mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2020/08/28 06:10:03
This commit is contained in:
parent
0f0ccc8e46
commit
00ee9fd2df
70 changed files with 378 additions and 312 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2020-08-14T23:42:44Z",
|
||||
"updated_at": "2020-08-27T17:35:25Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2243,
|
||||
"watchers_count": 2243,
|
||||
"stargazers_count": 2242,
|
||||
"watchers_count": 2242,
|
||||
"forks_count": 482,
|
||||
"forks": 482,
|
||||
"watchers": 2243,
|
||||
"watchers": 2242,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2014-4321 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-08T06:13:36Z",
|
||||
"updated_at": "2018-11-14T10:48:42Z",
|
||||
"updated_at": "2020-08-27T17:35:49Z",
|
||||
"pushed_at": "2015-03-08T06:14:34Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 20,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-24T13:49:03Z",
|
||||
"updated_at": "2020-05-21T05:00:27Z",
|
||||
"updated_at": "2020-08-27T17:36:18Z",
|
||||
"pushed_at": "2016-01-24T22:20:44Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 73,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-10T23:00:59Z",
|
||||
"updated_at": "2020-08-01T19:21:45Z",
|
||||
"updated_at": "2020-08-27T17:36:07Z",
|
||||
"pushed_at": "2015-09-10T23:01:09Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"watchers": 192,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC code for 32 bit Android OS",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-12T01:31:36Z",
|
||||
"updated_at": "2020-06-23T13:37:22Z",
|
||||
"updated_at": "2020-08-27T17:36:07Z",
|
||||
"pushed_at": "2015-12-15T05:42:02Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 130,
|
||||
"watchers": 129,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-02-18T14:39:04Z",
|
||||
"updated_at": "2018-11-14T10:49:00Z",
|
||||
"updated_at": "2020-08-27T17:36:21Z",
|
||||
"pushed_at": "2016-02-18T14:40:19Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-02T12:18:57Z",
|
||||
"updated_at": "2020-08-05T00:36:18Z",
|
||||
"updated_at": "2020-08-27T17:36:27Z",
|
||||
"pushed_at": "2019-08-13T07:14:01Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 93,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2020-08-24T15:11:29Z",
|
||||
"updated_at": "2020-08-27T17:36:32Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 283,
|
||||
"watchers": 282,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2015-7547",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-10T21:13:54Z",
|
||||
"updated_at": "2020-08-01T19:18:33Z",
|
||||
"updated_at": "2020-08-27T17:36:20Z",
|
||||
"pushed_at": "2016-02-20T07:57:58Z",
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 547,
|
||||
"watchers": 546,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-09T21:30:34Z",
|
||||
"updated_at": "2020-06-19T06:49:20Z",
|
||||
"updated_at": "2020-08-27T17:36:20Z",
|
||||
"pushed_at": "2016-05-09T17:53:48Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"forks_count": 152,
|
||||
"forks": 152,
|
||||
"watchers": 327,
|
||||
"watchers": 326,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-01-22T03:52:11Z",
|
||||
"updated_at": "2018-12-31T16:52:34Z",
|
||||
"updated_at": "2020-08-27T17:36:18Z",
|
||||
"pushed_at": "2018-12-31T16:52:32Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 23,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-03T16:47:32Z",
|
||||
"updated_at": "2020-06-24T17:58:44Z",
|
||||
"updated_at": "2020-08-27T17:36:27Z",
|
||||
"pushed_at": "2019-03-10T02:18:00Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 172,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2020-08-24T15:11:29Z",
|
||||
"updated_at": "2020-08-27T17:36:32Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 283,
|
||||
"watchers": 282,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-07-05T10:46:34Z",
|
||||
"updated_at": "2018-11-14T10:49:06Z",
|
||||
"updated_at": "2020-08-27T17:36:33Z",
|
||||
"pushed_at": "2016-07-05T10:46:57Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 51,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Public repository for improvements to the EXTRABACON exploit",
|
||||
"fork": false,
|
||||
"created_at": "2016-09-20T23:19:02Z",
|
||||
"updated_at": "2020-08-22T15:56:56Z",
|
||||
"updated_at": "2020-08-27T17:36:39Z",
|
||||
"pushed_at": "2016-11-02T03:11:27Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"watchers": 151,
|
||||
"watchers": 150,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Pixel bootlaoder exploit for reading flash storage",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-28T16:26:18Z",
|
||||
"updated_at": "2019-10-22T02:02:48Z",
|
||||
"updated_at": "2020-08-27T17:36:41Z",
|
||||
"pushed_at": "2017-01-05T18:55:56Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 26,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2020-08-18T17:57:59Z",
|
||||
"updated_at": "2020-08-27T17:36:59Z",
|
||||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 270,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2020-08-26T06:26:42Z",
|
||||
"updated_at": "2020-08-27T17:36:52Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 627,
|
||||
"watchers_count": 627,
|
||||
"stargazers_count": 626,
|
||||
"watchers_count": 626,
|
||||
"forks_count": 282,
|
||||
"forks": 282,
|
||||
"watchers": 627,
|
||||
"watchers": 626,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2020-07-24T07:38:50Z",
|
||||
"updated_at": "2020-08-27T17:37:05Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"stargazers_count": 425,
|
||||
"watchers_count": 425,
|
||||
"forks_count": 193,
|
||||
"forks": 193,
|
||||
"watchers": 426,
|
||||
"watchers": 425,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-05-30T18:12:38Z",
|
||||
"updated_at": "2020-06-10T12:49:21Z",
|
||||
"updated_at": "2020-08-27T17:36:56Z",
|
||||
"pushed_at": "2017-06-05T19:53:35Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 116,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2020-08-18T02:30:45Z",
|
||||
"updated_at": "2020-08-27T17:37:10Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 272,
|
||||
"watchers": 271,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Test and exploit for CVE-2017-12542",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-05T18:55:56Z",
|
||||
"updated_at": "2020-08-18T04:33:36Z",
|
||||
"updated_at": "2020-08-27T17:37:18Z",
|
||||
"pushed_at": "2018-04-15T12:01:38Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 77,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2020-08-26T07:51:36Z",
|
||||
"updated_at": "2020-08-27T17:37:06Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"watchers": 349,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-13T21:33:55Z",
|
||||
"updated_at": "2020-06-06T02:43:32Z",
|
||||
"updated_at": "2020-08-27T17:37:10Z",
|
||||
"pushed_at": "2017-11-14T10:26:28Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 157,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-08-10T18:54:27Z",
|
||||
"updated_at": "2020-08-27T17:37:14Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 538,
|
||||
"watchers": 537,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2020-08-26T22:23:11Z",
|
||||
"updated_at": "2020-08-27T17:36:55Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 243,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2017-7494 - Detection Scripts",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T07:28:26Z",
|
||||
"updated_at": "2020-04-06T12:15:02Z",
|
||||
"updated_at": "2020-08-27T17:36:56Z",
|
||||
"pushed_at": "2017-05-26T07:43:02Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 62,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2020-08-25T22:14:35Z",
|
||||
"updated_at": "2020-08-27T17:36:56Z",
|
||||
"pushed_at": "2017-11-27T16:28:14Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 201,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Proof of Concept exploit for CVE-2017-8570",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T19:09:33Z",
|
||||
"updated_at": "2020-08-15T17:44:18Z",
|
||||
"updated_at": "2020-08-27T17:37:15Z",
|
||||
"pushed_at": "2018-01-09T19:23:43Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 171,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Running CVE-2017-8759 exploit sample.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T09:50:04Z",
|
||||
"updated_at": "2020-06-06T03:04:15Z",
|
||||
"updated_at": "2020-08-27T17:37:04Z",
|
||||
"pushed_at": "2020-01-23T06:53:00Z",
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 257,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-14T10:04:39Z",
|
||||
"updated_at": "2020-08-09T21:12:25Z",
|
||||
"updated_at": "2020-08-27T17:37:05Z",
|
||||
"pushed_at": "2018-09-10T16:25:12Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"watchers": 305,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2017-8809 Docker - RFD(Reflected File Download) for MediaWiki",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-22T10:21:51Z",
|
||||
"updated_at": "2020-05-18T10:43:35Z",
|
||||
"updated_at": "2020-08-27T17:38:15Z",
|
||||
"pushed_at": "2020-01-22T10:27:26Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Test utility for cve-2018-1002105",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-05T02:51:43Z",
|
||||
"updated_at": "2020-08-18T02:21:20Z",
|
||||
"updated_at": "2020-08-27T17:37:39Z",
|
||||
"pushed_at": "2018-12-13T16:56:28Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 191,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T23:05:10Z",
|
||||
"updated_at": "2020-08-08T06:01:23Z",
|
||||
"updated_at": "2020-08-27T17:37:36Z",
|
||||
"pushed_at": "2018-11-04T17:29:33Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 231,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2020-08-10T18:54:27Z",
|
||||
"updated_at": "2020-08-27T17:37:14Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 538,
|
||||
"watchers": 537,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-08-26T03:52:32Z",
|
||||
"updated_at": "2020-08-27T19:30:38Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 292,
|
||||
"watchers": 293,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -243,13 +243,13 @@
|
|||
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T15:38:15Z",
|
||||
"updated_at": "2020-08-19T07:40:58Z",
|
||||
"updated_at": "2020-08-27T16:10:45Z",
|
||||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1301,13 +1301,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-08-26T09:30:54Z",
|
||||
"updated_at": "2020-08-27T17:37:53Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 755,
|
||||
"watchers_count": 755,
|
||||
"stargazers_count": 754,
|
||||
"watchers_count": 754,
|
||||
"forks_count": 183,
|
||||
"forks": 183,
|
||||
"watchers": 755,
|
||||
"watchers": 754,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1508,13 +1508,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2020-08-27T02:59:40Z",
|
||||
"updated_at": "2020-08-27T17:37:53Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1040,
|
||||
"watchers_count": 1040,
|
||||
"stargazers_count": 1039,
|
||||
"watchers_count": 1039,
|
||||
"forks_count": 349,
|
||||
"forks": 349,
|
||||
"watchers": 1040,
|
||||
"watchers": 1039,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1577,13 +1577,13 @@
|
|||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2020-08-10T05:50:22Z",
|
||||
"updated_at": "2020-08-27T17:37:54Z",
|
||||
"pushed_at": "2020-05-09T09:49:14Z",
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 332,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-10092 Docker - Apache HTTP Server",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-18T14:15:13Z",
|
||||
"updated_at": "2020-05-18T10:43:29Z",
|
||||
"updated_at": "2020-08-27T17:38:11Z",
|
||||
"pushed_at": "2020-01-07T03:22:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-08-27T08:55:28Z",
|
||||
"updated_at": "2020-08-27T19:47:27Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1604,
|
||||
"watchers_count": 1604,
|
||||
"stargazers_count": 1605,
|
||||
"watchers_count": 1605,
|
||||
"forks_count": 233,
|
||||
"forks": 233,
|
||||
"watchers": 1604,
|
||||
"watchers": 1605,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2020-08-25T17:42:35Z",
|
||||
"updated_at": "2020-08-27T17:38:03Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"stargazers_count": 579,
|
||||
"watchers_count": 579,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 580,
|
||||
"watchers": 579,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T08:23:46Z",
|
||||
"updated_at": "2020-06-29T13:18:59Z",
|
||||
"updated_at": "2020-08-27T17:38:14Z",
|
||||
"pushed_at": "2020-04-06T09:01:07Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 55,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-09-10T15:57:23Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
|
|
25
2019/CVE-2019-17026.json
Normal file
25
2019/CVE-2019-17026.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 290864437,
|
||||
"name": "CVE-2019-17026-Exploit",
|
||||
"full_name": "maxpl0it\/CVE-2019-17026-Exploit",
|
||||
"owner": {
|
||||
"login": "maxpl0it",
|
||||
"id": 27973683,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27973683?v=4",
|
||||
"html_url": "https:\/\/github.com\/maxpl0it"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maxpl0it\/CVE-2019-17026-Exploit",
|
||||
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-27T19:32:07Z",
|
||||
"updated_at": "2020-08-27T20:41:11Z",
|
||||
"pushed_at": "2020-08-27T19:33:42Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-17564 Apache Dubbo deserialization RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-13T01:40:50Z",
|
||||
"updated_at": "2020-04-05T08:56:00Z",
|
||||
"updated_at": "2020-08-27T17:38:17Z",
|
||||
"pushed_at": "2020-02-13T01:42:21Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "TelerikUI Vulnerability Scanner (CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-25T08:37:51Z",
|
||||
"updated_at": "2020-07-06T08:50:06Z",
|
||||
"updated_at": "2020-08-27T17:38:28Z",
|
||||
"pushed_at": "2020-05-25T08:15:28Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Chevereto reflected XSS in Website Name - 1.0.0 - 1.1.4 Free, <= 3.13.5 Core",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-11T14:00:32Z",
|
||||
"updated_at": "2020-02-15T22:38:06Z",
|
||||
"updated_at": "2020-08-27T17:38:10Z",
|
||||
"pushed_at": "2019-12-11T14:11:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T02:05:51Z",
|
||||
"updated_at": "2020-01-11T18:51:18Z",
|
||||
"updated_at": "2020-08-27T17:38:13Z",
|
||||
"pushed_at": "2020-01-10T05:12:02Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -703,13 +703,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2020-08-25T06:50:15Z",
|
||||
"updated_at": "2020-08-27T17:38:15Z",
|
||||
"pushed_at": "2020-03-25T05:07:43Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 80,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -726,13 +726,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T23:13:00Z",
|
||||
"updated_at": "2020-07-29T11:44:54Z",
|
||||
"updated_at": "2020-08-27T17:38:15Z",
|
||||
"pushed_at": "2020-03-25T16:48:30Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 56,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2019-07-15T06:03:15Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-5096(UAF in upload handler) exploit cause Denial of Service",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-17T13:44:36Z",
|
||||
"updated_at": "2020-07-03T03:51:52Z",
|
||||
"updated_at": "2020-08-27T17:38:17Z",
|
||||
"pushed_at": "2020-02-17T13:47:55Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for CVE-2019-7616 \/ ESA-2019-09",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-02T07:28:13Z",
|
||||
"updated_at": "2020-06-12T21:14:53Z",
|
||||
"updated_at": "2020-08-27T17:38:30Z",
|
||||
"pushed_at": "2020-06-02T07:29:20Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-9729. Transferred from https:\/\/github.com\/DoubleLabyrinth\/SdoKeyCrypt-sys-local-privilege-elevation",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-12T14:18:20Z",
|
||||
"updated_at": "2020-05-31T02:35:38Z",
|
||||
"updated_at": "2020-08-27T17:37:48Z",
|
||||
"pushed_at": "2019-03-13T01:24:21Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 81,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T21:33:17Z",
|
||||
"updated_at": "2020-07-22T15:40:51Z",
|
||||
"updated_at": "2020-08-27T17:38:15Z",
|
||||
"pushed_at": "2020-07-05T17:27:24Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 33,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-08-22T21:58:17Z",
|
||||
"updated_at": "2020-08-27T17:38:15Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 219,
|
||||
"watchers": 218,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2020-07-18T13:19:37Z",
|
||||
"updated_at": "2020-08-27T17:38:18Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 171,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2020-08-25T21:16:00Z",
|
||||
"updated_at": "2020-08-27T19:42:21Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 169,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-25T23:44:16Z",
|
||||
"updated_at": "2020-08-16T09:13:13Z",
|
||||
"updated_at": "2020-08-27T17:38:18Z",
|
||||
"pushed_at": "2020-02-26T00:58:39Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 146,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 215,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-08-27T09:49:03Z",
|
||||
"updated_at": "2020-08-27T17:38:31Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"stargazers_count": 400,
|
||||
"watchers_count": 400,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 401,
|
||||
"watchers": 400,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-08-26T18:10:31Z",
|
||||
"updated_at": "2020-08-27T17:38:22Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 991,
|
||||
"watchers_count": 991,
|
||||
"stargazers_count": 990,
|
||||
"watchers_count": 990,
|
||||
"forks_count": 325,
|
||||
"forks": 325,
|
||||
"watchers": 991,
|
||||
"watchers": 990,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-29T00:01:41Z",
|
||||
"updated_at": "2020-08-26T16:19:57Z",
|
||||
"updated_at": "2020-08-27T17:38:33Z",
|
||||
"pushed_at": "2020-08-24T23:16:38Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 49,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-11T15:42:18Z",
|
||||
"updated_at": "2020-08-17T13:52:12Z",
|
||||
"updated_at": "2020-08-27T17:38:31Z",
|
||||
"pushed_at": "2020-06-11T16:21:01Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T08:01:37Z",
|
||||
"updated_at": "2020-08-24T13:27:52Z",
|
||||
"updated_at": "2020-08-27T17:38:26Z",
|
||||
"pushed_at": "2020-05-04T08:11:21Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 93,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T06:42:50Z",
|
||||
"updated_at": "2020-08-07T12:26:39Z",
|
||||
"updated_at": "2020-08-27T16:23:25Z",
|
||||
"pushed_at": "2020-04-22T10:29:16Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-11896 Treck TCP\/IP stack and device asset investigation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T03:38:31Z",
|
||||
"updated_at": "2020-07-24T03:12:02Z",
|
||||
"updated_at": "2020-08-27T18:25:14Z",
|
||||
"pushed_at": "2020-07-22T02:41:19Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A proof-of-concept for CVE-2020-12753",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T21:58:42Z",
|
||||
"updated_at": "2020-08-06T13:55:04Z",
|
||||
"updated_at": "2020-08-27T17:17:00Z",
|
||||
"pushed_at": "2020-06-01T22:55:46Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T05:15:05Z",
|
||||
"updated_at": "2020-08-27T06:27:20Z",
|
||||
"updated_at": "2020-08-27T16:28:49Z",
|
||||
"pushed_at": "2020-07-18T11:52:31Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-1958.json
Normal file
25
2020/CVE-2020-1958.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 254874176,
|
||||
"name": "CVE-2020-1958",
|
||||
"full_name": "ggolawski\/CVE-2020-1958",
|
||||
"owner": {
|
||||
"login": "ggolawski",
|
||||
"id": 35563296,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/35563296?v=4",
|
||||
"html_url": "https:\/\/github.com\/ggolawski"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ggolawski\/CVE-2020-1958",
|
||||
"description": "CVE-2020-1958 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-11T13:31:02Z",
|
||||
"updated_at": "2020-08-27T17:38:24Z",
|
||||
"pushed_at": "2020-04-11T14:52:36Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2020-08-13T04:44:34Z",
|
||||
"updated_at": "2020-08-27T17:38:19Z",
|
||||
"pushed_at": "2020-06-10T10:49:38Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 112,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T07:08:06Z",
|
||||
"updated_at": "2020-07-06T15:54:23Z",
|
||||
"updated_at": "2020-08-27T17:38:14Z",
|
||||
"pushed_at": "2020-01-18T07:14:34Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 76,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2020-08-17T03:43:31Z",
|
||||
"updated_at": "2020-08-27T17:38:14Z",
|
||||
"pushed_at": "2020-05-22T08:46:20Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 137,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-08-23T06:14:19Z",
|
||||
"updated_at": "2020-08-27T17:38:19Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 219,
|
||||
"watchers": 218,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-08-25T08:34:48Z",
|
||||
"updated_at": "2020-08-27T16:28:55Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 199,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Waitress 1.4.2 ReDoS - CVE-2020-5236 (Blog Sample Code)",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-06T06:21:02Z",
|
||||
"updated_at": "2020-05-18T10:43:36Z",
|
||||
"updated_at": "2020-08-27T17:38:17Z",
|
||||
"pushed_at": "2020-02-06T09:45:23Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "💣 CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T05:35:01Z",
|
||||
"updated_at": "2020-07-16T04:44:33Z",
|
||||
"updated_at": "2020-08-27T17:38:14Z",
|
||||
"pushed_at": "2020-01-22T04:58:59Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 62,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:36Z",
|
||||
"updated_at": "2020-07-06T23:54:37Z",
|
||||
"updated_at": "2020-08-27T17:38:32Z",
|
||||
"pushed_at": "2020-07-05T16:44:03Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T04:27:52Z",
|
||||
"updated_at": "2020-07-21T05:09:36Z",
|
||||
"updated_at": "2020-08-27T17:38:28Z",
|
||||
"pushed_at": "2020-06-24T20:57:03Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
16
README.md
16
README.md
|
@ -536,6 +536,14 @@ This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An
|
|||
- [txrw/Dubbo-CVE-2020-1948](https://github.com/txrw/Dubbo-CVE-2020-1948)
|
||||
- [L0kiii/Dubbo-deserialization](https://github.com/L0kiii/Dubbo-deserialization)
|
||||
|
||||
### CVE-2020-1958
|
||||
|
||||
<code>
|
||||
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
|
||||
</code>
|
||||
|
||||
- [ggolawski/CVE-2020-1958](https://github.com/ggolawski/CVE-2020-1958)
|
||||
|
||||
### CVE-2020-1967
|
||||
|
||||
<code>
|
||||
|
@ -4804,6 +4812,14 @@ NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary co
|
|||
|
||||
- [purpleracc00n/CVE-2019-16941](https://github.com/purpleracc00n/CVE-2019-16941)
|
||||
|
||||
### CVE-2019-17026
|
||||
|
||||
<code>
|
||||
Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.
|
||||
</code>
|
||||
|
||||
- [maxpl0it/CVE-2019-17026-Exploit](https://github.com/maxpl0it/CVE-2019-17026-Exploit)
|
||||
|
||||
### CVE-2019-17080
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue