mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/07/26 00:08:36
This commit is contained in:
parent
fa18209e43
commit
07391f97ea
16 changed files with 74 additions and 83 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 276101400,
|
||||
"name": "CVE-2006-3392",
|
||||
"full_name": "Ziani52\/CVE-2006-3392",
|
||||
"owner": {
|
||||
"login": "Ziani52",
|
||||
"id": 53442065,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/53442065?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ziani52"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ziani52\/CVE-2006-3392",
|
||||
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-30T13:07:31Z",
|
||||
"updated_at": "2020-06-30T22:21:48Z",
|
||||
"pushed_at": "2020-06-30T22:21:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"forks_count": 193,
|
||||
"forks": 193,
|
||||
"forks_count": 194,
|
||||
"forks": 194,
|
||||
"watchers": 426,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2020-07-16T00:35:44Z",
|
||||
"updated_at": "2020-07-25T14:12:34Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 274,
|
||||
"watchers": 273,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-07-19T09:55:42Z",
|
||||
"updated_at": "2019-12-17T11:22:04Z",
|
||||
"updated_at": "2020-07-25T14:12:33Z",
|
||||
"pushed_at": "2017-07-21T06:29:35Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -270,8 +270,8 @@
|
|||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1002,13 +1002,13 @@
|
|||
"description": "dump",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T06:57:19Z",
|
||||
"updated_at": "2020-07-24T07:39:55Z",
|
||||
"updated_at": "2020-07-25T14:12:36Z",
|
||||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 465,
|
||||
"watchers_count": 465,
|
||||
"stargazers_count": 464,
|
||||
"watchers_count": 464,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 465,
|
||||
"watchers": 464,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-07-24T00:00:03Z",
|
||||
"updated_at": "2020-07-25T14:12:36Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1597,
|
||||
"watchers_count": 1597,
|
||||
"stargazers_count": 1596,
|
||||
"watchers_count": 1596,
|
||||
"forks_count": 232,
|
||||
"forks": 232,
|
||||
"watchers": 1597,
|
||||
"watchers": 1596,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-10-03T09:43:55Z",
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 244,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-07-24T16:27:23Z",
|
||||
"updated_at": "2020-07-25T14:24:46Z",
|
||||
"pushed_at": "2020-07-14T10:20:14Z",
|
||||
"stargazers_count": 1344,
|
||||
"watchers_count": 1344,
|
||||
"stargazers_count": 1346,
|
||||
"watchers_count": 1346,
|
||||
"forks_count": 339,
|
||||
"forks": 339,
|
||||
"watchers": 1344,
|
||||
"watchers": 1346,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2020-07-24T07:30:59Z",
|
||||
"updated_at": "2020-07-25T14:00:12Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 521,
|
||||
"watchers_count": 521,
|
||||
"stargazers_count": 522,
|
||||
"watchers_count": 522,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 521,
|
||||
"watchers": 522,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2020-07-25T01:59:14Z",
|
||||
"updated_at": "2020-07-25T09:33:24Z",
|
||||
"pushed_at": "2020-06-18T00:42:57Z",
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 380,
|
||||
"watchers": 381,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "LPE for CVE-2020-1054 targeting Windows 7 x64",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T23:22:15Z",
|
||||
"updated_at": "2020-07-18T05:13:42Z",
|
||||
"updated_at": "2020-07-25T10:44:57Z",
|
||||
"pushed_at": "2020-06-17T18:10:30Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -44,5 +44,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 282434512,
|
||||
"name": "CVE-2020-1054",
|
||||
"full_name": "HuaiPiqi\/CVE-2020-1054",
|
||||
"owner": {
|
||||
"login": "HuaiPiqi",
|
||||
"id": 68001644,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/68001644?v=4",
|
||||
"html_url": "https:\/\/github.com\/HuaiPiqi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HuaiPiqi\/CVE-2020-1054",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-25T11:56:48Z",
|
||||
"updated_at": "2020-07-25T11:56:52Z",
|
||||
"pushed_at": "2020-07-25T11:56:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A proof-of-concept for CVE-2020-12753",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T21:58:42Z",
|
||||
"updated_at": "2020-07-14T19:14:50Z",
|
||||
"updated_at": "2020-07-25T10:08:12Z",
|
||||
"pushed_at": "2020-06-01T22:55:46Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T05:15:05Z",
|
||||
"updated_at": "2020-07-25T05:24:55Z",
|
||||
"updated_at": "2020-07-25T12:11:24Z",
|
||||
"pushed_at": "2020-07-18T11:52:31Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-07-24T16:27:23Z",
|
||||
"updated_at": "2020-07-25T14:24:46Z",
|
||||
"pushed_at": "2020-07-14T10:20:14Z",
|
||||
"stargazers_count": 1344,
|
||||
"watchers_count": 1344,
|
||||
"stargazers_count": 1346,
|
||||
"watchers_count": 1346,
|
||||
"forks_count": 339,
|
||||
"forks": 339,
|
||||
"watchers": 1344,
|
||||
"watchers": 1346,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -341,6 +341,7 @@ An elevation of privilege vulnerability exists in Windows when the Windows kerne
|
|||
|
||||
- [0xeb-bp/cve-2020-1054](https://github.com/0xeb-bp/cve-2020-1054)
|
||||
- [Iamgublin/CVE-2020-1054](https://github.com/Iamgublin/CVE-2020-1054)
|
||||
- [HuaiPiqi/CVE-2020-1054](https://github.com/HuaiPiqi/CVE-2020-1054)
|
||||
|
||||
### CVE-2020-1066
|
||||
|
||||
|
@ -14307,14 +14308,6 @@ Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 all
|
|||
|
||||
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
|
||||
|
||||
### CVE-2006-3392
|
||||
|
||||
<code>
|
||||
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
|
||||
</code>
|
||||
|
||||
- [Ziani52/CVE-2006-3392](https://github.com/Ziani52/CVE-2006-3392)
|
||||
|
||||
### CVE-2006-3592
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue