mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/03/08 06:08:27
This commit is contained in:
parent
8c8ee35bf7
commit
1179c52426
11 changed files with 109 additions and 28 deletions
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-10-26T17:54:54Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2018-10-24T17:42:47Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-3245-PoC",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T06:49:33Z",
|
||||
"updated_at": "2020-03-07T10:30:39Z",
|
||||
"updated_at": "2020-03-07T18:10:16Z",
|
||||
"pushed_at": "2018-10-27T01:41:18Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 135,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1623,13 +1623,13 @@
|
|||
"description": "Porting BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2020-03-06T15:27:44Z",
|
||||
"updated_at": "2020-03-07T17:07:06Z",
|
||||
"pushed_at": "2019-07-20T04:48:43Z",
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 319,
|
||||
"watchers": 320,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2019/CVE-2019-19905.json
Normal file
25
2019/CVE-2019-19905.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 245700108,
|
||||
"name": "CVE-2019-19905",
|
||||
"full_name": "dpmdpm2\/CVE-2019-19905",
|
||||
"owner": {
|
||||
"login": "dpmdpm2",
|
||||
"id": 60997239,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/60997239?v=4",
|
||||
"html_url": "https:\/\/github.com\/dpmdpm2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dpmdpm2\/CVE-2019-19905",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T20:23:04Z",
|
||||
"updated_at": "2020-03-07T20:27:08Z",
|
||||
"pushed_at": "2020-03-07T20:27:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T21:33:17Z",
|
||||
"updated_at": "2020-03-07T13:22:08Z",
|
||||
"updated_at": "2020-03-07T16:09:11Z",
|
||||
"pushed_at": "2020-02-03T09:20:44Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 21,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T13:53:46Z",
|
||||
"updated_at": "2020-03-06T11:15:07Z",
|
||||
"updated_at": "2020-03-07T16:59:37Z",
|
||||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-02-23T17:06:06Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-02-24T12:06:08Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 139,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2020-03-07T09:19:14Z",
|
||||
"updated_at": "2020-03-07T19:07:56Z",
|
||||
"pushed_at": "2020-03-04T16:16:58Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 245688520,
|
||||
"name": "CVE-2020-2555",
|
||||
"full_name": "Y4er\/CVE-2020-2555",
|
||||
"owner": {
|
||||
"login": "Y4er",
|
||||
"id": 40487319,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40487319?v=4",
|
||||
"html_url": "https:\/\/github.com\/Y4er"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Y4er\/CVE-2020-2555",
|
||||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2020-03-07T19:07:52Z",
|
||||
"pushed_at": "2020-03-07T19:06:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 245688871,
|
||||
"name": "CVE-2020-8597",
|
||||
"full_name": "WinMin\/CVE-2020-8597",
|
||||
"owner": {
|
||||
"login": "WinMin",
|
||||
"id": 18380453,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/18380453?v=4",
|
||||
"html_url": "https:\/\/github.com\/WinMin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WinMin\/CVE-2020-8597",
|
||||
"description": "CVE-2020-8597 poc",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T19:00:46Z",
|
||||
"updated_at": "2020-03-07T19:18:09Z",
|
||||
"pushed_at": "2020-03-07T19:07:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
10
README.md
10
README.md
|
@ -195,6 +195,7 @@ Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (compo
|
|||
- [Hu3sky/CVE-2020-2555](https://github.com/Hu3sky/CVE-2020-2555)
|
||||
- [wsfengfan/CVE-2020-2555](https://github.com/wsfengfan/CVE-2020-2555)
|
||||
- [0nise/CVE-2020-2555](https://github.com/0nise/CVE-2020-2555)
|
||||
- [Y4er/CVE-2020-2555](https://github.com/Y4er/CVE-2020-2555)
|
||||
|
||||
### CVE-2020-2655
|
||||
|
||||
|
@ -333,6 +334,7 @@ eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the
|
|||
|
||||
- [marcinguy/CVE-2020-8597](https://github.com/marcinguy/CVE-2020-8597)
|
||||
- [mentalburden/MrsEAPers](https://github.com/mentalburden/MrsEAPers)
|
||||
- [WinMin/CVE-2020-8597](https://github.com/WinMin/CVE-2020-8597)
|
||||
|
||||
### CVE-2020-8809
|
||||
|
||||
|
@ -2501,6 +2503,14 @@ In onSetSampleX of SkSwizzler.cpp, there is a possible out of bounds write due t
|
|||
### CVE-2019-19871
|
||||
- [VDISEC/CVE-2019-19871-AuditGuide](https://github.com/VDISEC/CVE-2019-19871-AuditGuide)
|
||||
|
||||
### CVE-2019-19905
|
||||
|
||||
<code>
|
||||
NetHack 3.6.x before 3.6.4 is prone to a buffer overflow vulnerability when reading very long lines from configuration files. This affects systems that have NetHack installed suid/sgid, and shared systems that allow users to upload their own configuration files.
|
||||
</code>
|
||||
|
||||
- [dpmdpm2/CVE-2019-19905](https://github.com/dpmdpm2/CVE-2019-19905)
|
||||
|
||||
### CVE-2019-19943
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue