mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/10/19 18:09:54
This commit is contained in:
parent
ac18895391
commit
0a54a70e4e
23 changed files with 116 additions and 88 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-02-20T07:57:58Z",
|
||||
"stargazers_count": 548,
|
||||
"watchers_count": 548,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"forks_count": 180,
|
||||
"forks": 180,
|
||||
"watchers": 548,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "This would basically send smb1 (not smb2) packets to determine if a machine is vulnerable to CVE-2017-0143 (Etern-Blue for windows). (Work in progress)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-07T06:19:45Z",
|
||||
"updated_at": "2020-10-17T20:12:44Z",
|
||||
"pushed_at": "2020-10-17T20:12:42Z",
|
||||
"updated_at": "2020-10-19T04:50:31Z",
|
||||
"pushed_at": "2020-10-19T04:50:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Aggressor Script to launch IE driveby for CVE-2018-4878",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-10T09:30:18Z",
|
||||
"updated_at": "2020-08-08T11:02:28Z",
|
||||
"updated_at": "2020-10-19T06:42:48Z",
|
||||
"pushed_at": "2018-02-10T19:39:10Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 77,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-10-18T12:47:22Z",
|
||||
"updated_at": "2020-10-19T06:41:08Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 319,
|
||||
"watchers": 320,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1071,13 +1071,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-10-14T03:55:14Z",
|
||||
"updated_at": "2020-10-19T07:30:59Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1117,
|
||||
"watchers_count": 1117,
|
||||
"stargazers_count": 1118,
|
||||
"watchers_count": 1118,
|
||||
"forks_count": 378,
|
||||
"forks": 378,
|
||||
"watchers": 1117,
|
||||
"watchers": 1118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-19T08:53:56Z",
|
||||
"updated_at": "2020-10-14T18:26:01Z",
|
||||
"updated_at": "2020-10-19T03:11:50Z",
|
||||
"pushed_at": "2019-11-19T09:18:00Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-18T10:31:02Z",
|
||||
"updated_at": "2020-10-19T04:33:59Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 1945,
|
||||
"watchers_count": 1945,
|
||||
"stargazers_count": 1946,
|
||||
"watchers_count": 1946,
|
||||
"forks_count": 511,
|
||||
"forks": 511,
|
||||
"watchers": 1945,
|
||||
"watchers": 1946,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2020-10-12T06:04:08Z",
|
||||
"updated_at": "2020-10-19T03:34:23Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 400,
|
||||
"watchers_count": 400,
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"forks_count": 104,
|
||||
"forks": 104,
|
||||
"watchers": 400,
|
||||
"watchers": 401,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -864,13 +864,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-10-17T04:34:17Z",
|
||||
"updated_at": "2020-10-19T06:26:04Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 1019,
|
||||
"watchers_count": 1019,
|
||||
"stargazers_count": 1020,
|
||||
"watchers_count": 1020,
|
||||
"forks_count": 333,
|
||||
"forks": 333,
|
||||
"watchers": 1019,
|
||||
"watchers": 1020,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1094,13 +1094,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-10-15T20:34:31Z",
|
||||
"updated_at": "2020-10-19T06:32:20Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 324,
|
||||
"watchers": 325,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T08:34:47Z",
|
||||
"updated_at": "2020-10-18T08:35:16Z",
|
||||
"pushed_at": "2020-10-18T08:35:14Z",
|
||||
"updated_at": "2020-10-19T08:52:49Z",
|
||||
"pushed_at": "2020-10-19T08:52:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-30T16:03:35Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A bluetooth-related vulnerability in some contact tracing apps",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-15T00:18:03Z",
|
||||
"updated_at": "2020-10-18T07:36:27Z",
|
||||
"updated_at": "2020-10-19T05:11:20Z",
|
||||
"pushed_at": "2020-06-26T03:41:19Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-06-13T18:55:03Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-09-25T15:32:01Z",
|
||||
"stargazers_count": 669,
|
||||
"watchers_count": 669,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"watchers": 669,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -611,8 +611,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-20T13:44:16Z",
|
||||
"updated_at": "2020-09-20T13:53:23Z",
|
||||
"pushed_at": "2020-09-20T13:53:21Z",
|
||||
"updated_at": "2020-10-19T06:55:24Z",
|
||||
"pushed_at": "2020-10-19T06:55:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-07T19:56:09Z",
|
||||
"updated_at": "2020-10-19T01:27:00Z",
|
||||
"updated_at": "2020-10-19T05:24:19Z",
|
||||
"pushed_at": "2020-10-15T02:57:22Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 186,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "PoC BSOD for CVE-2020-16898",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-17T04:32:11Z",
|
||||
"updated_at": "2020-10-17T10:46:42Z",
|
||||
"updated_at": "2020-10-19T09:05:12Z",
|
||||
"pushed_at": "2020-10-17T04:32:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-15T14:32:25Z",
|
||||
"updated_at": "2020-10-19T02:02:33Z",
|
||||
"updated_at": "2020-10-19T07:50:40Z",
|
||||
"pushed_at": "2020-10-15T14:57:31Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2020-10-13T09:14:30Z",
|
||||
"updated_at": "2020-10-19T06:38:38Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-24771.json
Normal file
25
2020/CVE-2020-24771.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 305250470,
|
||||
"name": "CVE-2020-24771",
|
||||
"full_name": "qlh831\/CVE-2020-24771",
|
||||
"owner": {
|
||||
"login": "qlh831",
|
||||
"id": 73090087,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/73090087?v=4",
|
||||
"html_url": "https:\/\/github.com\/qlh831"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qlh831\/CVE-2020-24771",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-19T03:16:34Z",
|
||||
"updated_at": "2020-10-19T03:25:00Z",
|
||||
"pushed_at": "2020-10-19T03:24:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2020-10-19T02:39:44Z",
|
||||
"updated_at": "2020-10-19T03:58:51Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 210,
|
||||
"watchers": 211,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-10-18T10:31:02Z",
|
||||
"updated_at": "2020-10-19T04:33:59Z",
|
||||
"pushed_at": "2020-10-10T04:01:51Z",
|
||||
"stargazers_count": 1945,
|
||||
"watchers_count": 1945,
|
||||
"stargazers_count": 1946,
|
||||
"watchers_count": 1946,
|
||||
"forks_count": 511,
|
||||
"forks": 511,
|
||||
"watchers": 1945,
|
||||
"watchers": 1946,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -703,13 +703,13 @@
|
|||
"description": "F5 BIG-IP 任意文件读取+远程命令执行RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-08T04:02:07Z",
|
||||
"updated_at": "2020-08-01T15:52:07Z",
|
||||
"updated_at": "2020-10-19T05:58:40Z",
|
||||
"pushed_at": "2020-07-08T04:10:12Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-30T03:33:37Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "来源于jackson-CVE-2020-8840,需要开autotype",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-23T03:51:40Z",
|
||||
"updated_at": "2020-08-21T06:46:26Z",
|
||||
"updated_at": "2020-10-19T05:03:13Z",
|
||||
"pushed_at": "2020-06-15T22:01:49Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2365,6 +2365,9 @@ FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction betwee
|
|||
### CVE-2020-24765
|
||||
- [trump88/CVE-2020-24765](https://github.com/trump88/CVE-2020-24765)
|
||||
|
||||
### CVE-2020-24771
|
||||
- [qlh831/CVE-2020-24771](https://github.com/qlh831/CVE-2020-24771)
|
||||
|
||||
### CVE-2020-24955
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue