application Platf
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/r0eXpeR/redteam_vul
- https://github.com/readloud/Awesome-Stars

View File

@ -87,6 +87,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
- https://github.com/onewinner/VulToolsKit
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pentration/gongkaishouji
- https://github.com/q99266/saury-vulnhub
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qiantu88/Tomcat-Exploit

View File

@ -91,6 +91,7 @@ Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in In
- https://github.com/opensec-cn/kunpeng
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qnsoft/kunpeng
- https://github.com/readloud/Awesome-Stars

View File

@ -71,6 +71,7 @@ A code execution vulnerability exists in the Stapler web framework used by Jenki
- https://github.com/onewinner/VulToolsKit
- https://github.com/orangetw/awesome-jenkins-rce-2019
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/reph0r/poc-exp
- https://github.com/reph0r/poc-exp-tools
- https://github.com/retr0-13/Goby

View File

@ -115,6 +115,7 @@ In WinRAR versions prior to and including 5.61, There is path traversal vulnerab
- https://github.com/nobiusmallyu/kehai
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pranav0408/WinAFL
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ray-cp/Vuln_Analysis

17
2018/CVE-2018-21179.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2018-21179](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21179)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, D7800 before 1.0.1.30, R7500 before 1.0.0.122, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
### POC
#### Reference
- https://kb.netgear.com/000055179/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2620
#### Github
No PoCs found on GitHub currently.

View File

@ -114,6 +114,7 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
- https://github.com/oleksandrbi/CodePathweek7
- https://github.com/password520/Penetration_PoC
- https://github.com/paulveillard/cybersecurity-tools
- https://github.com/pentration/gongkaishouji
- https://github.com/piyushimself/Bugbounty_Writeups
- https://github.com/plancoo/Bugbounty_Writeups
- https://github.com/qazbnm456/awesome-cve-poc

View File

@ -112,6 +112,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
- https://github.com/paramint/windows-kernel-exploits
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/windows-kernel-exploits
- https://github.com/pentration/gongkaishouji
- https://github.com/pwninx/WinPwn
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qiantu88/CVE-2018-8120

View File

@ -329,6 +329,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- https://github.com/password520/RedTeamer
- https://github.com/pengusec/awesome-netsec-articles
- https://github.com/pentest-a2p2v/pentest-a2p2v-core
- https://github.com/pentration/gongkaishouji
- https://github.com/pg001001/deception-tech
- https://github.com/phant0n/PENTESTING-BIBLE
- https://github.com/pikpikcu/Pentest-Tools-Framework

View File

@ -61,6 +61,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
- https://github.com/paramint/windows-kernel-exploits
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pentration/gongkaishouji
- https://github.com/pravinsrc/NOTES-windows-kernel-links
- https://github.com/root26/bug
- https://github.com/safesword/WindowsExp

View File

@ -38,6 +38,7 @@ An elevation of privilege vulnerability exists in the way Windows Error Reportin
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -30,6 +30,7 @@ A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and
- https://github.com/onewinner/VulToolsKit
- https://github.com/orangetw/awesome-jenkins-rce-2019
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -38,6 +38,7 @@ A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and
- https://github.com/onewinner/VulToolsKit
- https://github.com/orangetw/awesome-jenkins-rce-2019
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/retr0-13/pwn_jenkins
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -36,6 +36,7 @@ It was found that xstream API version 1.4.10 before 1.4.11 introduced a regressi
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lokerxx/JavaVul
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -53,6 +53,7 @@ mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints
- https://github.com/masahiro331/CVE-2019-10758
- https://github.com/ossf-cve-benchmark/CVE-2019-10758
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/retr0-13/Goby
- https://github.com/tdtc7/qps
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

View File

@ -108,6 +108,7 @@ In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in
- https://github.com/motikan2010/blog.motikan2010.com
- https://github.com/neex/phuip-fpizdam
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/rmtec/modeswitcher
- https://github.com/shadow-horse/cve-2019-11043

View File

@ -89,6 +89,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7
- https://github.com/nvchungkma/Pulse-VPN-Vulnerability-Analysis
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pentration/gongkaishouji
- https://github.com/popyue/Pulse_exploit
- https://github.com/priamai/sigmatau
- https://github.com/projectzeroindia/CVE-2019-11510

View File

@ -57,6 +57,7 @@ Insufficient vetting of parameters passed with the Prompt:Open IPC message betwe
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/m1ghtym0/browser-pwn
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -46,6 +46,7 @@ The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lnick2023/nicenice
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/woods-sega/woodswiki

View File

@ -59,6 +59,7 @@ An elevation of privilege vulnerability exists when the Windows AppX Deployment
- https://github.com/padovah4ck/CVE-2019-1253
- https://github.com/paramint/Watson-Windows-check-KB
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pwninx/Watson
- https://github.com/rasta-mouse/Watson
- https://github.com/rnbochsr/Relevant

View File

@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pr0tean/CVE-2019-13051
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -58,6 +58,7 @@ An elevation of privilege vulnerability exists when Windows improperly handles a
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pengusec/awesome-netsec-articles
- https://github.com/pentration/gongkaishouji
- https://github.com/rnbochsr/Relevant
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

View File

@ -116,6 +116,7 @@ In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/pentration/gongkaishouji
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/polosec/CVE-2019-13272
- https://github.com/pwnCmndr/LinuxPrivEsc

View File

@ -86,6 +86,7 @@ No PoCs from references.
- https://github.com/nobodyatall648/CVE-2019-1388
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/rahul-masal/Windows-Privilege-Escalation

View File

@ -66,6 +66,7 @@ An elevation of privilege vulnerability exists when the Windows Universal Plug a
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pengusec/awesome-netsec-articles
- https://github.com/pentration/gongkaishouji
- https://github.com/rnbochsr/Relevant
- https://github.com/shubham0d/SymBlock
- https://github.com/weeka10/-hktalent-TOP

View File

@ -66,6 +66,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/paramint/windows-kernel-exploits
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/piotrflorczyk/cve-2019-1458_POC
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/rip1s/CVE-2019-1458

View File

@ -117,6 +117,7 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_change.
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pentration/gongkaishouji
- https://github.com/psw01/CVE-2019-15107_webminRCE
- https://github.com/puckiestyle/CVE-2019-15107
- https://github.com/q99266/saury-vulnhub

View File

@ -42,6 +42,7 @@ No PoCs from references.
- https://github.com/lnick2023/nicenice
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/tom0li/collection-document
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

View File

@ -34,6 +34,7 @@ No PoCs from references.
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -34,6 +34,7 @@ No PoCs from references.
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -62,6 +62,7 @@ Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/n3ov4n1sh/CVE-2019-16278
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/richardsonjf/King-of-the-hill
- https://github.com/sobinge/nuclei-templates

View File

@ -34,6 +34,7 @@ No PoCs from references.
- https://github.com/jas502n/CVE-2019-16278
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -27,6 +27,7 @@ No PoCs from references.
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -46,6 +46,7 @@ No PoCs from references.
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/openx-org/BLEN
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/tdtc7/qps
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -27,6 +27,7 @@ No PoCs from references.
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

17
2019/CVE-2019-16638.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2019-16638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16638)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was found on the Ruijie EG-2000 series gateway. An attacker can easily dump cleartext stored passwords in /data/config.text with simple XORs. This affects EG-2000SE EG_RGOS 11.1(1)B1.
### POC
#### Reference
- https://0x.mk/?p=239
#### Github
No PoCs found on GitHub currently.

17
2019/CVE-2019-16639.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2019-16639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16639)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was found on the Ruijie EG-2000 series gateway. There is a newcli.php API interface without access control, which can allow an attacker (who only has web interface access) to use TELNET commands and/or show admin passwords via the mode_url=exec&command= substring. This affects EG-2000SE EG_RGOS 11.9 B11P1.
### POC
#### Reference
- https://0x.mk/?p=239
#### Github
No PoCs found on GitHub currently.

17
2019/CVE-2019-16640.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2019-16640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16640)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was found in upload.php on the Ruijie EG-2000 series gateway. A parameter passed to the class UploadFile is mishandled (%00 and /var/./html are not checked), which can allow an attacker to upload any file to the gateway. This affects EG-2000SE EG_RGOS 11.9 B11P1.
### POC
#### Reference
- https://0x.mk/?p=239
#### Github
No PoCs found on GitHub currently.

17
2019/CVE-2019-16641.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2019-16641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16641)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was found on the Ruijie EG-2000 series gateway. There is a buffer overflow in client.so. Consequently, an attacker can use login.php to login to any account, without providing its password. This affects EG-2000SE EG_RGOS 11.1(1)B1.
### POC
#### Reference
- https://0x.mk/?p=239
#### Github
No PoCs found on GitHub currently.

View File

@ -72,6 +72,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/p0megranate/makura
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/polar1s7/CVE-2019-16759-bypass
- https://github.com/psychoxploit/vbull
- https://github.com/qazbnm456/awesome-cve-poc

View File

@ -43,6 +43,7 @@ Unauthenticated remote code execution occurs in D-Link products such as DIR-655C
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pwnhacker0x18/CVE-2019-16920-MassPwn3r
- https://github.com/sobinge/nuclei-templates
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

View File

@ -32,6 +32,7 @@ A stack-based buffer overflow in the processPrivilage() function in IOS/process-
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/mavlevin/CVE-2019-17424
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/sereok3/buffer-overflow-writeups
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -32,6 +32,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -57,6 +57,7 @@ No PoCs from references.
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/r00t4dm/CVE-2019-17564
- https://github.com/t0m4too/t0m4to

View File

@ -40,6 +40,7 @@ The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pentration/gongkaishouji
- https://github.com/s1kr10s/D-Link-DIR-859-RCE
- https://github.com/secenv/GoInputProxy
- https://github.com/tanjiti/sec_profile

View File

@ -38,6 +38,7 @@ ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise
- https://github.com/kxisxr/Bash-Script-CVE-2019-17662
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/rajendrakumaryadav/CVE-2019-17662-Exploit
- https://github.com/rnbochsr/atlas
- https://github.com/thomas-osgood/CVE-2019-17662

View File

@ -41,6 +41,7 @@ An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/tomsiwik/xiaomi-router-patch
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -43,6 +43,7 @@ An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -31,6 +31,7 @@ class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4,
- https://github.com/jra89/CVE-2019-19634
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -168,6 +168,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/pentration/gongkaishouji
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/projectzeroindia/CVE-2019-19781
- https://github.com/ptresearch/Pentest-Detections

View File

@ -38,6 +38,7 @@ Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account tak
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/maocatooo/Django2_dailyfresh
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/ryu22e/django_cve_2019_19844_poc
- https://github.com/siddharthraopotukuchi/trivy
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers

View File

@ -10,6 +10,7 @@ An Untrusted Search Path vulnerability in Malwarebytes AdwCleaner before 8.0.1 c
### POC
#### Reference
- https://borncity.com/win/2019/12/19/adwcleaner-8-0-1-closes-a-dll-hijacking-vulnerability/
- https://www.bleepingcomputer.com/news/software/adwcleaner-801-fixes-dll-hijacking-vulnerability/
#### Github

View File

@ -27,6 +27,7 @@ D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/secenv/GoInputProxy
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -44,6 +44,7 @@ In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds
- https://github.com/marcinguy/CVE-2019-2107
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -169,6 +169,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- https://github.com/password520/RedTeamer
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/paulveillard/cybersecurity-web-security
- https://github.com/pentration/gongkaishouji
- https://github.com/pimps/CVE-2019-2725
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/pwnagelabs/VEF

View File

@ -29,6 +29,7 @@ ThinkCMF 5.0.190111 allows remote attackers to execute arbitrary PHP code via th
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -82,6 +82,7 @@ Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw
- https://github.com/mpgn/CVE-2019-7609
- https://github.com/password520/Penetration_PoC
- https://github.com/paulveillard/cybersecurity-web-security
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qazbnm456/awesome-web-security
- https://github.com/rhbb/CVE-2019-7609

View File

@ -29,6 +29,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/tdtc7/qps
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -127,6 +127,7 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pravinsrc/NOTES-windows-kernel-links
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/robmichel2854/robs-links

View File

@ -49,6 +49,7 @@ No PoCs from references.
- https://github.com/ly4k/BlueGate
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
- https://github.com/ruppde/scan_CVE-2020-29583

View File

@ -46,6 +46,7 @@ No PoCs from references.
- https://github.com/ly4k/BlueGate
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ruppde/rdg_scanner_cve-2020-0609
- https://github.com/soosmile/POC

View File

@ -69,6 +69,7 @@ A remote code execution vulnerability exists in Microsoft SQL Server Reporting S
- https://github.com/nitishbadole/PENTESTING-BIBLE
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/phant0n/PENTESTING-BIBLE
- https://github.com/puckiestyle/ysoserial.net
- https://github.com/pwntester/ysoserial.net

View File

@ -65,6 +65,7 @@ An elevation of privilege vulnerability exists in the way that the Windows Kerne
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/Windows10Exploits
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/soosmile/POC
- https://github.com/tussjump/cve_2020_0668

View File

@ -63,6 +63,7 @@ A remote code execution vulnerability exists in the way that the scripting engin
- https://github.com/maxpl0it/CVE-2020-0674-Exploit
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/sbroekhoven/CVE-2020-0674
- https://github.com/soosmile/POC
- https://github.com/suspiciousbytes/CVE-2020-0674

View File

@ -67,6 +67,7 @@ An elevation of privilege vulnerability exists in the Windows Installer when MSI
- https://github.com/nu11secur1ty/Windows10Exploits
- https://github.com/padovah4ck/CVE-2020-0683
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/rainmana/awesome-rainmana
- https://github.com/shubham0d/SymBlock

View File

@ -138,6 +138,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/pentration/gongkaishouji
- https://github.com/phackt/Invoke-Recon
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/puckiestyle/Active-Directory-Exploitation-Cheat-Sheet

View File

@ -41,6 +41,7 @@ An information vulnerability exists when Windows Modules Installer Service impro
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -52,6 +52,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -87,6 +87,7 @@ An elevation of privilege vulnerability exists when the Windows Background Intel
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/paramint/windows-kernel-exploits
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pwninx/WinPwn
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/readloud/Awesome-Stars

View File

@ -294,6 +294,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- https://github.com/password520/Penetration_PoC
- https://github.com/pathakabhi24/Awesome-C
- https://github.com/pengusec/awesome-netsec-articles
- https://github.com/pentration/gongkaishouji
- https://github.com/pharo-sec/OSCP-Cheat-Sheet
- https://github.com/polarityio/youtube
- https://github.com/psc4re/NSE-scripts

View File

@ -55,6 +55,7 @@ Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution b
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/retr0-13/Goby
- https://github.com/soosmile/POC
- https://github.com/tdtc7/qps

View File

@ -73,6 +73,7 @@ Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
- https://github.com/netveil/Awesome-List
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
- https://github.com/safe6Sec/CodeqlNote

View File

@ -64,6 +64,7 @@ Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
- https://github.com/netveil/Awesome-List
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
- https://github.com/soosmile/POC

View File

@ -32,6 +32,7 @@ No PoCs from references.
- https://github.com/nisodaisuki/VulnerabilityScanningSecurityTool
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -31,6 +31,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -65,6 +65,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se
- https://github.com/neofito/CVE-2020-1337
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/shubham0d/CVE-2020-1048
- https://github.com/soosmile/POC
- https://github.com/thalpius/Microsoft-PrintDemon-Vulnerability

View File

@ -62,6 +62,7 @@ An elevation of privilege vulnerability exists in Windows when the Windows kerne
- https://github.com/lyshark/Windows-exploits
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xonoxitron/INE-eJPT-Certification-Exam-Notes-Cheat-Sheet

View File

@ -42,6 +42,7 @@ No PoCs from references.
- https://github.com/lyshark/Windows-exploits
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/readloud/Awesome-Stars
- https://github.com/soosmile/POC
- https://github.com/taielab/awesome-hacking-lists

View File

@ -42,6 +42,7 @@ FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction betwee
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/seal-community/patches
- https://github.com/soosmile/POC

View File

@ -53,6 +53,7 @@ A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2
- https://github.com/omnibor/bomsh
- https://github.com/ozun215/shim-review
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/puzzleos/uefi-shim_review
- https://github.com/rhboot/shim-review
- https://github.com/soosmile/POC

View File

@ -36,6 +36,7 @@ No PoCs from references.
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/shubham0d/SymBlock
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -87,6 +87,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/orgTestCodacy11KRepos110MB/repo-1492-Dork-Admin
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/puckiestyle/cve-2020-11651
- https://github.com/rapyuta-robotics/clean-script
- https://github.com/retr0-13/Goby

View File

@ -69,6 +69,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/orgTestCodacy11KRepos110MB/repo-1492-Dork-Admin
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/rapyuta-robotics/clean-script
- https://github.com/rossengeorgiev/salt-security-backports
- https://github.com/soosmile/POC

View File

@ -33,6 +33,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -45,6 +45,7 @@ The Open Connectivity Foundation UPnP specification before 2020-04-17 does not f
- https://github.com/mvlnetdev/zeek_detection_script_collection
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC

View File

@ -32,6 +32,7 @@ An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, a
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/shinyquagsire23/CVE-2020-12753-PoC
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

View File

@ -40,6 +40,7 @@ A remote code execution vulnerability exists when Microsoft Windows OLE fails to
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-

View File

@ -46,6 +46,7 @@ An elevation of privilege vulnerability exists when the Windows Update Orchestra
- https://github.com/lyshark/Windows-exploits
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/readloud/Awesome-Stars
- https://github.com/soosmile/POC
- https://github.com/taielab/awesome-hacking-lists

View File

@ -83,6 +83,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/cve-2020-1337-poc
- https://github.com/pentration/gongkaishouji
- https://github.com/sailay1996/cve-2020-1337-poc
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

View File

@ -77,6 +77,7 @@ A remote code execution vulnerability exists in Windows Domain Name System serve
- https://github.com/mr-r3b00t/CVE-2020-1350
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pg001001/deception-tech
- https://github.com/psc4re/NSE-scripts
- https://github.com/rudraimmunefi/source-code-review

View File

@ -55,6 +55,7 @@ No PoCs from references.
- https://github.com/morpheuslord/GPT_Vuln-analyzer
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/readloud/Awesome-Stars
- https://github.com/soosmile/POC
- https://github.com/taielab/awesome-hacking-lists

View File

@ -43,6 +43,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/potats0/cve_2020_14644
- https://github.com/r0eXpeR/redteam_vul
- https://github.com/readloud/Awesome-Stars

View File

@ -49,6 +49,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/r00t4dm/r00t4dm
- https://github.com/readloud/Awesome-Stars
- https://github.com/soosmile/POC

View File

@ -49,6 +49,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/phx/cvescan
- https://github.com/readloud/Awesome-Stars
- https://github.com/retr0-13/cveScannerV2

View File

@ -167,6 +167,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/pentration/gongkaishouji
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/q99266/saury-vulnhub

View File

@ -46,6 +46,7 @@ No PoCs from references.
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947
- https://github.com/soosmile/POC
- https://github.com/threedr3am/learnjavabug

View File

@ -52,6 +52,7 @@ No PoCs from references.
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/tanjiti/sec_profile
- https://github.com/txrw/Dubbo-CVE-2020-1948

View File

@ -44,6 +44,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/soosmile/POC
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

View File

@ -139,6 +139,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://github.com/onewinner/VulToolsKit
- https://github.com/password520/Penetration_PoC
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/pentration/gongkaishouji
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/qazbnm456/awesome-cve-poc

Some files were not shown because too many files have changed in this diff Show More